Acknowledgments |
|
xi | |
Introduction |
|
xiii | |
|
Chapter 1 Getting Started |
|
|
1 | (12) |
|
Should You Build a Repository? |
|
|
1 | (5) |
|
|
6 | (4) |
|
Getting Your Repository off the Ground |
|
|
10 | (3) |
|
Chapter 2 Choosing a Repository Architecture |
|
|
13 | (14) |
|
Questions to Ask before Choosing an Architecture |
|
|
13 | (12) |
|
Who Are the Users and What Do They Need? |
|
|
14 | (1) |
|
What Types of Collections Will It Contain? |
|
|
15 | (1) |
|
|
15 | (1) |
|
What Rights Management and Access Controls Do You Need? |
|
|
16 | (1) |
|
How Does the Repository Handle Preservation? |
|
|
17 | (2) |
|
How Will the Repository Be Managed? |
|
|
19 | (1) |
|
Other High-Level Platform Decisions |
|
|
19 | (6) |
|
Building the Reguirements List |
|
|
25 | (2) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Resource and Data Management |
|
|
26 | (1) |
|
Chapter 3 Acquiring, Processing, Classifying, and Describing Digital Content |
|
|
27 | (22) |
|
|
27 | (2) |
|
|
29 | (3) |
|
|
32 | (4) |
|
|
33 | (1) |
|
|
33 | (1) |
|
Kick the Can down the Road |
|
|
34 | (1) |
|
|
35 | (1) |
|
Organizing Content and Assigning Metadata |
|
|
36 | (1) |
|
|
37 | (4) |
|
|
40 | (1) |
|
|
41 | (3) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Protecting the Integrity of Resources |
|
|
46 | (3) |
|
Chapter 4 Preservation Planning |
|
|
49 | (16) |
|
What Is Digital Preservation? |
|
|
50 | (2) |
|
Preserving the Content and Context, Not the Medium |
|
|
52 | (4) |
|
Why Preservation Doesn't Happen |
|
|
56 | (2) |
|
|
58 | (1) |
|
Preservation File Formats |
|
|
59 | (1) |
|
Cloud-Based Digital Preservation Services |
|
|
60 | (2) |
|
|
62 | (3) |
|
Chapter 5 General--Purpose Technologies Useful for Digital Repositories |
|
|
65 | (50) |
|
The Changing Face of Metadata |
|
|
66 | (1) |
|
|
67 | (31) |
|
|
68 | (2) |
|
|
70 | (7) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (7) |
|
Why Use XML-Based Metadata |
|
|
79 | (1) |
|
|
79 | (7) |
|
XML Offers a Quicker Cataloging Strategy |
|
|
86 | (2) |
|
Multi-Formatted and Embedded Documents |
|
|
88 | (1) |
|
Metadata Becomes "Smarter" |
|
|
89 | (1) |
|
Metadata Becomes "Connected" |
|
|
89 | (9) |
|
Not Just a Library Standard |
|
|
98 | (1) |
|
|
98 | (6) |
|
|
104 | (3) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
REST (Representational State Transfer) |
|
|
107 | (1) |
|
SPAROL (SPAROL Protocol and RDF Query Language) |
|
|
108 | (1) |
|
SRU (Search and Retrieval via URL) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Future of Software Development |
|
|
109 | (1) |
|
Mobile Application Development |
|
|
110 | (1) |
|
Applications Continue to Become More Micro |
|
|
110 | (1) |
|
Deeper Reliance on Interpreted Languages and JavaScript |
|
|
110 | (1) |
|
|
111 | (101) |
|
|
112 | (3) |
|
Chapter 6 Metadata Formats |
|
|
115 | (38) |
|
|
116 | (34) |
|
|
118 | (4) |
|
|
122 | (1) |
|
|
123 | (6) |
|
|
129 | (3) |
|
|
132 | (3) |
|
|
135 | (5) |
|
|
140 | (1) |
|
Domain-Specific Metadata Formats |
|
|
141 | (2) |
|
Embedded Metadata Formats |
|
|
143 | (1) |
|
PCDM (Portland Common Data Model) |
|
|
143 | (1) |
|
|
144 | (6) |
|
|
150 | (3) |
|
Chapter 7 Sharing Data: Harvesting, Linking, and Distribution |
|
|
153 | (34) |
|
The Evolving Role of Libraries |
|
|
154 | (1) |
|
Metadata Doesn't Want to Be Free If It Did, It Would Be Easy |
|
|
155 | (2) |
|
|
157 | (3) |
|
|
160 | (10) |
|
|
160 | (5) |
|
|
165 | (1) |
|
|
166 | (4) |
|
|
170 | (9) |
|
|
171 | (8) |
|
Facilitating Third-Party Indexing |
|
|
179 | (1) |
|
|
180 | (4) |
|
The Oregon State University Electronic Theses Process |
|
|
180 | (2) |
|
The Ohio State University Libraries: Automatic Data Transfer of Digital Content between the Internet Archive and the HathiTrust |
|
|
182 | (2) |
|
|
184 | (3) |
|
Chapter 8 Access Management |
|
|
187 | (14) |
|
|
187 | (5) |
|
Access Control Mechanisms |
|
|
192 | (7) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Central Authentication Service (CAS) |
|
|
195 | (1) |
|
Security Assertion Markup Language (SAML) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
OAuth and Social Media Authentication |
|
|
196 | (1) |
|
|
197 | (600) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Implementing Access Control |
|
|
199 | (2) |
|
Chapter 9 Thinking about Discovery |
|
|
201 | (26) |
|
|
202 | (2) |
|
Federated Search and Digital Libraries |
|
|
204 | (1) |
|
Why Think about Discovery |
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (71) |
|
|
209 | (2) |
|
|
211 | (5) |
|
|
216 | (63) |
|
|
219 | (1) |
|
|
220 | (7) |
|
DOI (Digital Object Identifiers) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Chapter 10 Planning for the Future |
|
|
227 | (16) |
|
Providing Information That People Need |
|
|
227 | (1) |
|
|
228 | (2) |
|
|
230 | (3) |
|
|
233 | (2) |
|
Consolidation and Specialization |
|
|
235 | (1) |
|
|
236 | (4) |
|
|
240 | (7) |
|
|
241 | (1) |
Index |
|
243 | |