Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Business

Cpn-Dam Business Meeting, Amanda Harlan Nov 2016

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4:50-4:55pm Closing statements


Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau Nov 2016

Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau

Central Plains Network for Digital Asset Management

In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the …


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh Nov 2016

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin Nov 2016

Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin

Central Plains Network for Digital Asset Management

So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a collection assessment …


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez Nov 2016

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud Nov 2016

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …


3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh Nov 2016

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr Nov 2016

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness Nov 2016

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with …


Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson Nov 2016

Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson

Central Plains Network for Digital Asset Management

From the perspective of two distinct workflows, this presentation will illustrate how library departments, Digital Collections and Conservation collaborate on the production of digital assets. In essence, both digitization and analog preservation workflows aim to guarantee that collections are easily retrieved and usable. This case study will illustrate two examples. The first one is more linear yet regional; it aims to create digital assets to engage the community by means of crowdsourced transcription. The second one is hands-on, as it addresses the long-term research value of the physical material for use in classrooms by Special Collections. While these workflows may …


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion Nov 2016

The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion

Central Plains Network for Digital Asset Management

In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …


The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor Nov 2016

The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor

Central Plains Network for Digital Asset Management

The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …


Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode Oct 2016

Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode

Southwestern Business Administration Teaching Conference

In this paper we explore the use of social media on the content delivery aspects of instruction and potential impacts on student learning. It is our conjecture that impacts of social media use might depend on factors such as the interface of particular medium and learning style, teaching style and instructor skill, and the demographics of students and their instructors. We propose a framework that links instructor to students through social media. That is, social media becomes a channel though which learning occurs. Classifying multimedia technology as tools and social media as interactive Web 2.0 Internet-based applications, we employ …


Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson Oct 2016

Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson

Southwestern Business Administration Teaching Conference

Today's students are learning at unprecedented speeds. There are a pockets of learners who may be isolated/silent sufferers who face tremendous socioeconomic challenges while seeking higher education. Providing cloud-based technology solutions to strengthen support services and family learning engagement through a series of student family portals will provide the support needed to make student learning opportunities family-based projects or community-based projects successful in graduation completion rates and job placement opportunities.


Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner Oct 2016

Architectural Intervention: The Resilient Community Center, Matthew A. Baumgartner

ASA Multidisciplinary Research Symposium

In the city of Centralia, Illinois, several issues govern the city’s future, all stemming from the same major problem: the economy. To intervene, this community center proposal aims to encourage economic development and growth in the city, assisting small businesses with starting and expanding in the region.


Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell Oct 2016

Publishing Makerspace: A New Approach To Scholarly Publishing, Sylvia K. Miller, David Phillips, Courtney Berger, Marjorie Fowler, Rebecca Kennison, John D. Martin Iii, John Mcleod, Chelcie Rowell

Charleston Library Conference

This article describes the concept of the Publishing Makerspace, which is a publishing environment that is reconfigured as a place where all the components of a scholarly project—books and e‐books, virtual and physical exhibits, visualizations, live performance and film—can be integrated using a collaborative process. This place enables the creation of a multimodal publishing environment that fully integrates digital content with manuscripts and “traditional” scholarly content. Starting with an overview of the history of the team that devised this approach and its membership, the article describes the problem that the authors have identified with current approaches to multimodal publishing and …


Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard Oct 2016

Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard

KSU Proceedings on Cybersecurity Education, Research and Practice

Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC learning …


Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer Oct 2016

Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer

KSU Proceedings on Cybersecurity Education, Research and Practice

Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain …


Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala Oct 2016

Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala

KSU Proceedings on Cybersecurity Education, Research and Practice

The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.


“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar Oct 2016

“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is a serious security threat to Online Social Networks (OSNs). Identity theft, impersonation, phishing, and deception are some of the social engineering-based attacks that exploit vulnerabilities of interpersonal relationships of online users. As a result, relationships in OSNs need to be thoroughly examined. In this vein, we propose a relationship categorization model to evaluate relationship strength based on graph-theoretic properties and social network analysis (SNA) methods. For example, in Facebook, users may be categorized into close-neighbors, distant-neighbors, celebrities (influential by admiration), authority (influential by power), and loners. Close-neighbors category will help identify a set of trustworthy actors while …


Smart City Security, Shawn Ralko, Sathish Kumar Oct 2016

Smart City Security, Shawn Ralko, Sathish Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues …


Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid Oct 2016

Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown Oct 2016

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

KSU Proceedings on Cybersecurity Education, Research and Practice

Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.

The purpose of this research is to examine how information security policy quality and …


Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu Oct 2016

Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu

KSU Proceedings on Cybersecurity Education, Research and Practice

Augmented Reality (AR) proves to be an attractive technology in mobile games. While AR techniques energize mobile games, the privacy issue is raised to be discussed. Employing social media analytics (SMA) techniques, this research makes efforts to examines Twitter postings of “PokemonGo” case and explores individuals’ attitudes toward privacy in AR games. In this research, we examine what are the privacy concerns of individuals in AR games and what are the individuals’ sentiments toward privacy. In the interesting case of PokemonGo, this paper suggests that individuals’ concerns about privacy are emphasized on six dimensions - collection, improper access, unauthorized secondary …


Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan Oct 2016

Semi-Supervised Deep Neural Network For Network Intrusion Detection, Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Network security is of vital importance for corporations and institutions. In order to protect valuable computer systems, network data needs to be analyzed so that possible network intrusions can be detected. Supervised machine learning methods achieve high accuracy at classifying network data as normal or malicious, but they require the availability of fully labeled data. The recently developed ladder network, which combines neural networks with unsupervised learning, shows promise in achieving a high accuracy while only requiring a small number of labeled examples. We applied the ladder network to classifying network data using the Third International Knowledge Discovery and Data …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye Oct 2016

User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye

KSU Proceedings on Cybersecurity Education, Research and Practice

With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.