Collaborative Workflows for Risk Management in Sharing Cultural Heritage Collections Online Short …
Collaborative Workflows for Risk Management in Sharing Cultural Heritage Collections Online
Short Description: Digitizing rare and unique historical documents so they can be shared online is mission-critical work for most cultural heritage institutions, but it can be difficult to complete this work, especially intellectual property rights management, at a scale that matches user demand. The authors of this open educational resource offer guidance for creating scalable, cross-functional workflows using a risk-management approach that increases efficiency and distributes responsibility for rights assessment work more equitably across stakeholders. It includes advice for navigating knowledge gaps, building an engaged team with the right skillsets, reimagining workflows, and rethinking traditional archival processing workflows to build capacity for rights analysis during arrangement and description. Each chapter includes a helpful exercise for implementing this guidance in your own institution.
Word Count: 28621
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This is a collection of all materials used in Health Information Technology …
This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.
Topics covered include:
Clinical Financial Records Evidence-Based Medicine e-Prescribing Patient Bedside Systems Telemedicine Health Information Networks Cryptography Accreditation HIPAA Privacy and Security
Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity …
Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and …
Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and …
Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and …
Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #2 for the course: CIS 356 - Fundamentals of Cybersecurity and …
Lecture #2 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
A libguide providing an overview of the aspects of OER, created by …
A libguide providing an overview of the aspects of OER, created by librarians at the University of Toronto Scarborough. This guide is meant to inform the user about Digital Pedagogy. It includes information on educational theory, a collection of case studies, and resources relevant to the study of digital pedagogy.
The intent of this OER is twofold: to offer a free or …
The intent of this OER is twofold: to offer a free or low cost quality text to our students in a one-unit information literacy course and to offer a starting place to anyone who wishes to develop their own class or OER. It is intentional that this text is not San Diego City College specific because the skills we teach in our LIBS 101, and are reflected in this OER, are transferable skills. This allows students to take what they learn here and apply it to any information need in any environment: academia, careers, life-long learning, bar bets, or what have you. It is not an attempt to be a comprehensive book on information literacy, but rather a brief overview in support of this one-unit class.
This collection brings together scholarship and pedagogy from multiple perspectives and disciplines, …
This collection brings together scholarship and pedagogy from multiple perspectives and disciplines, offering nuanced and complex perspectives on Information Literacy in the second decade of the 21st century. Taking as a starting point the concerns that prompted the Association of Research Libraries (ACRL) to review the Information Literacy Standards for Higher Education and develop the Framework for Information Literacy for Higher Education (2015), the chapters in this collection consider six frameworks that place students in the role of both consumer and producer of information within today's collaborative information environments. Contributors respond directly or indirectly to the work of the ACRL, providing a bridge between past/current knowledge and the future and advancing the notion that faculty, librarians, administrators, and external stakeholders share responsibility and accountability for the teaching, learning, and research of Information Literacy.
Good researchers have a host of tools at their disposal that make …
Good researchers have a host of tools at their disposal that make navigating today’s complex information ecosystem much more manageable. Gaining the knowledge, abilities, and self-reflection necessary to be a good researcher helps not only in academic settings, but is invaluable in any career, and throughout one’s life. The Information Literacy User’s Guide will start you on this route to success.The Information Literacy User’s Guide is based on two current models in information literacy: The 2011 version of The Seven Pillars Model, developed by the Society of College, National and University Libraries in the United Kingdom and the conception of information literacy as a metaliteracy, a model developed by one of this book’s authors in conjunction with Thomas Mackey, Dean of the Center for Distance Learning at SUNY Empire State College. These core foundations ensure that the material will be relevant to today’s students.The Information Literacy User’s Guide introduces students to critical concepts of information literacy as defined for the information-infused and technology-rich environment in which they find themselves. This book helps students examine their roles as information creators and sharers and enables them to more effectively deploy related skills. This textbook includes relatable case studies and scenarios, many hands-on exercises, and interactive quizzes.
This book is written as an introductory text, meant for those with …
This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a little bit technical, every effort has been made to convey the information essential to understanding a topic while not getting bogged down in detailed terminology or esoteric discussions.
This resource was created by Allison Kittinger, a library science master’s student …
This resource was created by Allison Kittinger, a library science master’s student at UNC-Chapel Hill, and Jennifer Solomon, an adjunct instructor at UNC-Chapel Hill. Allison and Jennifer are passionate about fostering bibliodiversity in scholarly communications and want to increase awareness of bibliodiversity among library science graduate students and early-career scholarly communications librarians. After engaging with this resource, learners will: gain an understanding of bibliodiversity, its urgency, and its importance; be able to articulate the concept of bibliodiversity in their own words/apply it in their work; and gain additional tools to apply DEI concepts in scholarly communications.
More background is available at https://lisoer.wordpress.ncsu.edu/2021/04/13/bibliodiversity-and-oer-a-student-perspective/.
This book acknowledges our changing information landscape, covering key concepts in information …
This book acknowledges our changing information landscape, covering key concepts in information literacy to support a research process with intention. We start by critically examining the online environment many of us already engage with every day, looking at algorithms, the attention economy, information disorder and cynicism, information hygiene, and fact-checking. We then move into an exploration of information source types, meaningful research topics, keyword choices, effective search strategies, library resources, Web search considerations, the ethical use of information, and citation.
Library and Information Science (LIS) is the academic and professional study of …
Library and Information Science (LIS) is the academic and professional study of how information and information carriers are produced, disseminated, discovered, evaluated, selected, acquired, used, organized, maintained, and managed. This book intends to introduce the reader to fundamental concerns and emerging conversations in the field of library and information science.
A secondary goal of this book is to introduce readers to prominent writers, articles, and books within the field of library science. The book originated as a collection of annotations of important LIS articles. Though these citations are being developed into a fuller text, we hope that this book remains firmly rooted in the literature of LIS and related fields, and helps direct readers toward important resources when a particular topic strikes their fancy.
Textbook overview Part 1: Introduction to data. Data structures, variables, summaries, graphics, …
Textbook overview Part 1: Introduction to data. Data structures, variables, summaries, graphics, and basic data collection and study design techniques. Part 2: Exploratory data analysis. Data visualization and summarization, with particular emphasis on multivariable relationships. Part 3: Regression modeling. Modeling numerical and categorical outcomes with linear and logistic regression and using model results to describe relationships and make predictions. Part 4: Foundations for inference. Case studies are used to introduce the ideas of statistical inference with randomization tests, bootstrap intervals, and mathematical models. Part 5: Statistical inference. Further details of statistical inference using randomization tests, bootstrap intervals, and mathematical models for numerical and categorical data. Part 6: Inferential modeling. Extending inference techniques presented thus-far to linear and logistic regression settings and evaluating model performance. Each part contains multiple chapters and ends with a case study. Building on the content covered in the part, the case study uses the tools and techniques to present a high-level overview.
With raised awareness and accessibility laws emerging around the world, understanding what …
With raised awareness and accessibility laws emerging around the world, understanding what inclusive access to the Web means is becoming necessary knowledge for anyone who produces digital content. Much of the current information on Web accessibility requires some technical understanding, and may be difficult to consume for the average person. The instruction here will “interpret” the W3C Web Content Accessibility Guidelines (WCAG 2.1), to make it easier to understand for a general audience. You will have an opportunity to experience barriers firsthand, then experience that content with the barriers removed, developing a practical understanding of web accessibility.
The aim of this practical guide is to introduce learning analytics to …
The aim of this practical guide is to introduce learning analytics to educators in higher education. To this end, we define learning analytics, provide some background to how learning analytics work, explore successful learning analytics implementations, and present findings from an exploratory study of perceptions of the users of learning analytics—educators, students, and advisors—of common metrics and visualizations from learning management system analytic tools at an Ontario university to provide a practical guide to learning analytics.
Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access …
Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.