A talk sponsored by the Committee on Archives, Libraries and Museums (CALM) at the Museum Computer Network, 2004, exploring the differing conceptions of cataloging practiced by museum and library catalogers. Includes comments gleaned from a casual survey of museum catalogers on the role and organizational position of catalogers in museum. Discusses the role of standards in cataloging strategies.
This document discusses standards related to archival description, including EAD, DACS, and MARC. It provides an overview of each standard and their purposes. EAD is an XML standard for encoding finding aids to display them online. DACS is a content standard that does not prescribe structure, leaving that to EAD. MARC was originally created for libraries but has been adapted for archival use through standards like APPM and ACM to represent archival materials and collections.
This document provides an overview of archives, archival description standards, and finding aids. It defines what archives are, distinguishing them from libraries. It describes the archival mission to identify, preserve, and provide access to materials of enduring value. Key aspects covered include the Descriptive Archival Content Standard (DACS), the Encoded Archival Description (EAD) standard for encoding archival finding aids, and how EAD maps to MARC21 fields. The document compares the differences between libraries and archives and outlines the core elements in DACS for archival description.
El documento describe los diferentes tipos de tejidos en las plantas adultas. Menciona los tejidos fundamentales como el parénquima, el colénquima y el esclerénquima, que sirven para la nutrición y el sostén. También describe los tejidos conductores xilema y floema, que transportan la savia bruta y elaborada a través de vasos leñosos y liberianos formados por células especializadas.
Rebecca Grant - Archival Description and Archival Arrangementdri_ireland
Presentation given by Rebecca Grant of the Digital Repository of Ireland as part of a training session in The National Irish Visual Arts Library (NIVAL), 12 August 2014.
An introduction to the main principles of archival arrangement and description, including an overview of hierarchical arrangement of archives and the archival descriptive standard ISAD(G).
COUNTER is an international initiative that establishes standards for recording and reporting online usage statistics for electronic resources. It aims to provide consistent, credible and comparable usage data through a set of guidelines and codes of practice. The COUNTER standards address terminology, report formats, data processing, categories, report delivery, compliance and governance. The standards were developed through collaboration between librarians and publishers to address inconsistencies in vendor-provided usage statistics and establish trust in usage data.
A Brief Introduction to Encoded Archival DescriptionKevin Schlottmann
A basic presentation prepared for Queens College (CUNY) Graduate School of Library and Information Science, May 2011. Describes what EAD is, how it is created, and how it is implemented.
Eukaryotes are organisms with cells that contain membrane-bound nuclei. The document discusses eukaryotic cells, noting that animal and plant cells differ. It includes an electron microscope image of a liver cell and asks the reader to identify structures and calculate the magnification and maximum diameter of the nucleus. It also provides links for more resources and information about making donations to the Biology4Good charity.
Here are the steps to add the new folder:
1. Add a new <c02> element within <c01 level="series">Series II: Addenda</c01>
2. Add a <did> element within the new <c02>
3. Add appropriate elements within <did> like <container>, <unittitle>, <unitdate> to describe the new folder
4. Make any other changes needed to fully integrate and describe the new folder within the finding aid.
Let me know if any part needs more explanation!
IV. Exercises
79
Exercise 4a:
Adding the Folder
<c01 level="series">
<unittitle id="
This document discusses standards related to archival description, including EAD, DACS, and MARC. It provides an overview of each standard and their purposes. EAD is an XML standard for encoding finding aids to display them online. DACS is a content standard that does not prescribe structure, leaving that to EAD. MARC was originally created for libraries but has been adapted for archival use through standards like APPM and ACM to represent archival materials and collections.
This document provides an overview of archives, archival description standards, and finding aids. It defines what archives are, distinguishing them from libraries. It describes the archival mission to identify, preserve, and provide access to materials of enduring value. Key aspects covered include the Descriptive Archival Content Standard (DACS), the Encoded Archival Description (EAD) standard for encoding archival finding aids, and how EAD maps to MARC21 fields. The document compares the differences between libraries and archives and outlines the core elements in DACS for archival description.
El documento describe los diferentes tipos de tejidos en las plantas adultas. Menciona los tejidos fundamentales como el parénquima, el colénquima y el esclerénquima, que sirven para la nutrición y el sostén. También describe los tejidos conductores xilema y floema, que transportan la savia bruta y elaborada a través de vasos leñosos y liberianos formados por células especializadas.
Rebecca Grant - Archival Description and Archival Arrangementdri_ireland
Presentation given by Rebecca Grant of the Digital Repository of Ireland as part of a training session in The National Irish Visual Arts Library (NIVAL), 12 August 2014.
An introduction to the main principles of archival arrangement and description, including an overview of hierarchical arrangement of archives and the archival descriptive standard ISAD(G).
COUNTER is an international initiative that establishes standards for recording and reporting online usage statistics for electronic resources. It aims to provide consistent, credible and comparable usage data through a set of guidelines and codes of practice. The COUNTER standards address terminology, report formats, data processing, categories, report delivery, compliance and governance. The standards were developed through collaboration between librarians and publishers to address inconsistencies in vendor-provided usage statistics and establish trust in usage data.
A Brief Introduction to Encoded Archival DescriptionKevin Schlottmann
A basic presentation prepared for Queens College (CUNY) Graduate School of Library and Information Science, May 2011. Describes what EAD is, how it is created, and how it is implemented.
Eukaryotes are organisms with cells that contain membrane-bound nuclei. The document discusses eukaryotic cells, noting that animal and plant cells differ. It includes an electron microscope image of a liver cell and asks the reader to identify structures and calculate the magnification and maximum diameter of the nucleus. It also provides links for more resources and information about making donations to the Biology4Good charity.
Here are the steps to add the new folder:
1. Add a new <c02> element within <c01 level="series">Series II: Addenda</c01>
2. Add a <did> element within the new <c02>
3. Add appropriate elements within <did> like <container>, <unittitle>, <unitdate> to describe the new folder
4. Make any other changes needed to fully integrate and describe the new folder within the finding aid.
Let me know if any part needs more explanation!
IV. Exercises
79
Exercise 4a:
Adding the Folder
<c01 level="series">
<unittitle id="
Getting started in digital preservationSarah Jones
Digital preservation requires active management of digital information over time to ensure ongoing accessibility. It involves addressing issues like file formats becoming obsolete, storage media degradation, and a lack of descriptive information. The document provides an overview of digital preservation principles and practical initial steps organizations can take to get started, such as focusing on file formats and metadata collection, and establishing basic processes for storage, backup, and access.
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesJill Emery
We invited interested librarians via social media venues such as Facebook, twitter, Tumblr & a wiki. Come learn how this experiment worked and participate in the development of capturing the best practices of electronic resource management. The TERMS Library Technology Report will be made available to attendees.
This document provides information about frog anatomy and dissection from a biology lab. It describes some key facts about frogs such as their classification as amphibians and life cycle. It also outlines some benefits frogs provide to humans, including compounds used in antibiotics and potential treatments derived from their ability to regrow limbs. The document concludes by listing safety procedures and materials needed for the frog dissection lab.
An explanation of Creative Commons and how it can be of use to educaors. An updated version of my previous presentation http://www.slideshare.net/Jessicacoates/creative-commons-in-the-classroom-presentation
EAD (Encoded Archival Description) is a non-proprietary standard for encoding finding aids in XML. It allows standardization of collection information across repositories. EAD has a hierarchical structure following archival theory, from general to granular description. The three major required components of an EAD document are <ead>, <eadheader>, and <archdesc>.
Presentation given at the Association of Moving Image Archivists Conference, November 14, 2009 in Savannah, GA. Part of the panel PBCore: What is it good for?
The document discusses the options of creating a school digital library as either an intranet or using the internet. An intranet is a privately owned network that is only accessible to those within the school, while the internet allows global access. The main advantages of an intranet are that access is restricted only to the school community and the school has full control over access and content. However, an intranet limits access to only the school and does not allow remote access unless outside the school building. The internet allows broader global access but less control over security and permissions. The document considers the tradeoffs between these two options for delivering an online digital library for a school.
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...Chuck Patch
Hurricane Katrina was the most destructive natural disaster in U.S. history, vastly exceeding other major disasters like fires in Chicago and San Francisco. After the storm, New Orleans' population was less than half of pre-Katrina levels, over 60% of the city was uninhabited, and public services like schools, libraries and mail delivery were severely limited. The presentation discusses preparing for disasters through risk management and business continuity planning, highlighting both abstract concepts and specific steps taken by The Historic New Orleans Collection in response to Hurricane Katrina. These included regular drills, prioritizing collections, evacuating staff, securing buildings and technology, and initial post-storm coordination despite damaged infrastructure.
Define Future: Finding the Common Ground Between IT and Digital PreservationChuck Patch
Presentation for MCN 2008 session on Digital Curation. Digital Curation is a new field devoted to preservation of digital assets. It negotiates between the expertise of content specialists and IT. This presentation looks at the sometimes conflicting priorities of IT and digital preservation and considers how these differences might be resolved.
This document appears to be a resume or portfolio for an individual named Nick Faulconer. It includes descriptions of several projects he worked on related to architecture and sustainable design. The projects involve designs for an ecological center, solar house, pool facility, concert hall and more. For each, there is a brief overview of the project goals and Nick's role in areas like concept development, modeling and software use. Diagrams, renderings and pictures are included to illustrate the design concepts.
Who's Driving? Implementing a Multi-Disciplinary Collection Information Syste...Chuck Patch
A case study of a project at The Historic New Orleans Collection to integrate the Registration and Cataloging of three collecting divisions: the museum, library and manuscripts division. THNOC co-developed a software system with Minisis Inc. that combined curatorial, bibliographic and archival cataloging processes. However, professional practices did not intersect in the area of subject classification and the institution developed an in-house descriptive hierarchy to provide a tool for federated searches of all holdings.
This document provides information about preparing for and taking the Certified Internal Auditor (CIA) exam. It discusses the exam content areas and format. It also provides tips for studying, including establishing a study schedule, using practice tests, and understanding concepts. Advice is given for exam strategies like managing time and answering questions. Requirements to sit for and pass the exam are also summarized, as well as how to maintain the CIA certification.
This document provides information about fraud awareness and the roles and responsibilities of internal auditors, fraud examiners, and certified fraud examiners in detecting and preventing fraud. It defines fraud and the different types of fraud, describes tools and techniques used in fraud examinations, and summarizes key statistics about occupational fraud from surveys. The document emphasizes that while internal auditors are not fraud experts, they should consider fraud risks and have sufficient knowledge to identify potential issues. Certified fraud examiners undergo a certification process including experience, continuing education, and passing a comprehensive exam.
This document discusses risks related to online conferences and optimizing internal audits. It notes that 5% of global GDP was lost to fraud in 2009 according to one report. It emphasizes the importance of information security and understanding new risks. It discusses governance, risk management and compliance. It provides considerations for updating internal audit charters, ensuring independence from top management, and conducting quality assessments. It discusses options for outsourcing internal audit functions like improving quality or reducing costs. It raises questions about outsourcing risks related to provider knowledge, staff embedding, sustaining audits over time, and conflicts of interest. The document is from the website http://cebviews.com and authored by Kate Guerra.
This document discusses decision making theory, forecasting techniques, and time series analysis. It covers decision making under certainty, risk, and uncertainty. Forecasting methods include correlation analysis, regression analysis, learning curves, and time series analysis using simple moving averages, weighted moving averages, and exponential smoothing. The author provides their contact information.
Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes. The internal audit activity must be independent, and internal auditors must be objective in performing their work. Internal auditors must possess the knowledge, skills, and other competencies needed to perform their individual responsibilities and apply the care and skill expected of a reasonably prudent and competent internal auditor. The chief audit executive must develop and maintain a quality assurance and improvement program that covers all aspects of the internal audit activity.
The document discusses key concepts related to budgeting. It defines a budget as a plan that identifies the resources and commitments needed to achieve goals over a period of time. It also describes budgets as planning, control, motivation, communication, and coordination tools. Finally, it discusses budget periods, participants, cost standards, and preparation tools for developing an effective budget.
International Market Brands was established in 1987 as a sister company to C.A. Curtze. It is based in Seattle and was initially focused on serving Asian customers and developing new markets by securing appropriate food products. Today, IMB co-manufactures a vast range of premium private label products to meet customer requirements. It assists with brand development and marketing and has a long-term global customer base with offices now in California, Manila, and Jakarta. IMB offers a wide range of food and beverage products and works with customers to develop products and provide top quality service.
This document provides an overview of financial statement fraud and red flags that can indicate fraud. It discusses the fraud triangle of incentives, opportunities, and rationalization that enable fraud. Several high-profile fraud cases are summarized, including Enron, WorldCom, Tyco, and Satyam Computers. Red flags for potential fraud are outlined, including those related to revenue recognition, expenses, receivables, inventory, and profitability ratios. Scoring models like the Z-score are also mentioned for evaluating fraud risk.
The document discusses ethics and ethical behavior in the workplace. It asks questions about potentially unethical behaviors like personal use of work equipment or accepting gifts from suppliers. It also discusses common justifications people use for unethical acts and identifies key ethics principles of honesty, fairness, objectivity and responsibility. Finally, it outlines standards of ethical practice including maintaining competence, ensuring confidentiality, mitigating conflicts of interest, and disclosing information fairly.
This document outlines three rules for success: lie often, cheat, and steal. It encourages fabricating fictional realities and augmenting the future through bold actions like hyperloops. While promoting courage and preparation, it justifies unethical behaviors like lying, cheating, and stealing as a path to achieve massive personal disruption and accomplish the impossible.
Getting started in digital preservationSarah Jones
Digital preservation requires active management of digital information over time to ensure ongoing accessibility. It involves addressing issues like file formats becoming obsolete, storage media degradation, and a lack of descriptive information. The document provides an overview of digital preservation principles and practical initial steps organizations can take to get started, such as focusing on file formats and metadata collection, and establishing basic processes for storage, backup, and access.
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesJill Emery
We invited interested librarians via social media venues such as Facebook, twitter, Tumblr & a wiki. Come learn how this experiment worked and participate in the development of capturing the best practices of electronic resource management. The TERMS Library Technology Report will be made available to attendees.
This document provides information about frog anatomy and dissection from a biology lab. It describes some key facts about frogs such as their classification as amphibians and life cycle. It also outlines some benefits frogs provide to humans, including compounds used in antibiotics and potential treatments derived from their ability to regrow limbs. The document concludes by listing safety procedures and materials needed for the frog dissection lab.
An explanation of Creative Commons and how it can be of use to educaors. An updated version of my previous presentation http://www.slideshare.net/Jessicacoates/creative-commons-in-the-classroom-presentation
EAD (Encoded Archival Description) is a non-proprietary standard for encoding finding aids in XML. It allows standardization of collection information across repositories. EAD has a hierarchical structure following archival theory, from general to granular description. The three major required components of an EAD document are <ead>, <eadheader>, and <archdesc>.
Presentation given at the Association of Moving Image Archivists Conference, November 14, 2009 in Savannah, GA. Part of the panel PBCore: What is it good for?
The document discusses the options of creating a school digital library as either an intranet or using the internet. An intranet is a privately owned network that is only accessible to those within the school, while the internet allows global access. The main advantages of an intranet are that access is restricted only to the school community and the school has full control over access and content. However, an intranet limits access to only the school and does not allow remote access unless outside the school building. The internet allows broader global access but less control over security and permissions. The document considers the tradeoffs between these two options for delivering an online digital library for a school.
Not the Unthinkable, But What We Didn’t Think Of: Preparing For and Recoverin...Chuck Patch
Hurricane Katrina was the most destructive natural disaster in U.S. history, vastly exceeding other major disasters like fires in Chicago and San Francisco. After the storm, New Orleans' population was less than half of pre-Katrina levels, over 60% of the city was uninhabited, and public services like schools, libraries and mail delivery were severely limited. The presentation discusses preparing for disasters through risk management and business continuity planning, highlighting both abstract concepts and specific steps taken by The Historic New Orleans Collection in response to Hurricane Katrina. These included regular drills, prioritizing collections, evacuating staff, securing buildings and technology, and initial post-storm coordination despite damaged infrastructure.
Define Future: Finding the Common Ground Between IT and Digital PreservationChuck Patch
Presentation for MCN 2008 session on Digital Curation. Digital Curation is a new field devoted to preservation of digital assets. It negotiates between the expertise of content specialists and IT. This presentation looks at the sometimes conflicting priorities of IT and digital preservation and considers how these differences might be resolved.
This document appears to be a resume or portfolio for an individual named Nick Faulconer. It includes descriptions of several projects he worked on related to architecture and sustainable design. The projects involve designs for an ecological center, solar house, pool facility, concert hall and more. For each, there is a brief overview of the project goals and Nick's role in areas like concept development, modeling and software use. Diagrams, renderings and pictures are included to illustrate the design concepts.
Who's Driving? Implementing a Multi-Disciplinary Collection Information Syste...Chuck Patch
A case study of a project at The Historic New Orleans Collection to integrate the Registration and Cataloging of three collecting divisions: the museum, library and manuscripts division. THNOC co-developed a software system with Minisis Inc. that combined curatorial, bibliographic and archival cataloging processes. However, professional practices did not intersect in the area of subject classification and the institution developed an in-house descriptive hierarchy to provide a tool for federated searches of all holdings.
This document provides information about preparing for and taking the Certified Internal Auditor (CIA) exam. It discusses the exam content areas and format. It also provides tips for studying, including establishing a study schedule, using practice tests, and understanding concepts. Advice is given for exam strategies like managing time and answering questions. Requirements to sit for and pass the exam are also summarized, as well as how to maintain the CIA certification.
This document provides information about fraud awareness and the roles and responsibilities of internal auditors, fraud examiners, and certified fraud examiners in detecting and preventing fraud. It defines fraud and the different types of fraud, describes tools and techniques used in fraud examinations, and summarizes key statistics about occupational fraud from surveys. The document emphasizes that while internal auditors are not fraud experts, they should consider fraud risks and have sufficient knowledge to identify potential issues. Certified fraud examiners undergo a certification process including experience, continuing education, and passing a comprehensive exam.
This document discusses risks related to online conferences and optimizing internal audits. It notes that 5% of global GDP was lost to fraud in 2009 according to one report. It emphasizes the importance of information security and understanding new risks. It discusses governance, risk management and compliance. It provides considerations for updating internal audit charters, ensuring independence from top management, and conducting quality assessments. It discusses options for outsourcing internal audit functions like improving quality or reducing costs. It raises questions about outsourcing risks related to provider knowledge, staff embedding, sustaining audits over time, and conflicts of interest. The document is from the website http://cebviews.com and authored by Kate Guerra.
This document discusses decision making theory, forecasting techniques, and time series analysis. It covers decision making under certainty, risk, and uncertainty. Forecasting methods include correlation analysis, regression analysis, learning curves, and time series analysis using simple moving averages, weighted moving averages, and exponential smoothing. The author provides their contact information.
Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes. The internal audit activity must be independent, and internal auditors must be objective in performing their work. Internal auditors must possess the knowledge, skills, and other competencies needed to perform their individual responsibilities and apply the care and skill expected of a reasonably prudent and competent internal auditor. The chief audit executive must develop and maintain a quality assurance and improvement program that covers all aspects of the internal audit activity.
The document discusses key concepts related to budgeting. It defines a budget as a plan that identifies the resources and commitments needed to achieve goals over a period of time. It also describes budgets as planning, control, motivation, communication, and coordination tools. Finally, it discusses budget periods, participants, cost standards, and preparation tools for developing an effective budget.
International Market Brands was established in 1987 as a sister company to C.A. Curtze. It is based in Seattle and was initially focused on serving Asian customers and developing new markets by securing appropriate food products. Today, IMB co-manufactures a vast range of premium private label products to meet customer requirements. It assists with brand development and marketing and has a long-term global customer base with offices now in California, Manila, and Jakarta. IMB offers a wide range of food and beverage products and works with customers to develop products and provide top quality service.
This document provides an overview of financial statement fraud and red flags that can indicate fraud. It discusses the fraud triangle of incentives, opportunities, and rationalization that enable fraud. Several high-profile fraud cases are summarized, including Enron, WorldCom, Tyco, and Satyam Computers. Red flags for potential fraud are outlined, including those related to revenue recognition, expenses, receivables, inventory, and profitability ratios. Scoring models like the Z-score are also mentioned for evaluating fraud risk.
The document discusses ethics and ethical behavior in the workplace. It asks questions about potentially unethical behaviors like personal use of work equipment or accepting gifts from suppliers. It also discusses common justifications people use for unethical acts and identifies key ethics principles of honesty, fairness, objectivity and responsibility. Finally, it outlines standards of ethical practice including maintaining competence, ensuring confidentiality, mitigating conflicts of interest, and disclosing information fairly.
This document outlines three rules for success: lie often, cheat, and steal. It encourages fabricating fictional realities and augmenting the future through bold actions like hyperloops. While promoting courage and preparation, it justifies unethical behaviors like lying, cheating, and stealing as a path to achieve massive personal disruption and accomplish the impossible.
This document appears to be a diagram showing connections between various individuals and organizations represented by numbers. The numbers are connected to each other with lines, potentially representing relationships or interactions between the entities. There is also text identifying Iyad Mourtada and providing his contact information.
The presentation discussed the future of accounting standards. It covered topics like the convergence of IFRS and US GAAP, the increasing adoption of IFRS globally, the movement from rules-based to principles-based standards, changes that will bring off-balance sheet items onto company balance sheets, evolving standards for public sector and small-and-medium enterprise accounting, efforts to limit accounting choices and increase clarity, and new standards like IFRS 9 that simplify previous requirements. The presentation provided an overview of the key ongoing developments and issues shaping international accounting standards.
This document discusses various aspects of IT governance including:
1. The role of auditing in improving IT governance implementation and ensuring compliance. Information security governance should be integrated with IT governance with a focus on integrity, continuity of services, and protecting information assets.
2. The importance of documenting an organization's IT assets in a structured enterprise architecture to facilitate management, planning, and understanding of IT investments.
3. Key IT roles and responsibilities including security administration, application programming, network management, and their segregation to prevent conflicts of interest.
4. Risk management concepts like risk definitions, business objectives, types of risks, and approaches for managing risks through control, mitigation, acceptance, or transfer.
This document discusses the overlap between library science and museum studies degrees and careers. While the programs may seem different, librarians often find roles in museums. Museums frequently have dedicated libraries to support staff research needs. Librarians bring skills in organization, research support, and information systems that enhance museums' collections and missions. As technologies change, librarians also help museums adapt by developing digital collections and websites. Overall, people with library backgrounds can apply their training to a wide variety of museum roles.
The document discusses organizing library resources through cataloging, classification, and categorization. Cataloging involves describing items and assigning call numbers to prepare items for the shelf and catalog. Classification uses a systematic notation system like Dewey Decimal to arrange items by subject on the shelf. Categorization involves arranging a collection by format, genre, reading level, or other attributes to aid users in finding materials.
The library profession is at a cross roads. Computer technology coupled with the Internet have changed the way content is created, maintained, evaluated, and distributed. While the core principles of librarianship (collection, organization, preservation, and dissemination) are still very much apropos to the current milieu, the exact tasks of the profession are not as necessary as they once were. What is a librarian to do? In my opinion, there are three choices: 1) creating services against content as opposed to simply providing access to it, 2) curating collections that are unique to our local institutions, or 3) providing sets of services that are a combination of #1 and #2. This presentation elaborates on these ideas and demonstrates some of the possibilities.
The most complete version of this presentation is located at http://infomotions.com/musings/future-2015/
This document discusses organizing library collections. It begins by explaining that an organized library allows users to efficiently find resources. The main methods for organizing a collection are then introduced as cataloging, classification, and categorization. Cataloging is defined as the process of preparing items so they can be found in the library collection and located on the shelf, involving bibliographic description, subject analysis, and assigning classification symbols. Classification assigns a call number to locate each item in the library setting and realm of knowledge. Categorization involves arranging a collection by format, genre, or other attributes. The advantages of organizing by genre are also mentioned.
The network reshapes the research library collectionlisld
The library collection has been central to library identity and service, however we are now seeing major changes in how libraries help discover, curate and create collections. This is a response to evolving research and learning behaviors in a network environment. This presentation considers trends which are influencing how we think about library curatorial activities and are reshaping their collections. The first direction is the ‘inside-out library’ which is a response to the reorganization of research work by the digital environment. The second is the facilitated collections, which is a response to the reorganization of the information space by the network. The presentation discusses three ways in which we are thinking differently about collections: the inside out collection, the facilitated collection, and the collective collection.
The document discusses how changes in information access and discovery require changes to how libraries design metadata. It notes that while search engines have revolutionized resource discovery, companies like Google and Microsoft still rely on catalog records created by libraries. The document argues that both social tagging and cataloging sites show an interest in organization that libraries can harness. Overall it frames current changes as opportunities for libraries to refine their skills and roles in resource discovery.
What is the Role of the Professional Archivist in the Evolving Archival Space?Kate Theimer
My keynote address given in Christchurch, NZ at the joint conference of the Archives & Records Association of New Zealand and the Association of Australian Archivists in Christchurch.
Keynote presentation at the Lita Forum, Albuquerque. Research and learning practices are enacted in technology rich environments. New tools support digital workflows and the volume and variety of research and learning outputs are growing. Libraries are working to support these new environments and to connect their services to them.
Classifying toward an Ensemble of Works: an essay on the centrality of classi...Gwen Williams
Ordering large numbers of things and classification. Spatial arrangements of objects versus knowledge organization subordinated by classification schemes. Classifying the interdisciplinary book. Henry Evelyn Bliss. Disciplines and the relative stability of knowledge. Call number versus barcode number.
This document summarizes key concepts from a paper on the CIDOC Conceptual Reference Model (CRM), an ontology for semantic interoperability of cultural heritage data. It discusses the CRM's property-centric approach and methodology, which aims for read-only integration of heterogeneous cultural data sources. The CRM is designed to reconstruct possible past worlds from loosely correlated historical records in a way that allows for monotonic extension of the ontology over time without revising existing definitions.
The document discusses how archives are transitioning to participate in the digital environment by making materials available online, using technologies like chat and social tagging, while still protecting authenticity and original order. It questions how arrangement and description activities are affected and how archivists can participate in this transition. Examples of digital collections are provided and it raises issues around whether tools, processes and standards help or hinder users' discovery and understanding in a digital world.
The document discusses how archives are transitioning to participate in the digital environment by making materials available online, using technologies like chat and social tagging, while still protecting authenticity and original order. It questions how arrangement and description activities are affected and how archivists can participate in this transition. Examples of digital collections and tools are provided, and it asks if current processes and standards help or hinder discovery for users in a digital world.
Introduction to archival processing, presented as part of a one-day workshop on the same topic, Drexel University, April 23, 2010. Adapted with permission from training materials created by Holly Mengel for the PACSCL Hidden Collections Processing Project. http://clir.pacscl.org/
Digital preservation and curation of information.presentationPrince Sterling
This document summarizes key aspects of digital preservation and curation. It discusses the rapid growth of digital information and the need for new preservation models. Effective preservation practices require consistent maintenance and addressing technological and social challenges. Different organizational models are described, including government libraries, independent preservation libraries like Portico, and networked library efforts like LOCKSS and CLOCKSS. The roles and responsibilities of curators and repositories include ensuring sustainability, access, security and addressing copyright issues.
1) Libraries are collections of records of human culture that are organized and preserved to meet the information needs of individuals. They serve to conserve knowledge, act as gateways to information, promote education, preserve culture, and enable recreation.
2) There are several types of libraries including private, school, public, special/research, academic, and national libraries. Academic libraries in particular aim to enhance teaching, learning, and research at post-secondary institutions.
3) Libraries organize their collections through cataloguing and classification. Cataloguing involves describing items to ensure uniqueness while classification involves assigning subject headings for access. Reference sources and services also help users find needed information.
As man transcends in civilization, the place of libraries and other information centers becomes imperative to keep records of human civilization. This slide introduces you to the rudiment of library as an information hub thus a veritable material for all in quest for information on library use.
Presentation to Sydney Institute TAFE librarians about what I think the future holds for libraries. In particular, I talk about the UTS model, but there are points here relevant to all libraries. Given 7 December 2010.
‘The network reshapes the research library collection’ - Lorcan Dempsey (OCLC)CONUL Conference
1) Collections are no longer at the center of research library operations as the focus shifts to knowledge and information access.
2) Collections are viewed along a spectrum from owned to facilitated, with libraries assembling local and external services around user needs.
3) There is a trend toward more specialized local collections and collective collections organized at a network level for discovery, acquisition, and stewardship.
Similar to What\'s the Difference Between a Registrar and a Cataloger? (20)
3. The cataloging function is typically buried deep in the job description for the
registrar. In fact, most museums don’t have a position known as a cataloger, but
subsume cataloging within registration duties.
3
5. If cataloging is just a function of the registration process (at least in most situations),
then how do we define it? There is a subtle difference between the way CIDOC
describes cataloging and the way this randomly discovered definition of library
cataloging describes it. In the museum case, we are told that cataloging means
describing an object according to some system and arranging the resulting
information into a record. Nothing is implied about what is to be done with this
orderly record.
The library definition tells that the purpose of the record is to help us FIND the item
and that to do so, we should create the record so that it may be found in a variety of
different ways. The first definition emphasizes careful description. The second
emphasizes access to the information we create.
5
6. Occasionally we do find a position in a museum that is actually called a “cataloger”.
Note that this position reflects the CIDOC definition fairly accurately. Also note that
this position reports to a curator and not a registrar. In fact, in the few instances I
was able to locate cataloger positions in museums, they all reported to curators, not
collections managers. Also, in this case as in most of the others I found, these
positions were temporary.
6
7. This is the job description for the curatorial cataloger where I work. It reports to a
relatively new position at the museum known as the Programs director. This person
is, in practice, a curator, although his other duties include management of a nascent
education department and the creation of symposia, workshops and seminars. I
should also note that our institution includes a library and manuscripts archive along
with the museum.
7
8. In early 2004 I posted a number of questions to the MCN list that were intended to
be not so much a rigorous survey as a way to incite a conversation about the role of
cataloging in museums and the use of cataloging standards
Only in the larger museums were people actually dedicated to the task of cataloging
objects and only in the rarest of circumstances was that task carried out on a full-
time basis.
In all cases, these people reported to the collections manager
8
9. Cataloging was usually described as something that was done on an as-needed
basis. If a lot of stuff was acquired, there was a lot of cataloging
9
10. The real truth here is that very few places actually seem to employ the vocabulary
standards that we take for granted as of utmost importance. I sure was relieved to
discover that we weren’t the only place in the world that couldn’t seem to get this act
together!
Actually, the response seemed to explicate the conception of what cataloging
actually means in most cases. For the most part, it’s about providing an accurate
description of an object so that you can be sure that the object you’re looking at is
really the one described in the record and that you therefore match it to its
administrative data. It’s almost never about facilitating an ad hoc search across a
set of broad categories.
The quote is by a librarian in a museum. It came in the context of discussing the
problems of getting folks who had very full plates to learn how the standards work
and how to apply them. And it also spoke to a sense of insularity that is felt not just
between museums, but between different groups and departments within museums.
How does this happen? What is it about our particular culture, organizational
structure, values or whatever that leads to what in many cases becomes a
devaluing of cataloging as a profession and the trivializing of the standards that are
designed for that profession?
10
11. Public Access vs. mediated Presentation
Perhaps the most fundamental difference in approach between libraries and
museums, is in their relationship to the public. The mission of the library is to
provide access to its holdings by the public. By definition this assumes that
information is extracted by the patron and not a curator. In contrast, in a typical
museum information about the collections is dispensed pedagogically via exhibits,
publications, public lectures and symposia. The only people accessing the database
without programmatic guidance are museum staff.
In terms of information system design, the library assumes a public access system
providing largely unmediated access to information about its holdings. The Museum,
on the other hand, operates on the implicit assumption that information on
collections will be accessed primarily by staff members in the process of putting
together mediated presentations of museum holdings for the public.
In the former case, the system emphasis will be on “discovery;” the ability to locate
relevant material within the database. In the latter case, the emphasis will be on
depth of description and unique physical attributes: curatorial staff, for the most part,
knows what is in the collection and how to find it within the database. What they
need from the database is accurate ownership information, dimensions and
thorough descriptions.
11
13. Effects of “Inward” vs. “Outward” Orientation
Facilitating discovery involves the adoption of standardized descriptive techniques,
including the use of standardized categories and vocabularies. These standardized data
structures and vocabularies make it possible for researchers to work comfortably in
systems at many institutions without needing to learn the idiosyncrasies of local
terminology. Standards also facilitate public access via the Internet and, of significance to
potential inter-institutional collaboration, make possible the creation of union catalogs. This
is the technical area of information services that bibliographic and archival catalogers are
trained in. In the past decade it has been increasingly important in museum cataloging as
well.
With certain exceptions, the Museum’s emphasis on depth of information, combined with its
reduced need to facilitate discovery, diminishes the need for controlled vocabularies and
content standards. While it is true that terminology employed by curators tends to be highly
specialized, it is not necessarily the same terminology adopted in standards such as the
AAT or the ULAN or even at other institutions by other curators. At the same time, the
orientation to an audience that is almost exclusively internal decreases any interest in
adopting widely accepted standards in the information management professions. The
feeling that “we know what we’re talking about” overrides interest in adopting widely used
standards or even in making this information publicly accessible. What has happened at
THNOC is that the majority of relevant and detailed information input by members of the
“curatorial” staff is stored only in free-text description fields. This information can be
extracted during a search by in-house users who know and understand our terminology, but
the data is much less accessible to users outside of the collection. In the case of
information entered into category-specific fields, such as object type, Medium and even
Maker, cataloging has often not used standard vocabularies or even in-house authority
terms.
13
14. At the same time, the opposite trend has taken place with processing staff assigned
to manuscripts and library materials. There, emphasis has moved increasingly
toward the adoption of national and international information standards. The
THNOC library has been cataloging all new materials within the OCLC library
system for many years. The manuscripts department has adopted both the use of
MARC format cataloging for collection level data, and Encoded Archival Description
for the production of finding aids. This has been done even though our ability to
display and access data in these formats is almost non-existent. It’s sort of a leap of
faith – the belief that we would someday be able to put this data in a real system –
but it also reflects a fundamental professional viewpoint: it is difficult for folks trained
as librarians and archivists to see the museum CMS as an information retrieval
system.
[1] See the Online Archive of California, www.oac.cdlib.org/, The Consortium for the
Interchange of Museum Information (CIMI), www.cimi.org/, The Open Archives
Initiative, www.openarchives.org/
14
15. So what it comes down to is that we catalog stuff when the stuff itself is going to be
sent somewhere or put on display or have it’s picture taken and put in a book or on
a web site.
To add a thought to the second quote: not only does access to information call
attention to the way information moves in and out of museums, it is the movement
of objects in and out of museums that calls attention to problems of access. And the
huge danger is that descriptive cataloging tends to occur only at these transition
points – when the object is going on display, or loaded to a web site or a digital
library – and that this now-fixed information stays at those transition points; i.e. on
the web site, in the digital library, in the book, on the wall label, and NOT in the core
information system for the museum? How often is it that the only time that
standards for descriptive cataloging are really adhered to is when the destination
requires it, such as in a digital library. How often has extensive label copy been
written that never gets back into the collection record, even though every modern
CMS is designed to facilitate this? How often have Dublin Core records been
created from scratch for uploading to a digital library because they can’t be pulled
from the CMS?
15
17. We’re unique – don’t hear this as much as you used to, but still a favorite claim.
There is also the common misconception that a vocabulary standard imposes a
strait-jacket-like constraint on use of descriptive terminology, whereas the
recommendations are generally to use and/or adapt terminology as needed. Indeed,
the hardest concept for many museums is the understanding that a controlled
vocabulary is one that is consistent. Also, the adoption of standards means
designing local practice and lexicons in such a way that you can map your system
to another system that is documented, known and understood by other institutions
and system vendors.
The argument that we don’t share our data with others is a typically a narrowly
interpretation of the concept of “other” that designates the other as someone from
outside the institution that conveniently neglects the data that is supplied to the
Education and Development departments and assumes that the institution will never
migrate to another system.
Lack of resources is a very serious issue in most institutions, but in many cases the
argument that inadequate resources requires the institution to stop cataloging
acquisitions is probably symptomatic of the structural indifference to the extended
value of the collections data. When such decisions are made, how often is
extensive research on items presented on web sites and in exhibitions continued?
When such decisions are made, are records still being prepared for submissions to
digital libraries? Does it seem likely that catalogers would be laid off in libraries who
acquired primarily rare materials that had no footprint in OCLC?
17
18. There are many standards in existence and many that are in use in most museums.
Many of these are simply part of the environment and we use them without any
more thought than we give to the standards that supply the 120 volt power we
power or machines with
18
19. There are many conventions that we use directly in our work that suffer little
controversy because they are part of the software systems that we use every day.
These are implemented by our vendors and not only are they accepted by users,
they often come to shape our workflows and practices.
19
20. Finally, there are “optional” standards, and the vocabulary standards typically fall
into this category. Here we often run into arguments over adoption and
implementation, simply because we have to think about them. We realize that we
are possibly expected to change long-standing practices that, viewed from the
standpoint of daily routine seem “better.”
20
22. The problem of NOT adopting – and adapting – standards is that the in-house
standards, assuming they exist, are typically designed to service the needs of a
specific area of the institution – one or more of the famous information “silos” that
develop in many companies and institutions. As such, they produce data that
becomes difficult to re-purpose which really means moving between systems.
Also, while a locally developed system may be better than a standard, it also
requires local maintenance. Maintaining such a system adds a significant layer of
work to the institution, work that is typically not done.
Finally, even if you do none of the activities that require integration with other
systems, you will still have the problem of moving your data to a new system. You
will be sharing your data with yourself in about 6 to 8 years when you replace your
system. In the case of THNOC, a migration of the collections information from our
14 year old CMS to our new system required 6 months of planning and a cost of
36,000 dollars. On the other hand it took hours to import our MARC format data into
our library system and minutes to get our EAD formatted Manuscripts finding aids
into our archival system
22
25. The level playing field can be seen in the marketplace with off-the-shelf products
that implement standards that have been adopted by professional organizations,
thus guaranteeing a market,
25
26. Or totally new categories of product, such as a CMS sold as a subscription
application service that relies for its sales appeal on a widely accepted data
standard?
26
27. The most important way to think of standards is as an “exit strategy” or a way to bail
on a product or method that you don’t like or can’t use anymore. Not everything
uses the same standard, but being able to move between them is the reason they
exist. In the data field we call the tools to do this “cross-walks”. Think of the brick
that connects your laptop computer to the wall outlet as a cross-walk between A/C
and D/C current.
27
28. Take it seriously
The people who do this work are specialists. They need training and authority to
over-rule some smart and very powerful people in your institution
28