Search results

1 – 10 of over 1000
Article
Publication date: 17 September 2019

Rachel Ivy Clarke and Sayward Schoonmaker

The purpose of this paper is to investigate what metadata elements for access points currently exist to represent diverse library reading materials, either in libraries or from…

2613

Abstract

Purpose

The purpose of this paper is to investigate what metadata elements for access points currently exist to represent diverse library reading materials, either in libraries or from external sources, as well as what metadata elements for access points are currently not present but are necessary to represent diverse library reading materials.

Design/methodology/approach

A field scan of thirteen contemporary metadata schemas identified elements that might serve as potential access points regarding the diversity status of resource creators as well as topical or thematic content. Elements were semantically mapped using a metadata crosswalk to understand the intellectual and conceptual space of the elements. Element definitions and application of controlled vocabularies were also examined where possible to offer an additional context.

Findings

Metadata elements describing gender, occupation, geographic region, audience and age currently exist in many schemas and could potentially be used to offer access to diverse library materials. However, metadata elements necessary to represent racial, ethnic, national and cultural identity are currently not present in specific forms necessary for enabling resource access and collection assessment. The lack of distinct elements contributes to the implicit erasure of marginalized identities.

Originality/value

The search for metadata describing diversity is a first step toward enabling more systematic access to diverse library materials. The need for systematic description of diversity to make visible and promote diverse materials is highlighted in this paper. Though the subject of this paper is library organization systems and, for clarity, uses terms specific to the library profession, the issues present are relevant to all information professionals and knowledge organization systems.

Details

Journal of Documentation, vol. 76 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 17 June 2019

Estee van der Walt and Jan Eloff

This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered…

Abstract

Purpose

This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the requirements. The aim of the model is to identify humans lying about their identity on SMPs.

Design/methodology/approach

The requirements of a model for IDD will be determined through a literature study combined with a study that identifies currently available identity related metadata on SMPs. This metadata refers to the attributes that describe a user account on an SMP. The aim is to restrict IDD to be only based on these types of attributes, as opposed to or combined with the contents of a single or multiple communications.

Findings

Data science experiments were conducted and in particular supervised machine learning models were discovered that indeed detects identity deception on SMPs with an area under the receiver operator characteristics curve (ROC-AUC) of 75.5 per cent.

Originality/value

SMPs allow any user to easily communicate with their friends or the general public at large. People can now be targeted at great scale, most often for malicious purposes. The reality is that many of these cyber-attacks involve some form of identity deception, where the attackers lie about who they are. Much focus to date has been on the identification of non-human deceptive accounts. This paper focuses on deceptive human accounts that target vulnerable individuals on SMPs.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 January 1970

Dong Joon Lee, Besiki Stvilia and Shuheng Wu

The purpose of this paper is to examine the relationships between researcher characteristics and their use of metadata in their ResearchGate profiles.

2006

Abstract

Purpose

The purpose of this paper is to examine the relationships between researcher characteristics and their use of metadata in their ResearchGate profiles.

Design/methodology/approach

This paper reports on one part of a larger study that examined researchers’ use of and engagement with research information management systems (RIMSs). The study’s design included qualitative, semi-structured interviews with 15 researchers and a survey completed by 412 researchers. Detailed reports of findings from the interviews and survey can be found elsewhere. This paper reports on the part of the study that analyzed the use of metadata elements in the ResearchGate profiles of 126 survey participants.

Findings

Most researchers shared metadata related to their research rather than their teaching or service. Statistical analyses revealed statistically significant relationships between researchers’ metadata use and their participation levels in RIMSs, as well as between metadata use and researchers’ seniority.

Originality/value

The study’s findings help to identify researchers’ priorities for different metadata elements, as well as to construct profile metadata templates for each specific participation level.

Details

Library Hi Tech, vol. 38 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 March 2015

Corinne Rogers

This paper aims to explore a new model of “record” that maps traditional attributes of a record onto a technical decomposition of digital records. It compares the core…

2815

Abstract

Purpose

This paper aims to explore a new model of “record” that maps traditional attributes of a record onto a technical decomposition of digital records. It compares the core characteristics necessary to call a digital object a “record” in terms of diplomatics or “evidence” in terms of digital forensics. It then isolates three layers of abstraction: the conceptual, the logical and the physical. By identifying the essential elements of a record at each layer of abstraction, a diplomatics of digital records can be proposed.

Design/methodology/approach

Digital diplomatics, a research outcome of the International Research on Permanent Authentic Records in Electronic Systems (InterPARES) project, gives archivists a methodology for analyzing the identity and integrity of digital records in electronic systems and thereby assessing their authenticity (Duranti and Preston, 2008; Duranti, 2005) and tracing their provenance.

Findings

Digital records consist of user-generated data (content), system-generated metadata identifying source and location, application-generated metadata managing the look and performance of the record (e.g., native file format), application-generated metadata describing the data (e.g., file system metadata OS), and user-generated metadata describing the data. Digital diplomatics, based on a foundation of traditional diplomatic principles, can help identify digital records through their metadata and determine what metadata needs to be captured, managed and preserved.

Originality/value

The value and originality of this paper is in the application of diplomatic principles to a deconstructed, technical view of digital records through functional metadata for assessing the identity and authenticity of digital records.

Details

Records Management Journal, vol. 25 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 4 December 2017

Davy Preuveneers, Wouter Joosen and Elisabeth Ilie-Zudor

Industry 4.0 envisions a future of networked production where interconnected machines and business processes running in the cloud will communicate with one another to optimize…

1404

Abstract

Purpose

Industry 4.0 envisions a future of networked production where interconnected machines and business processes running in the cloud will communicate with one another to optimize production and enable more efficient and sustainable individualized/mass manufacturing. However, the openness and process transparency of networked production in hyperconnected manufacturing enterprises pose severe cyber-security threats and information security challenges that need to be dealt with. The paper aims to discuss these issues.

Design/methodology/approach

This paper presents a distributed trust model and middleware for collaborative and decentralized access control to guarantee data transparency, integrity, authenticity and authorization of dataflow-oriented Industry 4.0 processes.

Findings

The results of a performance study indicate that private blockchains are capable of securing IoT-enabled dataflow-oriented networked production processes across the trust boundaries of the Industry 4.0 manufacturing enterprise.

Originality/value

This paper contributes a decentralized identity and relationship management for users, sensors, actuators, gateways and cloud services to support processes that cross the trust boundaries of the manufacturing enterprise, while offering protection against malicious adversaries gaining unauthorized access to systems, services and information.

Details

Industrial Management & Data Systems, vol. 117 no. 10
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 December 2002

Norm Medeiros

This article describes the work of the Networked Resources and Metadata Committee (NRMC), a committee within ALA’s Association for Library Collections and Technical Services…

154

Abstract

This article describes the work of the Networked Resources and Metadata Committee (NRMC), a committee within ALA’s Association for Library Collections and Technical Services (ALCTS). The article discusses NRMC’s history, initiatives, and program highlights, gleaned from an interview held with the present and past chairs of the committee. Numerous details about NRMC’s role within the larger metadata community are shared, as are future directions for the committee.

Details

OCLC Systems & Services: International digital library perspectives, vol. 18 no. 4
Type: Research Article
ISSN: 1065-075X

Keywords

Article
Publication date: 18 December 2019

Konstantina Vemou and Maria Karyda

In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private…

Abstract

Purpose

In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private. This paper aims to analyze privacy requirements of personal communications over a public medium.

Design/methodology/approach

This paper systematically analyzes SNS services as communication models and considers privacy as an attribute of users’ communication. A privacy threat analysis for each communication model is performed, based on misuse scenarios, to elicit privacy requirements per communication type.

Findings

This paper identifies all communication attributes and privacy threats and provides a comprehensive list of privacy requirements concerning all stakeholders: platform providers, users and third parties.

Originality/value

Elicitation of privacy requirements focuses on the protection of both the communication’s message and metadata and takes into account the public–private character of the medium (SNS platform). The paper proposes a model of SNS functionality as communication patterns, along with a method to analyze privacy threats. Moreover, a comprehensive set of privacy requirements for SNS designers, third parties and users involved in SNS is identified, including voluntary sharing of personal data, the role of the SNS platforms and the various types of communications instantiating in SNS.

Details

Information & Computer Security, vol. 28 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2018

Emad Isa Saleh

The purpose of this paper is to investigate the availability of embedded metadata within images of digital cultural collections. It is designed to examine a proposed hypothesis…

1448

Abstract

Purpose

The purpose of this paper is to investigate the availability of embedded metadata within images of digital cultural collections. It is designed to examine a proposed hypothesis that most digitally derived images of cultural resources are stripped of their metadata once they are placed on the web.

Design/methodology/approach

A sample of 603 images were selected randomly from four cultural portals which aggregate digitized cultural collections, then four steps in the data collection process took place to examine image metadata via the web-based tool and windows application.

Findings

The study revealed that 28.5 percent of the analyzed images contained metadata, no links exist between image embedded metadata and its metadata record or the pages of the websites analyzed, and there is a significant usage of Extensible Metadata Platform to encode embedded metadata within the images.

Practical implications

The findings of the study may encourage heritage digital collection providers to reconsider their metadata preservation practices and policies to enrich the content of embedded metadata. In addition, it will raise awareness about the potential and value of embedded metadata in enhancing the findability and exchange of digital collections.

Originality/value

This study is ground breaking in that it is one of the early studies, especially in the Arab world, which aim to recognize the use of image embedded metadata within cultural heritage digital collections on the web.

Details

Library Hi Tech, vol. 36 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 12 March 2020

Deepjyoti Kalita and Dipen Deka

The purpose of this paper is to make a systematic review of the library metadata development history listing out the most significant landmarks and influencing events from Thomas…

2084

Abstract

Purpose

The purpose of this paper is to make a systematic review of the library metadata development history listing out the most significant landmarks and influencing events from Thomas Bodley's rules to the latest BIBFRAME architecture, compare their significance and suitability in the modern-day Web environment.

Design/methodology/approach

Four time divisions were identified, namely pre-1900 era, 1900–1950, post-1950 to pre-Web era and post-Web era based on pre-set information available to the authors regarding catalogue rules. Under these four divisions, relevant information sources regarding the purpose of the study were identified; various metadata standards released at different times were consulted.

Findings

Library catalogue standards have undergone transitive changes from one form to another primarily influenced by the changing work environment and different forms of resource availability in libraries. Modern-day metadata standards are influenced by the opportunities provided by the World Wide Web towards libraries and work as a suitable base for data organisation at par with Semantic Web standards.

Research limitations/implications

Information organisation processes have gone towards a more data-centric approach than earlier document-centric nature in current Semantic Web environment. Libraries had to make a move in this process, and modern-day guidelines in this regard bring the possibility of large-scale discovery services through curated information resources.

Originality/value

The study discovers relationships between key events in the course of development of metadata standards and provides suggestions and predictions regarding it's future developments.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 March 2015

Adam Jansen

This paper aims to present a conceptual methodology, named herein as object-oriented diplomatics, based on a presentation given by the author at the Digital Diplomatics 2014…

1369

Abstract

Purpose

This paper aims to present a conceptual methodology, named herein as object-oriented diplomatics, based on a presentation given by the author at the Digital Diplomatics 2014 conference. This methodology centers on building digital records capable of supporting their authenticity over time and when removed from their original systems by extending archival diplomatics theory by leveraging object-oriented programming (OOP) principles.

Design/methodology/approach

This paper presents new method for supporting the presumption of authenticity of digital records through extending archival diplomatics concepts into OOP principles when creating digital records within a record-keeping system.

Findings

This paper is based on a preliminary research being conducted during the design of a government digital archives. This concept was used as a core design element for their digital archives and has thus far shown great promise in articulating and encapsulating those essential data elements that support the presumption of authenticity across a wide diversity of record types.

Originality/value

This paper presents a new approach to support the presumption of authenticity of digital records by utilizing concepts from archival diplomatics leveraged with OOP principles. It is the hope of the author that this paper will initiate a deeper collaboration between archives and records management professionals and software developers in the design and implementation of digital repositories.

Details

Records Management Journal, vol. 25 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

1 – 10 of over 1000