Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Orcid Education: A Departmental Approach, Alissa A. Droog Feb 2021

Orcid Education: A Departmental Approach, Alissa A. Droog

Faculty Peer-Reviewed Publications

Purpose: This paper provides a case study of an ORCID promotion at the University of Waterloo School of Optometry and Vision Science, providing context for the importance of education in ORCID outreach. Design/methodology/approach- The 3-month ORCID promotion used workshops and individual appointments to educate faculty about ORCID, identity management systems and research impact and scholarly communications. Findings- A targeted and personal approach to ORCID promotion focused on education about why you might use this author disambiguation system resulted in 80% of the faculty within the School of Optometry and Vision Science signing up for or using ORCID. Scaling an ORCID …


Lower The Barrier & Be Empowered: Creating And Including Linked Data Vocabularies For Digital Collections, Sai Deng Jan 2019

Lower The Barrier & Be Empowered: Creating And Including Linked Data Vocabularies For Digital Collections, Sai Deng

Faculty Scholarship and Creative Works

Linked data has been explored and adopted by the library and archive community in recent years, but it has remained a relatively high bar to implement for most librarians and catalogers in their daily work. To lower the barrier, the librarians at the University of Central Florida (UCF) Libraries have adopted open source tools and platforms such as OpenRefine and Wikidata to their workflows to include linked data for their collections in the digital repositories as well as the library catalog. This presentation will review digital repositories' capabilities in accommodating linked data and show several cases of adding linked data …


A Step Forward: Adding Linked Data Vocabularies To Digital Repositories, Sai Deng May 2018

A Step Forward: Adding Linked Data Vocabularies To Digital Repositories, Sai Deng

Faculty Scholarship and Creative Works

Linked data has been a recent endeavor in the library community and various libraries have experimented with linked data in their traditional library catalog and digital collections. This presentation will review the different linked data practices especially focusing on those related to digital collections in academic libraries, explore the current digital library systems’ capabilities in accommodating linked data and present how linked data vocabularies have been added to the digital repositories at the University of Central Florida (UCF) Libraries. The UCF Libraries have been adding linked data vocabularies to its institutional repository from the Library of Congress’ authority files and …


“Who Is This?” Moving From Authority Control To Identity Management, Suzanne Graham, Dong Joon Lee, Erik Radio, Hannah Tarver May 2018

“Who Is This?” Moving From Authority Control To Identity Management, Suzanne Graham, Dong Joon Lee, Erik Radio, Hannah Tarver

Articles, Chapters and Online Publications

This article provides practical guidance on the successes and challenges from three large institutions dealing with creative cataloging of intellectual products and the maintenance of those records.


The Development Of A Graduate Course On Identity Management For The Department Of Networking, Security, And Systems Administration, Marsha Mitchell Jan 2008

The Development Of A Graduate Course On Identity Management For The Department Of Networking, Security, And Systems Administration, Marsha Mitchell

Theses

Digital identities are being utilized more than ever as a means to authenticate computer users in order to control access to systems, web services, and networks. To maintain these digital identities, administrators turn to Identity Management solutions to offer protection for users, business partners, and networks. This paper proposes an analysis of Identity Management to be accomplished in the form of a graduate level course of study for a ten-week period for the Networking, Security, and Systems Administration department at Rochester Institute of Technology. This course will be designed for this department because of its emphasis on securing, protecting, and …