Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Library and Information Science

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca Sep 2018

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca

Kathryn Wissel, MBA, MI

In May 2017, The Economist ran a cover story titled “The world’s most valuable resource is no longer oil, but data.” Given the continued growth in the sourcing, curating, and storing of data for academic research, it seems the academy would agree. In response to this growing need at Seton Hall, a midsized research university, the Seton Hall University (SHU) Libraries conducted an assessment of the current and emerging data requirements of the researchers and students on campus.


Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao May 2018

Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao

Theses and Dissertations

Introduction

The laboratory rat has been widely used as an animal model in biomedical research. There are many strains exhibiting a wide variety of phenotypes. Capturing these phenotypes in a centralized database provides researchers with an easy method for choosing the appropriate strains for their studies. Current resources such as NBRP and PhysGen provided some preliminary work in rat phenotype databases. However, there are drawbacks in both projects: (1) small number of animals (6 rats) used by NBRP; (2) NBRP project is a one-time effort for each strain; (3) PhysGen web interface only enables queries within a single study – …


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh Apr 2018

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham Apr 2018

Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham

University of Nebraska-Lincoln Data Repository

No abstract provided.


The Emergence Of Institutional Repositories: A Conceptual Understanding Of Key Issues Through Review Of Literature, O. P. Saini Mar 2018

The Emergence Of Institutional Repositories: A Conceptual Understanding Of Key Issues Through Review Of Literature, O. P. Saini

Library Philosophy and Practice (e-journal)

It is the responsibility of the libraries to keep update its users by incorporating different technologies or tricks among the services offered to users. The libraries are managing diversified collection in both electronic and physical formats including the theses and dissertations awarded by their respective parent institutes in physical form. The academic libraries are directed by the Indian government through a mandate to protect and preserve the theses and dissertation in electronic form and provide access to the public domain. Institutional Repositories (IRs) have the perspective to store any amount of information electronically. Therefore, many of the academic libraries are …


Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2018

Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First paragraph] Preservation of the Web ensures that future generations have a picture of how the web was. Web archives like Internet Archive's Wayback Machine, WebCite, and archive.is allow individuals to submit URIs to be archived, but the captures they preserve then reside at the archives. Traversing these captures in time as preserved by multiple archive sources (using Memento [8]) provides a more comprehensive picture of the past Web than relying on a single archive. Some content on the Web, such as content behind authentication, may be unsuitable or inaccessible for preservation by these organizations. Furthermore, this content may be …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …


Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia Jan 2018

Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia

Walden Dissertations and Doctoral Studies

U.S. student enrollment in online classes in the higher education sector has grown rapidly since 2001. Researchers have found that student satisfaction often leads to higher student retention, yet more research was needed to understand reasons for student satisfaction with online education. The purpose of this nonexperimental study was to examine the relationship between students' early exposure to technology (i.e., before college) and their satisfaction with online education in college. The unified theory of acceptance and use of technology were the theoretical framework. A convenience sample of 103 participants from the population of online students at colleges and universities in …


A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2018

A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

We surveyed various archival systems to compare and contrast different techniques used to implement an archival replay banner. We found that inline plain HTML injection is the most common approach, but prone to style conflicts. Iframe-based banners are also very common and while they do not have style conflicts, they suffer from screen real estate wastage and limited design choices. Custom Elements-based banners are promising, but due to being a new web standard, these are not yet widely deployed.


Swimming In A Sea Of Javascript Or: How I Learned To Stop Worrying And Love High-Fidelity Replay, John A. Berlin, Michael L. Nelson, Michele C. Weigle Jan 2018

Swimming In A Sea Of Javascript Or: How I Learned To Stop Worrying And Love High-Fidelity Replay, John A. Berlin, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First paragraph] Preserving and replaying modern web pages in high-fidelity has become an increasingly difficult task due to the increased usage of JavaScript. Reliance on server-side rewriting alone results in live-leakage and or the inability to replay a page due to the preserved JavaScript performing an action not permissible from the archive. The current state-of-the-art high fidelity archival preservation and replay solutions rely on handcrafted client-side URL rewriting libraries specifically tailored for the archive, namely Webrecoder's and Pywb's wombat.js [12]. Web archives not utilizing client-side rewriting rely on server-side rewriting that misses URLs used in a manner not accounted for …


It Is Hard To Compute Fixity On Archived Web Pages, Mohamed Aturban, Michael L. Nelson, Michele C. Weigle Jan 2018

It Is Hard To Compute Fixity On Archived Web Pages, Mohamed Aturban, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[Introduction] Checking fixity in web archives is performed to ensure archived resources, or mementos (denoted by URI-M) have remained unaltered since when they were captured. The final report of the PREMIS Working Group [2] defines information used for fixity as "information used to verify whether an object has been altered in an undocumented or unauthorized way." The common technique for checking fixity is to generate a current hash value (i.e., a message digest or a checksum) for a file using a cryptographic hash function (e.g., SHA-256) and compare it to the hash value generated originally. If they have different hash …


205.3 The Many Shapes Of Archive-It, Shawn Jones, Michael L. Nelson, Alexander Nwala, Michele C. Weigle Jan 2018

205.3 The Many Shapes Of Archive-It, Shawn Jones, Michael L. Nelson, Alexander Nwala, Michele C. Weigle

Computer Science Faculty Publications

Web archives, a key area of digital preservation, meet the needs of journalists, social scientists, historians, and government organizations. The use cases for these groups often require that they guide the archiving process themselves, selecting their own original resources, or seeds, and creating their own web archive collections. We focus on the collections within Archive-It, a subscription service started by the Internet Archive in 2005 for the purpose of allowing organizations to create their own collections of archived web pages, or mementos. Understanding these collections could be done via their user-supplied metadata or via text analysis, but the metadata is …