Open Access. Powered by Scholars. Published by Universities.®

Series

2023

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 37 of 37

Full-Text Articles in Cataloging and Metadata

Bibliography, Nancy Richey Jan 2023

Bibliography, Nancy Richey

Faculty/Staff Personal Papers

Bibliography of publications by Nancy Richey.


Bibliography, Connie Foster Jan 2023

Bibliography, Connie Foster

Faculty/Staff Personal Papers

Bibliography of publications by Connie Foster.


Lgbtq+ Catalog Users: A Brief Survey, Karen Snow, Heather Moulaison-Sandy, Brian Dobreski Jan 2023

Lgbtq+ Catalog Users: A Brief Survey, Karen Snow, Heather Moulaison-Sandy, Brian Dobreski

School of Information Sciences -- Faculty Publications and Other Works

To promote social justice, recent work in knowledge organization (KO) has focused on providing access for members of marginalized groups including LGBTQ+ persons. Expanding on this work, the current project explores demographics and library usage as well as the participant-provided identity terms of LGBTQ+ library catalog users. Using a survey methodology that collected 141 respondents’ information, researchers found that LGBTQ+ catalog users who responded were primarily young, educated, and identified as either Black or White. The majority of respondents reported regular use of the library catalog, though also found materials in a variety of other ways, including social media. When …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Biodiversity Of Philippine Marine Fishes: A Dna Barcode Reference Library Based On Voucher Specimens, Katherine E. Bemis, Matthew G. Girard, Mudjekeewis D. Santos, Kent E. Carpenter, Jonathan R. Deeds, Diane E. Pitassy, Nicko Amor L. Flores, Elizabeth S. Hunter, Amy C. Driskell, Kenneth S. Macdonald Iii, Lee A. Weigt, Jeffrey T. Williams Jan 2023

Biodiversity Of Philippine Marine Fishes: A Dna Barcode Reference Library Based On Voucher Specimens, Katherine E. Bemis, Matthew G. Girard, Mudjekeewis D. Santos, Kent E. Carpenter, Jonathan R. Deeds, Diane E. Pitassy, Nicko Amor L. Flores, Elizabeth S. Hunter, Amy C. Driskell, Kenneth S. Macdonald Iii, Lee A. Weigt, Jeffrey T. Williams

Biological Sciences Faculty Publications

Accurate identification of fishes is essential for understanding their biology and to ensure food safety for consumers. DNA barcoding is an important tool because it can verify identifications of both whole and processed fishes that have had key morphological characters removed (e.g., filets, fish meal); however, DNA reference libraries are incomplete, and public repositories for sequence data contain incorrectly identified sequences. During a nine-year sampling program in the Philippines, a global biodiversity hotspot for marine fishes, we developed a verified reference library of cytochrome c oxidase subunit I (COI) sequences for 2,525 specimens representing 984 species. Specimens were primarily purchased …


Liaising The Catalog: Collaborating Across Library Departments To Promote Successful Discoverability Through Enhanced Cataloging, Tammie Busch, Debbie Campbell, Susan Howell, Mary Konkel, Dennis Krieb, Mingyan Li, Cathy Mayer, Ross Taft Jan 2023

Liaising The Catalog: Collaborating Across Library Departments To Promote Successful Discoverability Through Enhanced Cataloging, Tammie Busch, Debbie Campbell, Susan Howell, Mary Konkel, Dennis Krieb, Mingyan Li, Cathy Mayer, Ross Taft

SIUE Faculty Research, Scholarship, and Creative Activity

Academic libraries are increasingly asked to articulate connections between the work of library staff and student success. This article discusses how a team of librarians participating in CARLI Counts, an immersive professional development program funded by a Laura Bush 21st Century Librarian Grant through the Institute of Museum and Library Services, responded to the lack of research investigating the indirect impact of the work of technical services staff on student learning. An anonymous online survey distributed to library staff of the Consortium of Academic and Research Libraries in Illinois (CARLI) member institutions explored the perceived value of enhanced cataloging in …


Library Security Management As A Predictor For Combating Book Theft And Vandalism Among Undergraduates In University Libraries In Ibadan, Oyo State, Nigeria., Oluwabukunmi Serah Oyelola, Temitope Daniel Onakoya, Tunde Idris Yusuf Jan 2023

Library Security Management As A Predictor For Combating Book Theft And Vandalism Among Undergraduates In University Libraries In Ibadan, Oyo State, Nigeria., Oluwabukunmi Serah Oyelola, Temitope Daniel Onakoya, Tunde Idris Yusuf

Library Philosophy and Practice (e-journal)

The study examined library security mechanisms as a predictor for combating book theft and vandalism among undergraduates in university libraries in Ibadan, Oyo state, Nigeria. The survey design was adopted in the study, the study population consisted 16,293 undergraduates from the University of Ibadan, Kola Daisi University and Lead City University. The systematic sampling with sampling fraction of 5% was used to select a sample of 353 undergraduates used in the study. The questionnaire was used for data collection and data collected were analysed using frequency counts, item analysis and Pearson’s Product Moment Correlation. The study revealed that the security …