SlideShare une entreprise Scribd logo
1  sur  15
Discovery & Access Gretchen Gueguen University of Virginia
What is Discovery & Access Discovery and Accessrefers to the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users. 
Access in Action Query Dissemination Request D&A System User Data Query Query response DIP Query response DIP request DIP dissemination AIP request Archival Storage DIP Generation AIP dissemination
Goals of D&A ,[object Object]
find out about material
understand whether it is available
access it
To apply appropriate access restrictions in order to protect private and sensitive information as well as intellectual property.
To provide access to material in a format and/or environment that presents the original’s significant properties.,[object Object]
Discovery
Access… ,[object Object]
What format is the material?
What are the restrictions?
What tools or infrastructure is available? ,[object Object]
Authenticated or Not  (A, N)

Contenu connexe

En vedette

Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Seth Shaw
 
AIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS_Archives
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS_Archives
 
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS_Archives
 
AIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS_Archives
 
AIMS workshop: Introduction
AIMS workshop: IntroductionAIMS workshop: Introduction
AIMS workshop: IntroductionAIMS_Archives
 
AIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS_Archives
 
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS_Archives
 

En vedette (9)

Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
Providing Remote-yet-Restricted Access to Born-Digital Electronic Records usi...
 
AIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning EvolutionAIMS Workshop Case Study 2: Accessioning Evolution
AIMS Workshop Case Study 2: Accessioning Evolution
 
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
AIMS Workshop Case Study 3: Arrangement and Description Case Study - Stephen ...
 
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom CenterAIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
AIMS Workshop Case Study 3b: Born-Digital Materials at the Ransom Center
 
AIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: AccessioningAIMS Workshop pt. 2: Accessioning
AIMS Workshop pt. 2: Accessioning
 
AIMS workshop: Introduction
AIMS workshop: IntroductionAIMS workshop: Introduction
AIMS workshop: Introduction
 
AIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection DevelopmentAIMS Workshop pt .1: Collection Development
AIMS Workshop pt .1: Collection Development
 
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid CollectionsAIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
AIMS workshop Case Study 4: Discovery and Access to Hybrid Collections
 
Making the Case for Tablets in your Library
Making the Case for Tablets in your LibraryMaking the Case for Tablets in your Library
Making the Case for Tablets in your Library
 

Similaire à Discovery and access systems

2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorialJosh Young
 
Towards a digital library for York
Towards a digital library for YorkTowards a digital library for York
Towards a digital library for YorkJulie Allinson
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationMANENDRASINGH30
 
Introducing Dspace @ ILRI
Introducing Dspace @ ILRIIntroducing Dspace @ ILRI
Introducing Dspace @ ILRIILRI
 
Data management plans
Data management plansData management plans
Data management plansBrad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
AfA - Liddy Nevile
AfA  - Liddy NevileAfA  - Liddy Nevile
AfA - Liddy Nevileozewai
 
Data Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryData Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryAnita de Waard
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeDalal Rahme
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011DLFCLIR
 
Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...GarethKnight
 
Saa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesSaa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesAIMS_Archives
 
Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Artificial Intelligence Institute at UofSC
 
D paul ecn2013
D paul ecn2013D paul ecn2013
D paul ecn2013ECNOfficer
 
Data Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumData Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumMerce Crosas
 
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...WiLS
 

Similaire à Discovery and access systems (20)

2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial2016 Ocean Sciences Meeting tutorial
2016 Ocean Sciences Meeting tutorial
 
Towards a digital library for York
Towards a digital library for YorkTowards a digital library for York
Towards a digital library for York
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
Introducing Dspace @ ILRI
Introducing Dspace @ ILRIIntroducing Dspace @ ILRI
Introducing Dspace @ ILRI
 
Data management plans
Data management plansData management plans
Data management plans
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
AfA - Liddy Nevile
AfA  - Liddy NevileAfA  - Liddy Nevile
AfA - Liddy Nevile
 
Data Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost RecoveryData Repositories: Recommendation, Certification and Models for Cost Recovery
Data Repositories: Recommendation, Certification and Models for Cost Recovery
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Hypatia for dlf 2011
Hypatia for dlf 2011Hypatia for dlf 2011
Hypatia for dlf 2011
 
Electronic Records
Electronic RecordsElectronic Records
Electronic Records
 
Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...Research Data Management: What is it and why is the Library & Archives Servic...
Research Data Management: What is it and why is the Library & Archives Servic...
 
Saa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting RepositoriesSaa Session 502 Born Digital Archives in Collecting Repositories
Saa Session 502 Born Digital Archives in Collecting Repositories
 
Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...Federated Architecture with Provenance and Access Control to realize Open Dig...
Federated Architecture with Provenance and Access Control to realize Open Dig...
 
D paul ecn2013
D paul ecn2013D paul ecn2013
D paul ecn2013
 
Digital Curation 101 - Taster
Digital Curation 101 - TasterDigital Curation 101 - Taster
Digital Curation 101 - Taster
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
Data Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access SymposiumData Publishing at Harvard's Research Data Access Symposium
Data Publishing at Harvard's Research Data Access Symposium
 
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...Setting a Course for Success: Getting Started with Digital Preservation in Yo...
Setting a Course for Success: Getting Started with Digital Preservation in Yo...
 

Dernier

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Discovery and access systems

  • 1. Discovery & Access Gretchen Gueguen University of Virginia
  • 2. What is Discovery & Access Discovery and Accessrefers to the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users. 
  • 3. Access in Action Query Dissemination Request D&A System User Data Query Query response DIP Query response DIP request DIP dissemination AIP request Archival Storage DIP Generation AIP dissemination
  • 4.
  • 5. find out about material
  • 6. understand whether it is available
  • 8. To apply appropriate access restrictions in order to protect private and sensitive information as well as intellectual property.
  • 9.
  • 11.
  • 12. What format is the material?
  • 13. What are the restrictions?
  • 14.
  • 16. Online (email, download) vs. "Physical" (disc) Transfer (O, P)
  • 17.
  • 18. Access Models RAOS(Remote, Authenticated, Online, Static) Institutional Respository with institutional login gain access INPD(In-person, Non-Authenticated, Physical, Dynamic) Researcher is handed a disc in the reading room with files specifically downloaded for them RNPD(Remote, Non-Authenticated, Physical, Dynamic)   Researcher contacts the archive and is sent a disk of files migrated to pdf especially for them. IAOS(In-person, Authenticated, Online, Static) Researcher requests access and once granted visits reading room to access a specific repository of files
  • 23. Discussion Read through the scenario given to your table group and come up with a plan addressing: How you will survey the content Copyright and privacy issues Acquiring the content Arranging and describing the content How you might provide access *this activity used with the permission of Matt Kirschenbaum and Naomi Nelson under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. http://creativecommons.org/licenses/by-nc-nd/3.0/us/

Notes de l'éditeur

  1. We now come to the last section of the AIMS framework: discovery and access. We’ve described this function for the purposes of the framework as “the systems and workflows that make processed or unprocessedmaterial and the metadata that support it available to users.”Discovery and access is also not possible without completion of many of the prior steps described in this model. The outcomes of those steps have a significant impact on what is either appropriate or achievable in terms of discovery and access. Given the impact of these prior steps on discovery and access it is crucial to consider the desired outcomes for discovery and access as early as possible — ideally during the Collection Development phase — and to continue to update and revise these plans are work on the collection progresses.
  2. Discovery and access is also the only one of the functions that is really reactionary to a user request. The process of discovery and access requires some action on the part of individual users – for example carrying out a search. While we can and should create an accessible environment before users try to access material, many part of the process rely on them to initiate actions.This diagram is based on a figure from the OAIS model that describes the functions an archival information system should be able to support related to access. The user initiates the process by either making a query (or a search of metadata) or by making a dissemination request (or a request for the DIP)
  3. Overall though, we have three major goals in discovery and access.The first is to make material available to user communities. This includes ensuring that the users can find the material, understand if it’s available, and get access to it if possibleHowever, that access must follow guidelines for access restrictions related to privacy, and intellectual property.An overarching goal of all three is to ensure that the significant properties of the material are inherent in whichever form the DIP takes.
  4. To successfully achieve these goals, we have to first start with discovery. We identified two major types of discovery for the AIMS framework. The first is discovery via metadata, in the case shown here that is a collection guide.When you are creating metadata for access you have to consider whether or not the metadata is this suitable for discovery? This may be different than creating metadata for administrative or preservation purposes. Another important consideration is how the metadata is indexed and searched. Will that suit the level of access needed by the user audience?Most of us are pretty familiar with this concept so I’ll move on. 
  5. With born-digital materials we can also consider access to full text or content where it exists in searchable form. [click]When you are providing access in a system that can provision access to both metadata and full-text at the same time you may consider creating less metadata, or creating a different kind of metadata, or treating the index of full text differently than the index of metadata.
  6. The other component is the access itself. While your discovery method may involve the text, that doesn’t mean you have to make the full-text itself available (think of Google snippets for example).The AIMS framework highlights a few questions to examine when thinking about how to provision access.Who are the "typical users"?What format is the material?What are the restrictions?What tools or infrastructure is available? These questions then lead to thinking about the generic access model
  7. These questions then lead to thinking about the generic access model, which has several characteristics:In-person vs. Remote access (I, R)In-person means the research comes to the reading room to use the files, remote means they do not (this does not necessarily mean online access)Authenticatedor Not  (A, N)Authenticated or not refers to whether or not the user has to show some kind of credential to see the material. Typically this is only an issue for online accessOnline (email, download) vs. "Physical" (disc) Transfer (O, P)Online access means the files are transmitted online via email, download or viewing on a website. Physical means the researcher is handed or mailed a diskStatic vs. Dynamic DIP Generation (S, D)Static DIP Generation means that a pre-fabricated DIP is stored … think of the pdf versions of articles in Institutional Repositories. Whereas, Dynamic DIP Generation just means that the DIP is created specfically for the user per their request…so they may want migrated files or not, for example. The combination of these characteristics then articulates the generic type of access you would be allowing to content. That doesn’t mean that this is the ONLY way you would provide access just that this would be your default option. You may change it based on the user, their request, or as your technological capabilities evolve.
  8. The combination of these characteristics then articulates the generic type of access you would be allowing to content. That doesn’t mean that this is the ONLY way you would provide access just that this would be your default option. You may change it based on the user, their request, or as your technological capabilities evolve.Now not all of these combinations are possible, or even sensible, but thinking of the them as distinct parameters helps to think through the possibilities
  9. So here are a couple of examples:Remote, Authenticated, Onlineand Static would be typified by an online database that is behind a loginWhereas In-person, non-authenticated, physical, and dynamic would be a model where a person must come to the reading room and be handed a disc created with the specific material they requested.Remote, Non-Authenticated, Physical, Dynamic could still have an online component if the researcher contacts the archive via email, but the transfer of material itself is done on a disc that is mailed to themFinally, In-person, Authenticated, Online, Static is somewhat implausible, but a researcher would have to physically visit the reading AND get some sort of permission to access a specific repository of files, locked down by IP for instance
  10. So, when we combine a mode of discovery with an access option we see the full discovery and access model in practice. This image is of a researcher using the Salman Rushdie collection at Emory University. Although a large portion of the collection is born-digital, the researcher must physically come to the reading and use a specific computer with Rushdie’s emulated computer as well as a repository of his files, the text of which can be searched. They may not download or be emailed the material.
  11. This example comes from my former employer ECU. In this case we have a collection guide with digitized and born digital material embedded within. In this case the full text, if it exists, is not searched through the finding aid search (although it can be searched in a separate repository search) 
  12. Finally, this is the planned interface for born-digital materials at the Bodleian Library in the UK. They are creating a repository to search the content and metadata of the born-digital materials held in personal papers. The access here is primarily through the repository, although there are also links out to objects in this repository through the collection guide.
  13. So at this time, I’d like to introduce Erin O’Meara from the University of North Carolina at Chapel Hill. Erin is going to talk with us about how UNC is dealing with discovery and access to hybrid collections within EAD.