4 research outputs found

    Dijital Kütüphane Ortamında Bilgi Güvenliği Sorunları: Literatür Değerlendirmesi

    Get PDF
    This paper aimed to explore the literature on security issues that digital libraries should consider in managing digital resources. Books on information security and network security were consulted as well as several databases such as ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google Scholar, ProQuest, Emerald Insight, ACM were searched to understand what particular aspect of information security and privacy in digital libraries exist from 2000 - 2010. Security in digital libraries is an issue of the most important, and should be considered carefully in creating policies and strategic plans of institutions wanting to set up a digital library. This paper focused on the four main streams that concerns security in the digital environment, namely: infrastructure, digital content, users and standards and legal issues. This literature review also built upon previous literature reviews, and is one of the few of its kind in the topic.Bu çalışma dijital kütüphanelerin kaynakların yönetiminde göz önünde bulundurması gereken güvenlik sorunlarına ilişkin literatürü ortaya koymayı amaçlamaktadır. Bilgi Güvenliği, Ağ Güvenliği, Kişisel Gizlilik konuları üzerine 2000 - 2010 yıl aralığını kapsayan kitaplar ve makaleler ERIC, Ebrary, LISA, Science Direct, EbscoHost, ISI, Google Akademik, ProQuest, Emerald Insight ve ACM gibi çeşitli veri tabanlarından taranmıştır. İncelenen literatürden elde edilen sonuçlara göre, bilgi güvenliği dijital kütüphaneler için son derece önemli bir konudur ve dijitalleşme sürecinde bir kütüphane, güvenlik politikalarını ve stratejik planlarını dikkatle göz önünde bulundurmalıdır. Bu araştırmada dijital ortamda güvenliği ilgilendiren Altyapı, Dijital İçerik, Kullanıcılar, Standartlar ve Hukuki Konular olmak üzere dört ana madde üzerinde durulmuştur. Bu çalışma ayrıca daha önceki literatür taramalarını da kapsamaktadır

    Data Papers as Documentation of Research Processes and Practices

    No full text
    This paper reports preliminary results of an on-going study of data papers, a fairly recently introduced type of journal paper designed for documenting and instigating the publishing of research data sets. The aim of the paper is to provide new knowledge on how research processes and practices are described in a set of archaeological data papers selected for analysis. The findings point to a diversity of strategies of how research processes are documented. Explaining factors include the type of data and research where the dataset is stemming from, cross-disciplinary influences from fields outside of archaeology, and the original purpose of data collection and whether it appears that the data was collected for sharing and publishing. The findings point to several possibilities to develop author guidelines for data papers and insights into why and what some types of datasets appear as easier to document than others

    Business Plan on A2Z Solutions for preservation, dissemination and digital information management

    Get PDF
    The main aim of the business is to provide a service that non governmental organizations will take full advantage of information management and dissemination technologies at affordable costs. Due to the proliferation of democracy and humanitarian work, many non governmental organizations are emerging covering wide ranges of information generating activities. These organizations rely on donor funds. They, therefore, seek to achieve maximum efficiency and effectiveness at the lowest cost possible. Application of technology in information management is a recent development that has potential to grow, organizations which do not specialize in technology are less likely to adapt to these changes without special assistance from specialist companies. A 2 Z will there meet these demands of affordability and efficiency in supporting information management technologies. A 2 Z does not have any direct competitor in its target market segment, however large companies that offer generalized IT support services like Microsoft will offer indirect competition. Our strength however is on lower costs and closeness to the customer. Our set of services is packaged as a one stop service which that maintains the customer loyalty from installation to perpetually support. Open source software is gaining more popularity and trust among customer as compared to proprietary software which is generally regarded as profit centric rather than service centric. Our support for these software will ensure that we are highly specialized in reliable but cheaper services. We will have to support organizations from installation, configuration and setting up, metadata entry and continuous support as need be. Though we foresee great profits in the referred markets. We are aware of the fact that our service can easily be copied by competitors since it is best on the free open source software. As new graduates, we also note that we do not have experience. To meet this challenge, the company will embark on a vigorous and aggressive marketing program that anchor on strong values as well as effective communication with the customers. We, therefore, seek to position ourselves in the market with swift speed and expand as quickly as possible at the same time maintaining customer loyalty to safeguard our service agains
    corecore