158 resultados para Library extension
Resumo:
The literature around Library 2.0 remains largely theoretical with few empirically studies and is particularly limited in developing countries such as Indonesia. This study addresses this gap and aims to provide information about the current state of knowledge on Indonesian LIS professionals’ understanding of Library 2.0. The researchers used qualitative and quantitative approaches for this study, asking thirteen closed- and open-ended questions in an online survey. The researchers used descriptive and in vivo coding to analyze the responses. Through their analysis, they identified three themes: technology, interactivity, and awareness of Library 2.0. Respondents demonstrated awareness of Library 2.0 and a basic understanding of the roles of interactivity and technology in libraries. However, overreliance on technology used in libraries to conceptualize Library 2.0 without an emphasis on its core characteristics and principles could lead to the misalignment of limited resources. The study results will potentially strengthen the research base for Library 2.0 practice, as well as inform LIS curriculum in Indonesia so as to develop practitioners who are able to adapt to users’ changing needs and expectations. It is expected that the preliminary data of this study could be used to design a much larger and more complex future research project in this area.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
Although they sit outside the formal education sector, libraries are intrinsically centres of learning where people can engage with knowledge and ideas and acquire the literacy skills that are essential for active participation in an increasingly digital society. In Australia, National and State Libraries Australasia (NSLA) has acknowledged the need to not only better understand the general concept of the library as a learning institution, but also to help the individual NSLA libraries specifically identify their capabilities in this arena. The NSLA Literacy and Learning project aimed to improve the members' organisational comprehension and practice as learning institutions and to help them conceptualise their ability to deliver literacy and learning programmes that will benefit their staff and their communities. The NSLA concept of learning institution encompassed two discrete lenses: the internal lens of the library's own organisational understanding and practice, and the external lens of the clients who engage in the literacy and learning programmes delivered by the library. The ultimate goal was to develop a matrix which could enable libraries to assess their perceived levels of maturity as learning institutions along a continuum of emerging to active capabilities. The matrix should also serve as a tool for shared understanding about the NSLA's own strategic directions in the literacy and learning space. This case study documents the evolving process of developing a learning institution maturity framework for libraries that considers individual, team and organisational learning, as well as clients' interactions with the organisation, with the goal of producing a framework that has the potential to measure the value of learning and growth in both the library's staff and the library's communities
Resumo:
This study determined factors which influenced Canadian provincial (state) politicians when making funding decisions for public libraries. Using the case study methodology, Canadian provincial/state-level funding for public libraries in the 2009-2010 fiscal year was examined. The data were analyzed to determine whether Cialdini’s theory of influence and specifically any of the six tactics of influence (i.e., commitment and consistency, authority, liking, social proof, scarcity, and reciprocity) were instrumental in these budgetary decision-making processes. Findings show the principles of “authority,” “consistency and commitment,” and “liking” were relevant, and that “liking” was especially important to these decisions.
Resumo:
Notwithstanding the interest over many years by scholars in modeling the internationalization of the firm, the initial transition for the firm from domestic to international operations remains under-researched. We identify the behavioral factors that are important at the pre-internationalization state and discuss how they may interrelate to influence a decision to commit to internationalization through export commencement. We study export commitment by proposing and constructing an index that incorporates the factors that influence a firm’s propensity to commit to export activities. Utilizing the items from this index in a logistic regression analysis, we distinguish between the pre-internationalization characteristics of exporting and non-exporting firms to better understand the key influences in export commitment. Implications are discussed.
Resumo:
Citizen science projects have demonstrated the advantages of people with limited relevant prior knowledge participating in research. However, there is a difference between engaging the general public in a scientific project and entering an established expert community to conduct research. This paper describes our ongoing acoustic biodiversity monitoring collaborations with the bird watching community. We report on findings gathered over six years from participation in bird walks, observing conservation efforts, and records of personal activities of experienced birders. We offer an empirical study into extending existing protocols through in-context collaborative design involving scientists and domain experts.
Resumo:
Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
This research investigated the ways academic libraries are using social media and adopting participatory principles in their programs and services. Using the Grounded Theory method the research developed an empirically derived model for participatory libraries. The research revealed three core categories representing the participatory library: community, empowerment, and experience. The research provides library professionals, researchers and the library community, with a fresh perspective and holistic picture of the contemporary library. The findings can be used to guide the development of participatory libraries in Australia and internationally.
Resumo:
A new strategy for rapidly selecting and testing genetic vaccines has been developed, in which a whole genome library is cloned into a bacteriophage λ ZAP Express vector which contains both prokaryotic (Plac) and eukaryotic (PCMV) promoters upstream of the insertion site. The phage library is plated on Escherichia coli cells, immunoblotted, and probed with hyperimmune and/or convalescent-phase antiserum to rapidly identify vaccine candidates. These are then plaque purified and grown as liquid lysates, and whole bacteriophage particles are then used directly to immunize the host, following which PCMV-driven expression of the candidate vaccine gene occurs. In the example given here, a semirandom genome library of the bovine pathogen Mycoplasma mycoides subsp. mycoides small colony (SC) biotype was cloned into λ ZAP Express, and two strongly immunodominant clones, λ-A8 and λ-B1, were identified and subsequently tested for vaccine potential against M. mycoides subsp. mycoides SC biotype-induced mycoplasmemia. Sequencing and immunoblotting indicated that clone λ-A8 expressed an isopropyl-β-d-thiogalactopyranoside (IPTG)-inducible M. mycoides subsp. mycoides SC biotype protein with a 28-kDa apparent molecular mass, identified as a previously uncharacterized putative lipoprotein (MSC_0397). Clone λ-B1 contained several full-length genes from the M. mycoides subsp. mycoides SC biotype pyruvate dehydrogenase region, and two IPTG-independent polypeptides, of 29 kDa and 57 kDa, were identified on immunoblots. Following vaccination, significant anti-M. mycoides subsp. mycoides SC biotype responses were observed in mice vaccinated with clones λ-A8 and λ-B1. A significant stimulation index was observed following incubation of splenocytes from mice vaccinated with clone λ-A8 with whole live M. mycoides subsp. mycoides SC biotype cells, indicating cellular proliferation. After challenge, mice vaccinated with clone λ-A8 also exhibited a reduced level of mycoplasmemia compared to controls, suggesting that the MSC_0397 lipoprotein has a protective effect in the mouse model when delivered as a bacteriophage DNA vaccine. Bacteriophage-mediated immunoscreening using an appropriate vector system offers a rapid and simple technique for the identification and immediate testing of putative candidate vaccines from a variety of pathogens.
Resumo:
Ascidians are marine invertebrates that have been a source of numerous cytotoxic compounds. Of the first six marine-derived drugs that made anticancer clinical trials, three originated from ascidian specimens. In order to identify new anti-neoplastic compounds, an ascidian extract library (143 samples) was generated and screened in MDA-MB-231 breast cancer cells using a real-time cell analyzer (RTCA). This resulted in 143 time-dependent cell response profiles (TCRP), which are read-outs of changes to the growth rate, morphology, and adhesive characteristics of the cell culture. Twenty-one extracts affected the TCRP of MDA-MB-231 cells and were further investigated regarding toxicity and specificity, as well as their effects on cell morphology and cell cycle. The results of these studies were used to prioritize extracts for bioassay-guided fractionation, which led to the isolation of the previously identified marine natural product, eusynstyelamide B (1). This bis-indole alkaloid was shown to display an IC50 of 5 μM in MDA-MB-231 cells. Moreover, 1 caused a strong cell cycle arrest in G2/M and induced apoptosis after 72 h treatment, making this molecule an attractive candidate for further mechanism of action studies.