SlideShare una empresa de Scribd logo
1 de 15
Discovery & Access Gretchen Gueguen University of Virginia
What is Discovery & Access Discovery and Accessrefers to the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users. 
Access in Action Query Dissemination Request D&A System User Data Query Query response DIP Query response DIP request DIP dissemination AIP request Archival Storage DIP Generation AIP dissemination
Goals of D&A ,[object Object]
find out about material
understand whether it is available
access it
To apply appropriate access restrictions in order to protect private and sensitive information as well as intellectual property.
To provide access to material in a format and/or environment that presents the original’s significant properties.,[object Object]
Discovery
Access… ,[object Object]
What format is the material?
What are the restrictions?
What tools or infrastructure is available? ,[object Object]
Authenticated or Not  (A, N)

Más contenido relacionado

Destacado

Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Seth Shaw
 
AIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS_Archives
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS_Archives
 
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS_Archives
 
AIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS_Archives
 
AIMS workshop: Introduction
AIMS workshop: IntroductionAIMS workshop: Introduction
AIMS workshop: IntroductionAIMS_Archives
 
AIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS_Archives
 
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS_Archives
 

Destacado (9)

Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
 
AIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning Evolution
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
 
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
 
AIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: Accessioning
 
AIMS workshop: Introduction
AIMS workshop: IntroductionAIMS workshop: Introduction
AIMS workshop: Introduction
 
AIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection Development
 
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
 
Making the Case for Tablets in your Library
Making the Case for Tablets in your LibraryMaking the Case for Tablets in your Library
Making the Case for Tablets in your Library
 

Similar a Discovery and access systems

2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorialJosh Young
 
Towards a digital library for York
Towards a digital library for YorkTowards a digital library for York
Towards a digital library for YorkJulie Allinson
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationMANENDRASINGH30
 
Introducing Dspace @ ILRI
Introducing Dspace @ ILRIIntroducing Dspace @ ILRI
Introducing Dspace @ ILRIILRI
 
Data management plans
Data management plansData management plans
Data management plansBrad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
AfA - Liddy Nevile
AfA  - Liddy NevileAfA  - Liddy Nevile
AfA - Liddy Nevileozewai
 
Data Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryData Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryAnita de Waard
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeDalal Rahme
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011DLFCLIR
 
Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...GarethKnight
 
Saa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesSaa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesAIMS_Archives
 
Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Artificial Intelligence Institute at UofSC
 
D paul ecn2013
D paul ecn2013D paul ecn2013
D paul ecn2013ECNOfficer
 
Data Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumData Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumMerce Crosas
 
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...WiLS
 

Similar a Discovery and access systems (20)

2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial
 
Towards a digital library for York
Towards a digital library for YorkTowards a digital library for York
Towards a digital library for York
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
Introducing Dspace @ ILRI
Introducing Dspace @ ILRIIntroducing Dspace @ ILRI
Introducing Dspace @ ILRI
 
Data management plans
Data management plansData management plans
Data management plans
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
AfA - Liddy Nevile
AfA  - Liddy NevileAfA  - Liddy Nevile
AfA - Liddy Nevile
 
Data Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryData Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost Recovery
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011
 
Electronic Records
Electronic RecordsElectronic Records
Electronic Records
 
Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...
 
Saa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesSaa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting Repositories
 
Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...
 
D paul ecn2013
D paul ecn2013D paul ecn2013
D paul ecn2013
 
Digital Curation 101 - Taster
Digital Curation 101 - TasterDigital Curation 101 - Taster
Digital Curation 101 - Taster
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
Data Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumData Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access Symposium
 
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Discovery and access systems

  • 1. Discovery & Access Gretchen Gueguen University of Virginia
  • 2. What is Discovery & Access Discovery and Accessrefers to the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users. 
  • 3. Access in Action Query Dissemination Request D&A System User Data Query Query response DIP Query response DIP request DIP dissemination AIP request Archival Storage DIP Generation AIP dissemination
  • 4.
  • 5. find out about material
  • 6. understand whether it is available
  • 8. To apply appropriate access restrictions in order to protect private and sensitive information as well as intellectual property.
  • 9.
  • 11.
  • 12. What format is the material?
  • 13. What are the restrictions?
  • 14.
  • 16. Online (email, download) vs. "Physical" (disc) Transfer (O, P)
  • 17.
  • 18. Access Models RAOS(Remote, Authenticated, Online, Static) Institutional Respository with institutional login gain access INPD(In-person, Non-Authenticated, Physical, Dynamic) Researcher is handed a disc in the reading room with files specifically downloaded for them RNPD(Remote, Non-Authenticated, Physical, Dynamic)   Researcher contacts the archive and is sent a disk of files migrated to pdf especially for them. IAOS(In-person, Authenticated, Online, Static) Researcher requests access and once granted visits reading room to access a specific repository of files
  • 23. Discussion Read through the scenario given to your table group and come up with a plan addressing: How you will survey the content Copyright and privacy issues Acquiring the content Arranging and describing the content How you might provide access *this activity used with the permission of Matt Kirschenbaum and Naomi Nelson under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. http://creativecommons.org/licenses/by-nc-nd/3.0/us/

Notas del editor

  1. We now come to the last section of the AIMS framework: discovery and access. We’ve described this function for the purposes of the framework as “the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users.”Discovery and access is also not possible without completion of many of the prior steps described in this model. The outcomes of those steps have a significant impact on what is either appropriate or achievable in terms of discovery and access. Given the impact of these prior steps on discovery and access it is crucial to consider the desired outcomes for discovery and access as early as possible — ideally during the Collection Development phase — and to continue to update and revise these plans are work on the collection progresses.
  2. Discovery and access is also the only one of the functions that is really reactionary to a user request. The process of discovery and access requires some action on the part of individual users – for example carrying out a search. While we can and should create an accessible environment before users try to access material, many part of the process rely on them to initiate actions.This diagram is based on a figure from the OAIS model that describes the functions an archival information system should be able to support related to access. The user initiates the process by either making a query (or a search of metadata) or by making a dissemination request (or a request for the DIP)
  3. Overall though, we have three major goals in discovery and access.The first is to make material available to user communities. This includes ensuring that the users can find the material, understand if it’s available, and get access to it if possibleHowever, that access must follow guidelines for access restrictions related to privacy, and intellectual property.An overarching goal of all three is to ensure that the significant properties of the material are inherent in whichever form the DIP takes.
  4. To successfully achieve these goals, we have to first start with discovery. We identified two major types of discovery for the AIMS framework. The first is discovery via metadata, in the case shown here that is a collection guide.When you are creating metadata for access you have to consider whether or not the metadata is this suitable for discovery? This may be different than creating metadata for administrative or preservation purposes. Another important consideration is how the metadata is indexed and searched. Will that suit the level of access needed by the user audience?Most of us are pretty familiar with this concept so I’ll move on. 
  5. With born-digital materials we can also consider access to full text or content where it exists in searchable form. [click]When you are providing access in a system that can provision access to both metadata and full-text at the same time you may consider creating less metadata, or creating a different kind of metadata, or treating the index of full text differently than the index of metadata.
  6. The other component is the access itself. While your discovery method may involve the text, that doesn’t mean you have to make the full-text itself available (think of Google snippets for example).The AIMS framework highlights a few questions to examine when thinking about how to provision access.Who are the "typical users"?What format is the material?What are the restrictions?What tools or infrastructure is available? These questions then lead to thinking about the generic access model
  7. These questions then lead to thinking about the generic access model, which has several characteristics:In-person vs. Remote access (I, R)In-person means the research comes to the reading room to use the files, remote means they do not (this does not necessarily mean online access)Authenticatedor Not  (A, N)Authenticated or not refers to whether or not the user has to show some kind of credential to see the material. Typically this is only an issue for online accessOnline (email, download) vs. "Physical" (disc) Transfer (O, P)Online access means the files are transmitted online via email, download or viewing on a website. Physical means the researcher is handed or mailed a diskStatic vs. Dynamic DIP Generation (S, D)Static DIP Generation means that a pre-fabricated DIP is stored … think of the pdf versions of articles in Institutional Repositories. Whereas, Dynamic DIP Generation just means that the DIP is created specfically for the user per their request…so they may want migrated files or not, for example. The combination of these characteristics then articulates the generic type of access you would be allowing to content. That doesn’t mean that this is the ONLY way you would provide access just that this would be your default option. You may change it based on the user, their request, or as your technological capabilities evolve.
  8. The combination of these characteristics then articulates the generic type of access you would be allowing to content. That doesn’t mean that this is the ONLY way you would provide access just that this would be your default option. You may change it based on the user, their request, or as your technological capabilities evolve.Now not all of these combinations are possible, or even sensible, but thinking of the them as distinct parameters helps to think through the possibilities
  9. So here are a couple of examples:Remote, Authenticated, Onlineand Static would be typified by an online database that is behind a loginWhereas In-person, non-authenticated, physical, and dynamic would be a model where a person must come to the reading room and be handed a disc created with the specific material they requested.Remote, Non-Authenticated, Physical, Dynamic could still have an online component if the researcher contacts the archive via email, but the transfer of material itself is done on a disc that is mailed to themFinally, In-person, Authenticated, Online, Static is somewhat implausible, but a researcher would have to physically visit the reading AND get some sort of permission to access a specific repository of files, locked down by IP for instance
  10. So, when we combine a mode of discovery with an access option we see the full discovery and access model in practice. This image is of a researcher using the Salman Rushdie collection at Emory University. Although a large portion of the collection is born-digital, the researcher must physically come to the reading and use a specific computer with Rushdie’s emulated computer as well as a repository of his files, the text of which can be searched. They may not download or be emailed the material.
  11. This example comes from my former employer ECU. In this case we have a collection guide with digitized and born digital material embedded within. In this case the full text, if it exists, is not searched through the finding aid search (although it can be searched in a separate repository search) 
  12. Finally, this is the planned interface for born-digital materials at the Bodleian Library in the UK. They are creating a repository to search the content and metadata of the born-digital materials held in personal papers. The access here is primarily through the repository, although there are also links out to objects in this repository through the collection guide.
  13. So at this time, I’d like to introduce Erin O’Meara from the University of North Carolina at Chapel Hill. Erin is going to talk with us about how UNC is dealing with discovery and access to hybrid collections within EAD.