Mobile technologies to support field research Wayne Johnston Head, Research Enterprise and Scholarly Communication University of Guelph Library

Slides:



Advertisements
Similar presentations
Mobile Phone Jamming A Brief Overview by Robert Maine and Robert Cochrane.
Advertisements

Chapter 9: Customer Service via Technology
April 10, 2002 Aelix, Inc Corbin Avenue Northridge, CA Tel Fax OmniReach sm Capabilities & Opportunities.
Centennial College Libraries Infection Control Fall 2012.
A DTC Virtual Tour Presented by: Celani Dominguez, Ph.D. DTC, Southwest ISD Oh! the places you will go!
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 107.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 75.
September, 2005What IHE Delivers 1 Retrieve Form for Data Capture (RFD) Interoperability Showcase World of Health IT Didi Davis, Director IHE/HIMSS Courtesy.
Evaluating journals in DOAJ Examples and problems 6 February Sonja Brage Lund University Libraries, Head Office.
1 Secure Online Presence Savio Fernandes
The Mobile Channel, TCPA and Privacy NCHELP New Orleans January 19, 2012 Mercedes Kelley Tunstall Of Counsel ballardspahr.com Jerod.
E-Books and Kindles and Nooks - Oh, My! A Beginning Look at e-Books, e-Readers & Libraries Pam Goucher, School Library Technology Planning Coordinator.
The Future of Scholarship in the Digital Age: The Role of Institutional Repositories Ann J. Wolpert Director of Libraries Massachusetts Institute of Technology.
Developing a business plan
Purchasing a Car Elizabeth Appelbaum, Ph.D. Your Computer Can Help SenCom Talk, March 21,
YOU ARE LOOKING AT Saadhvi PRESENTATION TOPIC Saadhvi - The Empire of Innovative Technology WE ARE CURRENTLY ON Enterprise Business Solution.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Mobile Devices in the DoD
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool.
Dr Adele Botha MOBI4D: a Multi-channel e- Government Mobile Service Delivery Platform Date: 22/10/2013.
1 Overview Background Goals Methodology Participants Findings Recommendations.
Tobie Barb. A few important quotes: A hollow strand of glass or plastic no thicker than a human hair Provides a high bandwidth alternative to copper wire.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
The World in Their Pocket A Mobile Computing & Digital Mapping Revolution Nick Jones JONES CONSULTING Fall 2011.
05/07/2008kbele/cs5251 Study of Tools & Utilities in Mobile Application By Kunal Bele.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Little Big Brains: Mobile Application Production by: Jose, Francis, Xuong.
UCL LIBRARY SERVICES Opening up research content in the NHS Dr Paul Ayris Director of UCL Library Services and UCL Copyright Officer President of LIBER.
BEST 2014 BEST special topic 2013 Ticket media Kjetil Vrenne, BEST Project Manager 2014.
Források
15. Oktober Oktober Oktober 2012.
New Release Announcements and Product Roadmap Chris DiPierro, Director of Software Development April 9-11, 2014
A BRIEF TOUR OF EDGAR & SEC.GOV How to Find: Company Filings Filing Forms Rules & Comments Abigail H. Tilden GSLIS 786 October 17, 2007.
The American Libraries Association theme for this year: Create your own your library Enjoy with music by placing your favorite CD in the drive…
Dominion Virginia Power Near Miss Library ________________________________ A Briefing for National Electrical Workers Near Miss System Jake J. Mazulewicz,
We are learning how to read the 24 hour clock
Anna Szot-Sacawa University of Toronto Bora Laskin Law Library TABLETS USE IN LIBRARIES OCUL webinar October 11, 2012 Bridging the physical & digital worlds.
UKOLN is supported by: Using Blogs Effectively Within Your Organisation: Introduction A Half-Day Workshop Brian Kelly UKOLN University of Bath Bath, UK.
1 iPods and iPads - The Possibilities Handheld Learning in the Classroom.
QR Codes What are They? How Can They Be Use in the Library Setting? Joanne Christensen 11/12.
Resources Presentation By: Wayne Waggoner, NFSA. Resources Residential Fire Sprinklers - Step By Step a Communities Approach Residential Fire Sprinklers.
SIMOCODE-DP Software.
The Credit Union League of Connecticut League InfoSight Orientation August 21, 2012 Alan L. Darbe, Product Manager.
Why I Should Hire You Managing your career in Software Testing.
New Mexico Broadband Program Internet Tools for Small Business Success Module 5 E-Newsletters.
Does Web 2.0 Prepare us for Library3.0? By Carike Schoeman.
What is Internet Safety? Deputy Glenn Hoffman St. Lucie County Sheriff’s Office Crime Prevention Unit
Highlights From the Survey on the Use of Funds Under Title II, Part A
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Online Shopping Self-Defense
Alpha Five User Group, Bill Parker, Web Publishing - Session 1, April 2008 Web Publishing with Alpha Five Session 1.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Mobile phone based environment control/security system Christopher Carroll B.E. Electronic and Computer Engineering.
School Management Software
Wayne Johnston Head, Research Enterprise and Scholarly Communication University of Guelph Library Mobile Technology Support for Field.
Electronic Laboratory Notebook
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Use flash eBook software AnyFlip to make page flip book works seamlessly on mobile devices.
Cybersecurity Test Review Introduction to Digital Technology.
Find Cheap Samsung S7 Wallet Case
Microsoft Azure Meets the Demand for Medical Media Storage and Integration in the Cloud MINI-CASE STUDY “Microsoft Azure offers the robust features and.
Cloud Helps Company Scale to Demand for Growing Healthcare Provider Field MINI-CASE STUDY “Microsoft Azure gives us the opportunity to focus on the task.
Electronic Communication and the Internet
Presentation transcript:

Mobile technologies to support field research Wayne Johnston Head, Research Enterprise and Scholarly Communication University of Guelph Library

Researcher interviews and shadowing field environment data collection practices data storage use of mobile devices data management upon return

Researcher interviews/shadowing

Researcher interviews/shadowing

Researcher interviews/shadowing

Current practices

Physical damage

Security: theft, loss, hacking

Protecting your identity

Protecting your data, data encryption

Data collection via apps

Data collection via web form

Data collection via DBMS

doi: /j.compag Data collection via SMS

Data storage

Specialist devices

Mobile electronic laboratory notebooks (ELNs)

Support strategies develop knowledge base for recommendations and support develop project-specific solutions offer enterprise solutions

Mobile technologies to support field research Wayne Johnston Head, Research Enterprise and Scholarly Communication University of Guelph Library