Trustworthy Policies for Distributed Repositories

Trustworthy Policies for Distributed Repositories
Author: Reagan W. Moore,Hao XU,Mike Conway,Arcot Rajasekar,Jon Crabtree
Publsiher: Springer Nature
Total Pages: 133
Release: 2022-05-31
Genre: Computers
ISBN: 9783031023033

Download Trustworthy Policies for Distributed Repositories Book in PDF, Epub and Kindle

A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly. The assurance includes plans for the sustainability of the repository, the accession of digital records, the management of technology evolution, and the mitigation of the risk of data loss. A detailed assessment is provided by the ISO-16363:2012 standard, "Space data and information transfer systems—Audit and certification of trustworthy digital repositories." This book examines whether the ISO specification for trustworthiness can be enforced by computer actionable policies. An implementation of the policies is provided and the policies are sorted into categories for procedures to manage externally generated documents, specify repository parameters, specify preservation metadata attributes, specify audit mechanisms for all preservation actions, specify control of preservation operations, and control preservation properties as technology evolves. An application of the resulting procedures is made to enforce trustworthiness within National Science Foundation data management plans.

Trustworthy Policies for Distributed Repositories

Trustworthy Policies for Distributed Repositories
Author: Reagan W. Moore
Publsiher: Unknown
Total Pages: 0
Release: 2016
Genre: Digital libraries
ISBN: OCLC:1066426878

Download Trustworthy Policies for Distributed Repositories Book in PDF, Epub and Kindle

Trustworthy Communications and Complete Genealogies

Trustworthy Communications and Complete Genealogies
Author: Reagan W. Moore
Publsiher: Springer Nature
Total Pages: 173
Release: 2023-01-01
Genre: Computers
ISBN: 9783031168369

Download Trustworthy Communications and Complete Genealogies Book in PDF, Epub and Kindle

This book discusses how a genealogical history of the modern world can be created by linking the Royal Families of Western Europeans database to Unifying Ancestry. This new edition extends the original analysis by including a coherence metric to evaluate the content of the Unifying Ancestry database, which is freely available online educational software within the CoreGen3 analysis workbench. The author discusses why common ancestors of the Royal Families of Western Europe comprise an optimal Unifying Ancestry experience and further illustrates this by using historically influential people as examples. Specifically, algorithms for validating the Unifying Ancestry are applied to a 330,000-person Research Genealogy and then used to link to historical royal descendants. Genealogical evaluation properties for consistency, correctness, closure, connectivity, completeness and coherence are demonstrated. These properties are applied to a Research Genealogy to generate a unifying ancestry for western Europeans. The unifying ancestry is then used to create a genealogical history of the modern world. All the analyses can be reproduced by readers using the Unifying Ancestry CoreGen3 program.

Automatic Disambiguation of Author Names in Bibliographic Repositories

Automatic Disambiguation of Author Names in Bibliographic Repositories
Author: Anderson A. Ferreira,Marcos André Gonçalves,Alberto H. F. Laender
Publsiher: Springer Nature
Total Pages: 126
Release: 2022-06-01
Genre: Computers
ISBN: 9783031023224

Download Automatic Disambiguation of Author Names in Bibliographic Repositories Book in PDF, Epub and Kindle

This book deals with a hard problem that is inherent to human language: ambiguity. In particular, we focus on author name ambiguity, a type of ambiguity that exists in digital bibliographic repositories, which occurs when an author publishes works under distinct names or distinct authors publish works under similar names. This problem may be caused by a number of reasons, including the lack of standards and common practices, and the decentralized generation of bibliographic content. As a consequence, the quality of the main services of digital bibliographic repositories such as search, browsing, and recommendation may be severely affected by author name ambiguity. The focal point of the book is on automatic methods, since manual solutions do not scale to the size of the current repositories or the speed in which they are updated. Accordingly, we provide an ample view on the problem of automatic disambiguation of author names, summarizing the results of more than a decade of research on this topic conducted by our group, which were reported in more than a dozen publications that received over 900 citations so far, according to Google Scholar. We start by discussing its motivational issues (Chapter 1). Next, we formally define the author name disambiguation task (Chapter 2) and use this formalization to provide a brief, taxonomically organized, overview of the literature on the topic (Chapter 3). We then organize, summarize and integrate the efforts of our own group on developing solutions for the problem that have historically produced state-of-the-art (by the time of their proposals) results in terms of the quality of the disambiguation results. Thus, Chapter 4 covers HHC - Heuristic-based Clustering, an author name disambiguation method that is based on two specific real-world assumptions regarding scientific authorship. Then, Chapter 5 describes SAND - Self-training Author Name Disambiguator and Chapter 6 presents two incremental author name disambiguation methods, namely INDi - Incremental Unsupervised Name Disambiguation and INC- Incremental Nearest Cluster. Finally, Chapter 7 provides an overview of recent author name disambiguation methods that address new specific approaches such as graph-based representations, alternative predefined similarity functions, visualization facilities and approaches based on artificial neural networks. The chapters are followed by three appendices that cover, respectively: (i) a pattern matching function for comparing proper names and used by some of the methods addressed in this book; (ii) a tool for generating synthetic collections of citation records for distinct experimental tasks; and (iii) a number of datasets commonly used to evaluate author name disambiguation methods. In summary, the book organizes a large body of knowledge and work in the area of author name disambiguation in the last decade, hoping to consolidate a solid basis for future developments in the field.

Safety and Security of Cyber Physical Systems

Safety and Security of Cyber Physical Systems
Author: Frank J. Furrer
Publsiher: Springer Nature
Total Pages: 559
Release: 2022-07-20
Genre: Computers
ISBN: 9783658371821

Download Safety and Security of Cyber Physical Systems Book in PDF, Epub and Kindle

Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.

Information Architecture

Information Architecture
Author: Wei Ding,Xia Lin,Michael Zarro
Publsiher: Springer Nature
Total Pages: 164
Release: 2022-06-01
Genre: Computers
ISBN: 9783031023088

Download Information Architecture Book in PDF, Epub and Kindle

Information Architecture is about organizing and simplifying information, designing and integrating information spaces/systems, and creating ways for people to find and interact with information content. Its goal is to help people understand and manage information and make the right decisions accordingly. This updated and revised edition of the book looks at integrated information spaces in the web context and beyond, with a focus on putting theories and principles into practice. In the ever-changing social, organizational, and technological contexts, information architects not only design individual information spaces (e.g., websites, software applications, and mobile devices), but also tackle strategic aggregation and integration of multiple information spaces across websites, channels, modalities, and platforms. Not only do they create predetermined navigation pathways, but they also provide tools and rules for people to organize information on their own and get connected with others. Information architects work with multi-disciplinary teams to determine the user experience strategy based on user needs and business goals, and make sure the strategy gets carried out by following the user-centered design (UCD) process via close collaboration with others. Drawing on the authors’ extensive experience as HCI researchers, User Experience Design practitioners, and Information Architecture instructors, this book provides a balanced view of the IA discipline by applying theories, design principles, and guidelines to IA and UX practices. It also covers advanced topics such as iterative design, UX decision support, and global and mobile IA considerations. Major revisions include moving away from a web-centric view toward multi-channel, multi-device experiences. Concepts such as responsive design, emerging design principles, and user-centered methods such as Agile, Lean UX, and Design Thinking are discussed and related to IA processes and practices.

Quantifying Research Integrity

Quantifying Research Integrity
Author: Michael Seadle
Publsiher: Springer Nature
Total Pages: 121
Release: 2022-05-31
Genre: Computers
ISBN: 9783031023064

Download Quantifying Research Integrity Book in PDF, Epub and Kindle

Institutions typically treat research integrity violations as black and white, right or wrong. The result is that the wide range of grayscale nuances that separate accident, carelessness, and bad practice from deliberate fraud and malpractice often get lost. This lecture looks at how to quantify the grayscale range in three kinds of research integrity violations: plagiarism, data falsification, and image manipulation. Quantification works best with plagiarism, because the essential one-to-one matching algorithms are well known and established tools for detecting when matches exist. Questions remain, however, of how many matching words of what kind in what location in which discipline constitute reasonable suspicion of fraudulent intent. Different disciplines take different perspectives on quantity and location. Quantification is harder with data falsification, because the original data are often not available, and because experimental replication remains surprisingly difficult. The same is true with image manipulation, where tools exist for detecting certain kinds of manipulations, but where the tools are also easily defeated. This lecture looks at how to prevent violations of research integrity from a pragmatic viewpoint, and at what steps can institutions and publishers take to discourage problems beyond the usual ethical admonitions. There are no simple answers, but two measures can help: the systematic use of detection tools and requiring original data and images. These alone do not suffice, but they represent a start. The scholarly community needs a better awareness of the complexity of research integrity decisions. Only an open and wide-spread international discussion can bring about a consensus on where the boundary lines are and when grayscale problems shade into black. One goal of this work is to move that discussion forward.

Incidental Exposure to Online News

Incidental Exposure to Online News
Author: Borchuluun Yadamsuren,Sanda Erdelez
Publsiher: Springer Nature
Total Pages: 73
Release: 2022-05-31
Genre: Computers
ISBN: 9783031023057

Download Incidental Exposure to Online News Book in PDF, Epub and Kindle

Rapid technological changes and availability of news anywhere and at any moment have changed how people seek out news. Increasingly, consumers no longer take deliberate actions to read the news, instead stumbling upon news online. While the emergence of serendipitous news discovery online has been recognized in the literature, there is a limited understanding about how people experience this behavior. Based on the mixed method study that investigated online news reading behavior of residents in a Midwestern U.S. town, we explore how people accidentally discover news when engaged in various online activities. Employing the grounded theory approach, we define Incidental Exposure to Online News (IEON) as individual's memorable experiences of chance encounters with interesting, useful, or surprising news while using the Internet for news browsing or for non-news-related online activities, such as checking email or visiting social networking sites. The book presents a conceptual framework of IEON that advances research and an understanding of serendipitous news discovery from people's holistic experiences of news consumption in their everyday lives. The proposed IEON Process Model identifies key steps in an IEON experience that could help news reporters and developers of online news platforms create innovative storytelling and design strategies to catch consumers' attention during their online activities. Finally, this book raises important methodological questions for further investigation: how should serendipitous news discovery be studied, measured, and observed, and what are the essential elements that differentiate this behavior from other types of online news consumption and information behaviors?