SlideShare a Scribd company logo
Thesauri, Controlled Vocabularies, and Metadata Information Architecture
Why? ,[object Object],[object Object]
Metadata ,[object Object],[object Object],[object Object]
Metadata ,[object Object],[object Object],[object Object]
Metadata ,[object Object],[object Object],[object Object],[object Object]
Controlled Vocabulary
Controlled Vocabularies ,[object Object],[object Object]
Types of Controlled Vocabularies Simple Complex (Relationships) (Vocabularies) Synonym Rings Authority Files Classification Schemes Thesauri Equivalence Hierarchical Associative
Controlled Vocabularies ,[object Object],[object Object],Cuisinart Food processor blender Kitchen aid Kitchenaid Cuizinart
Synonym Rings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Synonym Rings ,[object Object]
Authority Files ,[object Object],[object Object],[object Object],[object Object]
Authority Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authority Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification Schemes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Controlled Vocabulary ,[object Object],[object Object]
Controlled Vocabulary Associative Relationship Preferred Term Broader Term Variant Term Variant Term Related Term Related Term Narrower Term Associative Relationship Hierarchical Relationship Hierarchical Relationship Equivalence Relationship Equivalence Relationship
Controlled Vocabulary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlled Vocabulary ,[object Object],[object Object]
Types of Thesauri Searching Thesaurus No tagging of content Can enrich queries Indexing Thesaurus Enables browsable  indexes value untapped By search No Thesaurus Natural language search Classic Thesaurus High-end full Function tool Thesaurus Used in Indexing Thesaurus used in searching
Semantic Relationships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A = B
Semantic Relationships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B
 
Semantic Relationships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],B A
Preferred Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preferred Terms ,[object Object],[object Object]
Preferred Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preferred Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Polyhierarchy ,[object Object],Diseases Respiratory Track Infections Viral Pneumonia Virus Diseases
Faceted Classification ,[object Object],[object Object],[object Object]
Faceted Classification ,[object Object]
Faceted Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Faceted Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Facted Classification ,[object Object],Facet Sample controlled vocabulary values Type Red, white, sparkling, Pink, Dessert Region (origin) Australian, Californian, French, Italian Winery (manufacturer) Blackstone, Clos du Bois, Cakebread Year 1969, 1990, 199, 2000, 2001, 2002 Price $3.99, $29.99, <$199, Cheap, Moderate, Expensive
Faceted Classification ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Z39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol pptZ39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol ppt
SUNILKUMARSINGH
 
Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical Study
Debashisnaskar
 
Reference services in Libraries
Reference services in LibrariesReference services in Libraries
Reference services in Libraries
Government of India
 
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat Presentation
Val MacMillan
 
Oclc
OclcOclc
OPAC 2.0: Supporting library users
OPAC 2.0: Supporting library usersOPAC 2.0: Supporting library users
Classified Catalogue Code (ccc)
Classified Catalogue Code (ccc)Classified Catalogue Code (ccc)
Classified Catalogue Code (ccc)
University of Delhi
 
Library congress subject headings
Library congress subject headings Library congress subject headings
Library congress subject headings
MahendraAdhikari7
 
Library of congress subject heading
Library of congress subject headingLibrary of congress subject heading
Library of congress subject heading
Omprakashlis
 
ISO 2709
ISO 2709ISO 2709
ISO 2709
Shuvra Ghosh
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
Nadeem Nazir
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD)
Farris Wahbeh
 
FRBR presentation by Bwsrang Basumatary
FRBR presentation by Bwsrang BasumataryFRBR presentation by Bwsrang Basumatary
FRBR presentation by Bwsrang Basumatary
Bwsrang Basumatary
 
Dublin core Presentation
Dublin core PresentationDublin core Presentation
Dublin core Presentation
Mary Jo Chrabasz
 
Subject cataloging
Subject catalogingSubject cataloging
Subject cataloging
Ime Amor Mortel
 
CAS & SDI service
CAS & SDI serviceCAS & SDI service
Anglo-American Cataloguing Rules AACR 2 ppt
Anglo-American Cataloguing Rules AACR 2 pptAnglo-American Cataloguing Rules AACR 2 ppt
Anglo-American Cataloguing Rules AACR 2 ppt
University of Delhi
 
Bibliographic control : Basics
Bibliographic control : BasicsBibliographic control : Basics
Bibliographic control : Basics
Jayatunga Amaraweera
 
Introduction to Cataloging and Classification
Introduction to Cataloging and ClassificationIntroduction to Cataloging and Classification
Introduction to Cataloging and Classification
Ime Amor Mortel
 

What's hot (20)

Z39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol pptZ39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol ppt
 
Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical Study
 
POPSI
POPSIPOPSI
POPSI
 
Reference services in Libraries
Reference services in LibrariesReference services in Libraries
Reference services in Libraries
 
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat Presentation
 
Oclc
OclcOclc
Oclc
 
OPAC 2.0: Supporting library users
OPAC 2.0: Supporting library usersOPAC 2.0: Supporting library users
OPAC 2.0: Supporting library users
 
Classified Catalogue Code (ccc)
Classified Catalogue Code (ccc)Classified Catalogue Code (ccc)
Classified Catalogue Code (ccc)
 
Library congress subject headings
Library congress subject headings Library congress subject headings
Library congress subject headings
 
Library of congress subject heading
Library of congress subject headingLibrary of congress subject heading
Library of congress subject heading
 
ISO 2709
ISO 2709ISO 2709
ISO 2709
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD)
 
FRBR presentation by Bwsrang Basumatary
FRBR presentation by Bwsrang BasumataryFRBR presentation by Bwsrang Basumatary
FRBR presentation by Bwsrang Basumatary
 
Dublin core Presentation
Dublin core PresentationDublin core Presentation
Dublin core Presentation
 
Subject cataloging
Subject catalogingSubject cataloging
Subject cataloging
 
CAS & SDI service
CAS & SDI serviceCAS & SDI service
CAS & SDI service
 
Anglo-American Cataloguing Rules AACR 2 ppt
Anglo-American Cataloguing Rules AACR 2 pptAnglo-American Cataloguing Rules AACR 2 ppt
Anglo-American Cataloguing Rules AACR 2 ppt
 
Bibliographic control : Basics
Bibliographic control : BasicsBibliographic control : Basics
Bibliographic control : Basics
 
Introduction to Cataloging and Classification
Introduction to Cataloging and ClassificationIntroduction to Cataloging and Classification
Introduction to Cataloging and Classification
 

Viewers also liked

Open access resources
Open access resourcesOpen access resources
Open access resourcesAkshay Kumar
 
Using a thesaurus.ppt
Using a thesaurus.pptUsing a thesaurus.ppt
Using a thesaurus.ppt
Taylor Rogers
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKris Jacobson
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
lmartin8
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniques
abbas mohd
 
Advanced keyword research
Advanced keyword researchAdvanced keyword research
Advanced keyword research
Jono Alderson
 
Kwic
KwicKwic
KwicPU
 
Identifying Keywords and Searching Techniques
Identifying Keywords and Searching TechniquesIdentifying Keywords and Searching Techniques
Identifying Keywords and Searching Techniques
La Trobe University Library- College of ASSC
 
From KWIC to Enterprise Search - M G Lindquist
From KWIC to Enterprise Search - M G LindquistFrom KWIC to Enterprise Search - M G Lindquist
From KWIC to Enterprise Search - M G Lindquist
mglindquist
 
Port mann bridge modification
Port mann bridge modificationPort mann bridge modification
Port mann bridge modification
jacobkwack
 
Relations and Functions (Algebra 2)
Relations and Functions (Algebra 2)Relations and Functions (Algebra 2)
Relations and Functions (Algebra 2)
rfant
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searchingdoverlibrary
 
Institutional Repositories
Institutional RepositoriesInstitutional Repositories
Institutional Repositories
Sarika Sawant
 
Types of sentences
Types of sentencesTypes of sentences
Types of sentences
Taylor Rogers
 
Richard kwock jsm 2012 poster
Richard kwock jsm 2012 posterRichard kwock jsm 2012 poster
Richard kwock jsm 2012 posterAjay Ohri
 
Presentation search strategy
Presentation   search strategyPresentation   search strategy
Presentation search strategy
jmunks
 
Lawrence kwockresume1
Lawrence kwockresume1Lawrence kwockresume1
Lawrence kwockresume1
Lawrence Kwock
 

Viewers also liked (20)

Open access resources
Open access resourcesOpen access resources
Open access resources
 
3rd Thesaurus
3rd Thesaurus3rd Thesaurus
3rd Thesaurus
 
Using a thesaurus.ppt
Using a thesaurus.pptUsing a thesaurus.ppt
Using a thesaurus.ppt
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced Techniques
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniques
 
Advanced keyword research
Advanced keyword researchAdvanced keyword research
Advanced keyword research
 
Slic System
Slic SystemSlic System
Slic System
 
Kwic
KwicKwic
Kwic
 
Identifying Keywords and Searching Techniques
Identifying Keywords and Searching TechniquesIdentifying Keywords and Searching Techniques
Identifying Keywords and Searching Techniques
 
From KWIC to Enterprise Search - M G Lindquist
From KWIC to Enterprise Search - M G LindquistFrom KWIC to Enterprise Search - M G Lindquist
From KWIC to Enterprise Search - M G Lindquist
 
Port mann bridge modification
Port mann bridge modificationPort mann bridge modification
Port mann bridge modification
 
Relations and Functions (Algebra 2)
Relations and Functions (Algebra 2)Relations and Functions (Algebra 2)
Relations and Functions (Algebra 2)
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searching
 
Institutional Repositories
Institutional RepositoriesInstitutional Repositories
Institutional Repositories
 
Searching techniques
Searching techniquesSearching techniques
Searching techniques
 
Types of sentences
Types of sentencesTypes of sentences
Types of sentences
 
Richard kwock jsm 2012 poster
Richard kwock jsm 2012 posterRichard kwock jsm 2012 poster
Richard kwock jsm 2012 poster
 
Presentation search strategy
Presentation   search strategyPresentation   search strategy
Presentation search strategy
 
Lawrence kwockresume1
Lawrence kwockresume1Lawrence kwockresume1
Lawrence kwockresume1
 

Similar to Thesauri

Keyword searching idc
Keyword searching idcKeyword searching idc
Keyword searching idc
SuchittaU
 
Thesaurus ppt.pptx
Thesaurus ppt.pptxThesaurus ppt.pptx
Thesaurus ppt.pptx
ApurvaShyam1
 
Why Are Taxonomies Necessary?
Why Are Taxonomies Necessary?Why Are Taxonomies Necessary?
Why Are Taxonomies Necessary?
Fred Leise
 
Business Research Methods. search strategies for online databases
Business Research Methods. search strategies for online databasesBusiness Research Methods. search strategies for online databases
Business Research Methods. search strategies for online databases
Ahsan Khan Eco (Superior College)
 
LAC Group - Metadata for mere mortals (Controlled vocabularies)
LAC Group - Metadata for mere mortals (Controlled vocabularies)LAC Group - Metadata for mere mortals (Controlled vocabularies)
LAC Group - Metadata for mere mortals (Controlled vocabularies)
LAC Group
 
Introduction To Controlled Vocabularies
Introduction To Controlled VocabulariesIntroduction To Controlled Vocabularies
Introduction To Controlled Vocabularies
Fred Leise
 
Theresa regli bw-3
Theresa regli bw-3Theresa regli bw-3
Theresa regli bw-3R Aunpad
 
Chapter 9Enterprise Content and Record ManagementSt. Rit
Chapter 9Enterprise Content and Record ManagementSt. RitChapter 9Enterprise Content and Record ManagementSt. Rit
Chapter 9Enterprise Content and Record ManagementSt. Rit
JinElias52
 
Tex Share Homework Help Lesson 1
Tex Share Homework Help Lesson 1Tex Share Homework Help Lesson 1
Tex Share Homework Help Lesson 1
TSLAC - Library Development
 
Deep Machine Reading for Customer Analytics
Deep Machine Reading for Customer AnalyticsDeep Machine Reading for Customer Analytics
Deep Machine Reading for Customer Analytics
Naveen Ashish
 
Synonyms, Alternative Labels, and Nonpreferred Terms
Synonyms, Alternative Labels, and Nonpreferred TermsSynonyms, Alternative Labels, and Nonpreferred Terms
Synonyms, Alternative Labels, and Nonpreferred Terms
Heather Hedden
 
Literature Based Framework for Semantic Descriptions of e-Science resources
Literature Based Framework for Semantic Descriptions of e-Science resourcesLiterature Based Framework for Semantic Descriptions of e-Science resources
Literature Based Framework for Semantic Descriptions of e-Science resources
Hammad Afzal
 
Murtha Baca
Murtha BacaMurtha Baca
Murtha Baca
vonjobi
 
Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013
Access Innovations, Inc.
 
Labeling Systems
Labeling SystemsLabeling Systems
Labeling SystemsMiles Price
 
Leveraging Your Taxonomy With Navtree and MAIQuery
Leveraging Your Taxonomy With Navtree and MAIQueryLeveraging Your Taxonomy With Navtree and MAIQuery
Leveraging Your Taxonomy With Navtree and MAIQuery
Access Innovations, Inc.
 
Database Searching Basics
Database Searching BasicsDatabase Searching Basics
Database Searching Basicszhang48
 
Using metadata repositories with search
Using metadata repositories with searchUsing metadata repositories with search
Using metadata repositories with search
Jean Graef
 
Taxonomies for Publishing: Enhancing the User Experience
Taxonomies for Publishing: Enhancing the User ExperienceTaxonomies for Publishing: Enhancing the User Experience
Taxonomies for Publishing: Enhancing the User ExperienceTSoholt
 

Similar to Thesauri (20)

Taxonomy made easy
Taxonomy made easyTaxonomy made easy
Taxonomy made easy
 
Keyword searching idc
Keyword searching idcKeyword searching idc
Keyword searching idc
 
Thesaurus ppt.pptx
Thesaurus ppt.pptxThesaurus ppt.pptx
Thesaurus ppt.pptx
 
Why Are Taxonomies Necessary?
Why Are Taxonomies Necessary?Why Are Taxonomies Necessary?
Why Are Taxonomies Necessary?
 
Business Research Methods. search strategies for online databases
Business Research Methods. search strategies for online databasesBusiness Research Methods. search strategies for online databases
Business Research Methods. search strategies for online databases
 
LAC Group - Metadata for mere mortals (Controlled vocabularies)
LAC Group - Metadata for mere mortals (Controlled vocabularies)LAC Group - Metadata for mere mortals (Controlled vocabularies)
LAC Group - Metadata for mere mortals (Controlled vocabularies)
 
Introduction To Controlled Vocabularies
Introduction To Controlled VocabulariesIntroduction To Controlled Vocabularies
Introduction To Controlled Vocabularies
 
Theresa regli bw-3
Theresa regli bw-3Theresa regli bw-3
Theresa regli bw-3
 
Chapter 9Enterprise Content and Record ManagementSt. Rit
Chapter 9Enterprise Content and Record ManagementSt. RitChapter 9Enterprise Content and Record ManagementSt. Rit
Chapter 9Enterprise Content and Record ManagementSt. Rit
 
Tex Share Homework Help Lesson 1
Tex Share Homework Help Lesson 1Tex Share Homework Help Lesson 1
Tex Share Homework Help Lesson 1
 
Deep Machine Reading for Customer Analytics
Deep Machine Reading for Customer AnalyticsDeep Machine Reading for Customer Analytics
Deep Machine Reading for Customer Analytics
 
Synonyms, Alternative Labels, and Nonpreferred Terms
Synonyms, Alternative Labels, and Nonpreferred TermsSynonyms, Alternative Labels, and Nonpreferred Terms
Synonyms, Alternative Labels, and Nonpreferred Terms
 
Literature Based Framework for Semantic Descriptions of e-Science resources
Literature Based Framework for Semantic Descriptions of e-Science resourcesLiterature Based Framework for Semantic Descriptions of e-Science resources
Literature Based Framework for Semantic Descriptions of e-Science resources
 
Murtha Baca
Murtha BacaMurtha Baca
Murtha Baca
 
Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013
 
Labeling Systems
Labeling SystemsLabeling Systems
Labeling Systems
 
Leveraging Your Taxonomy With Navtree and MAIQuery
Leveraging Your Taxonomy With Navtree and MAIQueryLeveraging Your Taxonomy With Navtree and MAIQuery
Leveraging Your Taxonomy With Navtree and MAIQuery
 
Database Searching Basics
Database Searching BasicsDatabase Searching Basics
Database Searching Basics
 
Using metadata repositories with search
Using metadata repositories with searchUsing metadata repositories with search
Using metadata repositories with search
 
Taxonomies for Publishing: Enhancing the User Experience
Taxonomies for Publishing: Enhancing the User ExperienceTaxonomies for Publishing: Enhancing the User Experience
Taxonomies for Publishing: Enhancing the User Experience
 

More from Miles Price

Process And Methodology Research
Process And Methodology ResearchProcess And Methodology Research
Process And Methodology ResearchMiles Price
 
Organization Systems
Organization SystemsOrganization Systems
Organization SystemsMiles Price
 
Navigation Systems
Navigation SystemsNavigation Systems
Navigation SystemsMiles Price
 
Design And Documentation
Design And DocumentationDesign And Documentation
Design And DocumentationMiles Price
 

More from Miles Price (9)

User Experience
User ExperienceUser Experience
User Experience
 
Search Systems
Search SystemsSearch Systems
Search Systems
 
Process And Methodology Research
Process And Methodology ResearchProcess And Methodology Research
Process And Methodology Research
 
Personas
PersonasPersonas
Personas
 
Organization Systems
Organization SystemsOrganization Systems
Organization Systems
 
Navigation Systems
Navigation SystemsNavigation Systems
Navigation Systems
 
Design And Documentation
Design And DocumentationDesign And Documentation
Design And Documentation
 
Anatomy Of Ia
Anatomy Of IaAnatomy Of Ia
Anatomy Of Ia
 
Intro To Ia
Intro To IaIntro To Ia
Intro To Ia
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Thesauri

  • 1. Thesauri, Controlled Vocabularies, and Metadata Information Architecture
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8. Types of Controlled Vocabularies Simple Complex (Relationships) (Vocabularies) Synonym Rings Authority Files Classification Schemes Thesauri Equivalence Hierarchical Associative
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Controlled Vocabulary Associative Relationship Preferred Term Broader Term Variant Term Variant Term Related Term Related Term Narrower Term Associative Relationship Hierarchical Relationship Hierarchical Relationship Equivalence Relationship Equivalence Relationship
  • 18.
  • 19.
  • 20. Types of Thesauri Searching Thesaurus No tagging of content Can enrich queries Indexing Thesaurus Enables browsable indexes value untapped By search No Thesaurus Natural language search Classic Thesaurus High-end full Function tool Thesaurus Used in Indexing Thesaurus used in searching
  • 21.
  • 22.
  • 23.  
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.