Pub Date : 2021-01-01DOI: 10.11648/j.ajist.20210504.15
Zhixian Yi, H. Nie, C. Dong, Jianhua Jiang, Fu Su, Zhenghui Wang, Haibo Wang, Hekun Zeng
{"title":"Big Data and Data Science Education in Traditional Chinese Medicine Informatics: Challenges and Opportunities","authors":"Zhixian Yi, H. Nie, C. Dong, Jianhua Jiang, Fu Su, Zhenghui Wang, Haibo Wang, Hekun Zeng","doi":"10.11648/j.ajist.20210504.15","DOIUrl":"https://doi.org/10.11648/j.ajist.20210504.15","url":null,"abstract":"","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81589994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-03DOI: 10.11648/J.AJIST.20190304.12
Mohammed Abubakar Dukku, Andrew Temboge
The study investigated the awareness and use of library catalogue for accessing information resources by users of Federal University of Kashere (FUK) Library. Four research questions guided the study. Survey research design was used, registered users of the University Library between 2016-2019 numbering 920 formed the population of the study where a sample of 272 (30% sample) was used based on 95% confidence level and 5% confidence interval of Sample Size Calculator. The instrument used for data collection was questionnaire. Data generated was analyzed using simple percentage and descriptive statistics. The findings of the study revealed that majority of the respondents were aware of library catalogue existence; they were more informed about card catalogue usage than OPAC for retrieving information resources. In effect, the respondents use card catalogue regularly compared to the OPAC. Majority of the respondents used the library for research work rather than for leisure and recreational purposes. Poor computer skills hindering navigation when searching OPAC and inability to locate materials on the shelves, indicated in the catalogue as being available were the challenges affecting the use of catalogue as an information retrieval tools. The study recommended that the library management should organize a periodic user education, orientation and sensitization programmes for the undergraduate users to create awareness and enable them gain the needed skills to use the library catalogue maximally when searching for information resources. Guidelines on how to use catalogue and library in general should be prepared and issued to registered users. Regular shelf reading should be done so as to establish right contact between library users and library materials.
{"title":"Users Attitude Towards the Use of Library Catalogue in Federal University of Kashere Library in Gombe State, Nigeria","authors":"Mohammed Abubakar Dukku, Andrew Temboge","doi":"10.11648/J.AJIST.20190304.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190304.12","url":null,"abstract":"The study investigated the awareness and use of library catalogue for accessing information resources by users of Federal University of Kashere (FUK) Library. Four research questions guided the study. Survey research design was used, registered users of the University Library between 2016-2019 numbering 920 formed the population of the study where a sample of 272 (30% sample) was used based on 95% confidence level and 5% confidence interval of Sample Size Calculator. The instrument used for data collection was questionnaire. Data generated was analyzed using simple percentage and descriptive statistics. The findings of the study revealed that majority of the respondents were aware of library catalogue existence; they were more informed about card catalogue usage than OPAC for retrieving information resources. In effect, the respondents use card catalogue regularly compared to the OPAC. Majority of the respondents used the library for research work rather than for leisure and recreational purposes. Poor computer skills hindering navigation when searching OPAC and inability to locate materials on the shelves, indicated in the catalogue as being available were the challenges affecting the use of catalogue as an information retrieval tools. The study recommended that the library management should organize a periodic user education, orientation and sensitization programmes for the undergraduate users to create awareness and enable them gain the needed skills to use the library catalogue maximally when searching for information resources. Guidelines on how to use catalogue and library in general should be prepared and issued to registered users. Regular shelf reading should be done so as to establish right contact between library users and library materials.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78984717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-15DOI: 10.11648/J.AJIST.20190304.11
M. Gelfand
This article, based on both historical and content analysis of Albert Einstein’s private library, presents a comprehensive picture of the Einstein Collection that was located at his home in Princeton, now housed at The Albert Einstein Archives at The Hebrew University of Jerusalem. His private library consisted of approximately 2,400 titles, including not only books but also a small collection of journals, musical scores and records. Staff members of the Archive succeeded in adding additional books, including works by Einstein himself and ones about him in various languages. These amounted to approximately 1,500 titles. Most of the books in Einstein’s library related to subjects other than physics. Many authors presented copies of their books to Einstein. Those books, usually with autographs or dedications by the authors, dealt with various fields of knowledge – philosophy, literature, religions, Jewish culture, etc. Content analysis of Einstein’s personal library reveals scientific, political, and social connections of the scientist. This article includes information about the main institutions involved in conveying the library to Jerusalem and in organizing it. These were the American Friends of The Hebrew University in New York, the Japan Broadcasting Corporation, and the Jewish National and University Library (today The National Library of Israel). The primary sources for the research on which this article is based are 1) material from The Albert Einstein Archives at The Hebrew University of Jerusalem, 2) Inventory Books of the National Library of Israel, 3) Kiryat Sefer, bibliographical quarterly of the Jewish National and University Library, 4) Einstein’s reprint collection at The Weizmann Institute of Science. The following conclusions were drawn: 1) From the Einstein private library items were given as gifts both during his lifetime and after his death; 2) a large proportion of the books that Einstein gave to the National Library of Israel were registered in the Inventory Books of the National Library of Israel before the transfer of his complete library to Jerusalem; 3) Einstein's personal library includes books that actually belonged to other members of his family. For example, there are books, like those that belonged to his secretary Helen Dukas and to his stepdaughter Margot Einstein, that contain either the signature of the former owner or autograph/dedication by the author of the book. The article’s references to the contemporary Israeli press about Einstein’s visit to Israel elucidate Einstein’s role in the founding of The Hebrew University of Jerusalem.
{"title":"Albert Einstein Library: From Princeton to Jerusalem","authors":"M. Gelfand","doi":"10.11648/J.AJIST.20190304.11","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190304.11","url":null,"abstract":"This article, based on both historical and content analysis of Albert Einstein’s private library, presents a comprehensive picture of the Einstein Collection that was located at his home in Princeton, now housed at The Albert Einstein Archives at The Hebrew University of Jerusalem. His private library consisted of approximately 2,400 titles, including not only books but also a small collection of journals, musical scores and records. Staff members of the Archive succeeded in adding additional books, including works by Einstein himself and ones about him in various languages. These amounted to approximately 1,500 titles. Most of the books in Einstein’s library related to subjects other than physics. Many authors presented copies of their books to Einstein. Those books, usually with autographs or dedications by the authors, dealt with various fields of knowledge – philosophy, literature, religions, Jewish culture, etc. Content analysis of Einstein’s personal library reveals scientific, political, and social connections of the scientist. This article includes information about the main institutions involved in conveying the library to Jerusalem and in organizing it. These were the American Friends of The Hebrew University in New York, the Japan Broadcasting Corporation, and the Jewish National and University Library (today The National Library of Israel). The primary sources for the research on which this article is based are 1) material from The Albert Einstein Archives at The Hebrew University of Jerusalem, 2) Inventory Books of the National Library of Israel, 3) Kiryat Sefer, bibliographical quarterly of the Jewish National and University Library, 4) Einstein’s reprint collection at The Weizmann Institute of Science. The following conclusions were drawn: 1) From the Einstein private library items were given as gifts both during his lifetime and after his death; 2) a large proportion of the books that Einstein gave to the National Library of Israel were registered in the Inventory Books of the National Library of Israel before the transfer of his complete library to Jerusalem; 3) Einstein's personal library includes books that actually belonged to other members of his family. For example, there are books, like those that belonged to his secretary Helen Dukas and to his stepdaughter Margot Einstein, that contain either the signature of the former owner or autograph/dedication by the author of the book. The article’s references to the contemporary Israeli press about Einstein’s visit to Israel elucidate Einstein’s role in the founding of The Hebrew University of Jerusalem.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81009088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-02DOI: 10.11648/J.AJIST.20190303.13
Yonghe Lu, Xin Xiong
In the age of information and digitization, most users publish and obtain real-time information by microblog in social networks. Through effective means, we can accurately discover, organize, and utilize the valuable information hidden behind the massive short texts of social networks. Then we can explore hot topics in microblog, which is conducive to public opinion monitoring and marketing development. In today's society, Didi Taxi has become a necessary choice for many users to travel. This paper applied K-means clustering algorithm to topic analysis of Sina microblog short text on Didi Taxi. We crawled 17226 search results of microblog relevant to the topic of Didi Taxi from April 2019 to June 2019. After a series of data cleaning and data preprocessing steps, we used TF-IDF method to represent 15054 pieces of text data after processing. Through the evaluation of silhouette coefficient, we set the dimension of text 300 and the number of clusters 34 with K-means. Next, we extracted 8 topic clusters from 34 clusters, which include the advantages and disadvantages of Didi Taxi and its development status. Finally, we discussed the results by human check in semantic perspective. Through the topic analysis of microblog, we can understand the public’s attitude to Didi Taxi and provide the basis for the management of the government or company in the future.
{"title":"Topic Analysis of Microblog About “Didi Taxi” Based on K-means Algorithm","authors":"Yonghe Lu, Xin Xiong","doi":"10.11648/J.AJIST.20190303.13","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190303.13","url":null,"abstract":"In the age of information and digitization, most users publish and obtain real-time information by microblog in social networks. Through effective means, we can accurately discover, organize, and utilize the valuable information hidden behind the massive short texts of social networks. Then we can explore hot topics in microblog, which is conducive to public opinion monitoring and marketing development. In today's society, Didi Taxi has become a necessary choice for many users to travel. This paper applied K-means clustering algorithm to topic analysis of Sina microblog short text on Didi Taxi. We crawled 17226 search results of microblog relevant to the topic of Didi Taxi from April 2019 to June 2019. After a series of data cleaning and data preprocessing steps, we used TF-IDF method to represent 15054 pieces of text data after processing. Through the evaluation of silhouette coefficient, we set the dimension of text 300 and the number of clusters 34 with K-means. Next, we extracted 8 topic clusters from 34 clusters, which include the advantages and disadvantages of Didi Taxi and its development status. Finally, we discussed the results by human check in semantic perspective. Through the topic analysis of microblog, we can understand the public’s attitude to Didi Taxi and provide the basis for the management of the government or company in the future.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75698856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text representation is the key for text processing. Scientific papers have significant structural features. The different internal components, mainly including titles, abstracts, keywords, main texts, etc., embody different degrees of importance. In addition, the external structural features of scientific papers, such as topics and authors, also have certain value for analysis of scientific papers. However, most of the traditional analysis methods of scientific papers are based on the analysis of keyword co-occurrence and citation links, which only consider partial information. There is a lack of research on the textual information and external structural information of scientific papers, which has led to the inability to deeply explore the inherent laws of scientific papers. Therefore, this paper proposes Multi-Layers Paragraph Vector (MLPV), a text representing method for scientific papers based on Doc2vec and structural information of scientific papers including both internal and external structures, and constructs five text representation models: PV-NO, PV-TOP, PV-TAKM, MLPV and MLPV-PSO. The results show that the effect of the MLPV model is much better than the PV-NO, PV-TOP and PV-TAKM models. The average accuracy of MLPV model is much more stable and higher, reaching 91.71%, which proves its validity. On the basis of the MLPV model, the accuracy of the optimized MLPV-PSO model is 3.33% higher than MLPV model which proves the effectiveness of the optimization algorithm.
{"title":"MLPV: Text Representation of Scientific Papers Based on Structural Information and Doc2vec","authors":"Yonghe Lu, Yuanyuan Zhai, Jiayi Luo, Yongshan Chen","doi":"10.11648/J.AJIST.20190303.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190303.12","url":null,"abstract":"Text representation is the key for text processing. Scientific papers have significant structural features. The different internal components, mainly including titles, abstracts, keywords, main texts, etc., embody different degrees of importance. In addition, the external structural features of scientific papers, such as topics and authors, also have certain value for analysis of scientific papers. However, most of the traditional analysis methods of scientific papers are based on the analysis of keyword co-occurrence and citation links, which only consider partial information. There is a lack of research on the textual information and external structural information of scientific papers, which has led to the inability to deeply explore the inherent laws of scientific papers. Therefore, this paper proposes Multi-Layers Paragraph Vector (MLPV), a text representing method for scientific papers based on Doc2vec and structural information of scientific papers including both internal and external structures, and constructs five text representation models: PV-NO, PV-TOP, PV-TAKM, MLPV and MLPV-PSO. The results show that the effect of the MLPV model is much better than the PV-NO, PV-TOP and PV-TAKM models. The average accuracy of MLPV model is much more stable and higher, reaching 91.71%, which proves its validity. On the basis of the MLPV model, the accuracy of the optimized MLPV-PSO model is 3.33% higher than MLPV model which proves the effectiveness of the optimization algorithm.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"30 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72546381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-02DOI: 10.11648/J.AJIST.20190302.12
Wilhelm Zugaj, A. Beichler
NoSQL solutions have recently been gaining significant attention because they address some of the inefficiencies of traditional database management systems. NoSQL databases offer features such as performant distributed architecture, flexibility and horizontal scaling. Despite these advantages, there is a vast quantity of NoSQL systems available, which differ greatly from each other. The resulting lack of standardization of security features leads to a questionable maturity in terms of security. What is therefore much needed is a systematic lab research of the availability and maturity of the implementation of the most common standard database security features in NoSQL systems, resulting in a NoSQL security map. This paper summarizes the first part of our research project trying to outline such a map. It documents the definition of the standard security features to be investigated based on a literature review in the area of standard database security. After selection of OrientDB, Redis, Cassandra and MongoDB as initial representatives of commonly used NoSQL systems, a description of systematic investigation of standard database security features for each of these four systems is given. All findings are summarized in tables for quick and easy comparison. We conclude that systems investigated need better default configurations and should enable their security features per default. Finally, we provide an outlook to the next steps of researching a security map for NoSQL systems.
{"title":"Analysis of Standard Security Features for Selected NoSQL Systems","authors":"Wilhelm Zugaj, A. Beichler","doi":"10.11648/J.AJIST.20190302.12","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190302.12","url":null,"abstract":"NoSQL solutions have recently been gaining significant attention because they address some of the inefficiencies of traditional database management systems. NoSQL databases offer features such as performant distributed architecture, flexibility and horizontal scaling. Despite these advantages, there is a vast quantity of NoSQL systems available, which differ greatly from each other. The resulting lack of standardization of security features leads to a questionable maturity in terms of security. What is therefore much needed is a systematic lab research of the availability and maturity of the implementation of the most common standard database security features in NoSQL systems, resulting in a NoSQL security map. This paper summarizes the first part of our research project trying to outline such a map. It documents the definition of the standard security features to be investigated based on a literature review in the area of standard database security. After selection of OrientDB, Redis, Cassandra and MongoDB as initial representatives of commonly used NoSQL systems, a description of systematic investigation of standard database security features for each of these four systems is given. All findings are summarized in tables for quick and easy comparison. We conclude that systems investigated need better default configurations and should enable their security features per default. Finally, we provide an outlook to the next steps of researching a security map for NoSQL systems.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90774327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-10DOI: 10.11648/J.AJIST.20190301.14
X. Chaojun, Guo Shaoqing, Bai Hongquan, L. Yi
iTeach contest works is the display window of educational technology students’ ability of instruction design, computer programming, software UI, and so on. It can also give out lots of information about China educational technology curriculum implement status, and students training focuses. The analysis of iTeach contest works is not only an inspection of the training quality of educational technology students, it’s also a process of communication of training experience of educational technology students. The article takes 196 educational technology students’ works from 2017 annual contest as samples, and conducts quantitative statistics from six aspects, including qualifications of contestants, work types, target users, distribution types and authoring tools. The analysis of the works shows there are many fresh work topics, creatively used technologies, specific information technology application in the contest works. The statistics also reveal some points should be paid attention to during the course of educational technology student development. Lastly, based on contest experts' interview, the article puts forward some suggestions for educational technology student training, including the reflection of curriculum structure, the construction of authentic curriculum resources, the implementation of curriculum quality standards, the integration of practical teaching system and scientific research feeding back teaching.
{"title":"Analysis of iTeach 2017 Contest Works and Suggestions for Educational Technology Students Training","authors":"X. Chaojun, Guo Shaoqing, Bai Hongquan, L. Yi","doi":"10.11648/J.AJIST.20190301.14","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.14","url":null,"abstract":"iTeach contest works is the display window of educational technology students’ ability of instruction design, computer programming, software UI, and so on. It can also give out lots of information about China educational technology curriculum implement status, and students training focuses. The analysis of iTeach contest works is not only an inspection of the training quality of educational technology students, it’s also a process of communication of training experience of educational technology students. The article takes 196 educational technology students’ works from 2017 annual contest as samples, and conducts quantitative statistics from six aspects, including qualifications of contestants, work types, target users, distribution types and authoring tools. The analysis of the works shows there are many fresh work topics, creatively used technologies, specific information technology application in the contest works. The statistics also reveal some points should be paid attention to during the course of educational technology student development. Lastly, based on contest experts' interview, the article puts forward some suggestions for educational technology student training, including the reflection of curriculum structure, the construction of authentic curriculum resources, the implementation of curriculum quality standards, the integration of practical teaching system and scientific research feeding back teaching.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82907072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-19DOI: 10.11648/J.AJIST.20190301.13
Chang-Jie Tang, Xiaojuan Zhang
The principle of provenance is the fundamental theory of archives science, which also possesses important reference value in various areas of research and practice. This paper commences with investigating the core value of the principle of provenance, considering the principle to be the unity of theory and method and its core value lies in following historicalism and respecting essential attributes of the archives. Then the authors focus on the realm of government information management and explore the metadata implementation of the core value of the principle of provenance in the era of electronic records. In its essence, the principle of provenance requires full understanding and preservation of the source information of the record. In the age of electronic records this has ascended to the significance of obtaining "contextual information", which is often stabilized as metadata in electronic records, reflecting the process of the record’s creation, maintenance and long term preservation. Source information as the contextual information reflecting the record creation process, its typical form of expression in metadata is provenance metadata. Therefore the authors explore the implications of provenance metadata and its essential forms. The authors hold that source information is the indispensable characteristic information in records and archives, and also the essential form for the principle of provenance to exhibit the connotations of "provenance". This paper also explains that provenance metadata has further realized the core value of the principle of provenance, playing important roles in ensuring the authenticity, integrity, reliability and usability of electronic records as well as being the basis of their long term preservation and usage. In addition, the authors make concrete exposition on the composition and function of provenance metadata, considering it to be composed of entities and elements, specifically including such metadata as institution, business, environment, relationship and time. Different provenance metadata entities and elements record the source information of the electronic record from its creation until transfer to archives, performing various important functions in government electronic record management. The authors further their research through analyzing and comparing the characteristics of provenance metadata in government electronic record metadata standards at international, national and local jurisdictions levels. Some feasible suggestions for future research are made in the conclusion.
{"title":"Associations Between the Principle of Provenance and Metadata: Practical Implementation and Cases","authors":"Chang-Jie Tang, Xiaojuan Zhang","doi":"10.11648/J.AJIST.20190301.13","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.13","url":null,"abstract":"The principle of provenance is the fundamental theory of archives science, which also possesses important reference value in various areas of research and practice. This paper commences with investigating the core value of the principle of provenance, considering the principle to be the unity of theory and method and its core value lies in following historicalism and respecting essential attributes of the archives. Then the authors focus on the realm of government information management and explore the metadata implementation of the core value of the principle of provenance in the era of electronic records. In its essence, the principle of provenance requires full understanding and preservation of the source information of the record. In the age of electronic records this has ascended to the significance of obtaining \"contextual information\", which is often stabilized as metadata in electronic records, reflecting the process of the record’s creation, maintenance and long term preservation. Source information as the contextual information reflecting the record creation process, its typical form of expression in metadata is provenance metadata. Therefore the authors explore the implications of provenance metadata and its essential forms. The authors hold that source information is the indispensable characteristic information in records and archives, and also the essential form for the principle of provenance to exhibit the connotations of \"provenance\". This paper also explains that provenance metadata has further realized the core value of the principle of provenance, playing important roles in ensuring the authenticity, integrity, reliability and usability of electronic records as well as being the basis of their long term preservation and usage. In addition, the authors make concrete exposition on the composition and function of provenance metadata, considering it to be composed of entities and elements, specifically including such metadata as institution, business, environment, relationship and time. Different provenance metadata entities and elements record the source information of the electronic record from its creation until transfer to archives, performing various important functions in government electronic record management. The authors further their research through analyzing and comparing the characteristics of provenance metadata in government electronic record metadata standards at international, national and local jurisdictions levels. Some feasible suggestions for future research are made in the conclusion.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86211802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-22DOI: 10.11648/J.AJIST.20190301.11
R. Ball
Academic libraries have a large amount of primary and secondary data with academic content. These contents can be linked and supplemented with freely available data on the Internet and generate benefit for their customers. This includes, for example, the date for indexing of library holdings as well as customer data and their media usage for the development of new helpful services. Thus, methods and knowledge of Big Data applications are required. With the help of Big Data technologies, these added values can be created. However, this presupposes that the limitations and possibilities of Big Data technology are being taken into account and that correlations are accepted as sufficiently accurate. Especially classical librarians have to cut back on their accuracy requirements. This paper gives an overview of the possibilities and chances of using large data amounts in libraries, presents hypotheses and explains practical examples.
{"title":"Big Data and Their Impact on Libraries","authors":"R. Ball","doi":"10.11648/J.AJIST.20190301.11","DOIUrl":"https://doi.org/10.11648/J.AJIST.20190301.11","url":null,"abstract":"Academic libraries have a large amount of primary and secondary data with academic content. These contents can be linked and supplemented with freely available data on the Internet and generate benefit for their customers. This includes, for example, the date for indexing of library holdings as well as customer data and their media usage for the development of new helpful services. Thus, methods and knowledge of Big Data applications are required. With the help of Big Data technologies, these added values can be created. However, this presupposes that the limitations and possibilities of Big Data technology are being taken into account and that correlations are accepted as sufficiently accurate. Especially classical librarians have to cut back on their accuracy requirements. This paper gives an overview of the possibilities and chances of using large data amounts in libraries, presents hypotheses and explains practical examples.","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90934003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.11648/j.ajist.20190301.12
Joseph Cassian Pessa
{"title":"Marketing and Promotion of E-journal in Academic Libraries in Tanzania","authors":"Joseph Cassian Pessa","doi":"10.11648/j.ajist.20190301.12","DOIUrl":"https://doi.org/10.11648/j.ajist.20190301.12","url":null,"abstract":"","PeriodicalId":50013,"journal":{"name":"Journal of the American Society for Information Science and Technology","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73654174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}