Lifecycle Metadata for Digital Objects

Slides:



Advertisements
Similar presentations
Capacity Building Passing on the Experience Dr. Noha Adly World Digital Library Arab Peninsula Regional Group meeting.
Advertisements

Presentation by Priyanka Sawarkar
Fedora Users’ Conference Rutgers University May 14, 2005 Researching Fedora's Ability to Serve as a Preservation System for Electronic University Records.
4 1 4 C H A P T E R Software: Systems and Application Software.
1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Resource sharing  Assumptions  Considerations.
1 Enabling Secure Internet Access with ISA Server.
Security Guidelines and Management
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Exaquantum R2.50 Enhancements Issue b Copyright © Yokogawa Electric Corporation 25th March, 2009 Exaquantum R2.50 Enhancements.
Hands-On Microsoft Windows Server 2008
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Doing More with TeamTrack May 1, /17/2015 6:14 PM Goals and Objectives Increased Reuse of Critical Assets Increased Productivity and Effectiveness.
Security and Privacy Strategic Global Partners, LLC.
Science Archives in the 21st Century 25/26 April Towards an International standard for Audit and Certification of Digital Repositories David Giaretta.
World Data Center for Human Interactions in the Environment Needs Assessment for Managing and Preserving Geospatial Electronic Records: Preliminary Results.
1 Next Generation of Operational Earth Observations From the National Polar-Orbiting Operational Environmental Satellite System (NPOESS): Program Overview.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Lifecycle Metadata for Digital Objects November 22, 2004 Usage and Rights Management Metadata.
Database Administration COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
The Intranet.
CDMS news 1 OPACE 1.1 Expert Team on Climate Data Management (ET-CDMS) – Geneva November 2014 – Denis Stuber CliSys  Indonesia  Luxembourg  Bangladesh.
DRAFT EDMC Procedural Directives NOAA Environmental Data Management Committee 12/3/2015 1
Workshop 2 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Module 12: Configuring and Managing Storage Technologies
NDSR Boston webinar: Provide module Presenter: Nancy Y McGovern December 2015.
11 Researcher practice in data management Margaret Henty.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
Providing access to your data: Determining your audience Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Library Efforts and IT Infrastructure Services Paul Conway & Mike Pickett Duke University
Lifecycle Metadata for Digital Objects With an emphasis on preservation…
Because good research needs good data The DCC lifecycle model, Exeter Uni, May 2011 Funded by: The Digital Curation Lifecycle Model Joy Davidson.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Chapter 21 Successfully Implementing The Information System.
Information Technology Acceptable Use An Overview
Digital Repository Certification Schema A Pathway for Implementing the GEO Data Sharing and Data Management Principles Robert R. Downs, PhD Sr. Digital.
The Intranet.
Working at a Small-to-Medium Business or ISP – Chapter 8
Discovering Computers 2010: Living in a Digital World Chapter 14
Alina Oprea Associate Professor, CCIS Northeastern University
CONNECTING TO THE INTERNET
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Information Systems.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Types of information systems in organizations and its characteristics
Archives & DAM Alice V. de S. Cameron, Northwestern University.
THE STEPS TO MANAGE THE GRID
Flexible Extensible Digital Object Repository Architecture
Flexible Extensible Digital Object Repository Architecture
Value in a digital environment
OPERATING SYSTEM OVERVIEW
Copyright © 2017 IP CGE Risk Management Solutions B.V.
Securely run and grow your business with Microsoft 365 Business
Rhodes Digital Commons: Raising the visibility of your research Research Week. 12th May 2017 Khawulile Radebe: Librarian: Repository & Metadata Debbie.
Network management system
Reactive Android Development
ISMS Information Security Management System
Reactive Android Development
How to Design and Implement Research Outputs Repositories
Research Data Management
5 November, 2018 Nuku’alofa, Tonga
Open Archival Information System
Robin Dale RLG OAIS Functionality Robin Dale RLG
Chapter 2 Review.
Access Control and Site Security
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Lifecycle Metadata for Digital Objects November 6, 2002 Usage Metadata

What is Usage Metadata? Internal users (with respect to the creator External users (with respect to the creator) Internal users (with respect to the repository) External users (with respect to the repository

Creator Usage The creator’s actual use of the object Version control The creator’s colleagues’ use of the object Object function Object used for reference, model The creator’s customers’ use of the object Object function: mediates relationship

Repository Usage Management usage Designated user community Object maintenance and preservation Object analysis Designated user community Object viewing Object acquisition

Why and whether track usage I (external) Observe what individuals use Library/archives ethics The law (FBI access—but thwarted by mere IP addresses in logs) Serve users better Who Designated user community Everyone How Give ‘em what they want Adjustments to acquisition policies, schedules Adjustments to preservation policies, schedules

Why and whether II (internal) Manage the repository Expansion of capacity More efficient use of capacity Protect the repository Detect malicious intrusions Detect suspicious activity Manage dissemination better Manage objects better in the repository Monitor user trends for storage management Monitor user trends for preservation management

So is this metadata? Some of this log material is metadata with respect to the objects being managed Popular objects will get fat Popularity and selection may define new classes of “archival bond” and hence new metadata for objects Some of it is data with respect to the management task

How to track usage The system can do it for you OPACs Web server logs Firewall logs Depends on what the logs track and how deeply they identify individual resources