Scholarly Work - Library
Permanent URI for this collectionhttps://scholarworks.montana.edu/handle/1/320
Browse
21 results
Search Results
Item Scaling up: How data curation can help address key issues in qualitative data reuse and big social research. Introduction (Ch. 1) - Insights from Interviews with Researchers and Curators (Ch. 7).(Springer Nature, 2024) Mannheimer, SaraThis book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies the key issues of context, data quality and trustworthiness, data comparability, informed consent, privacy and confidentiality, and intellectual property and data ownership. Through interviews of qualitative researchers, big social researchers, and data curators, the author further examines each key issue and produces new insights about how domain differences affect each community of practice’s viewpoints, different strategies that researchers and curators use to ensure responsible practice, and different perspectives on data curation. The book suggests that encouraging connections between qualitative researchers, big social researchers, and data curators can support responsible scaling up of social research, thus enhancing discoveries in social and behavioral science.Item Teaching Privacy Using Learner-Centered Practices in a Credit-Bearing Context(ACRL, 2023) Young, Scott W. H.; Mannheimer, SaraThis chapter describes practices of teaching privacy to undergraduate students in a credit-bearing context. The chapter features a discussion of a semester-long course, Information Ethics and Privacy in the Age of Big Data. This chapter opens by briefly outlining three points of consideration for approaching a semester-long course. We then highlight three assignments from the course that we think are particularly useful and adaptable for teaching privacy. We include excerpts from course materials and student feedback to illustrate specific points. The chapter concludes with a self-reflective assessment of our experience as teachers. We co-taught the course with a pedagogical viewpoint of learner-centered participation and trust, an approach that we have previously discussed in detail. The course was built around reflective and co-creative activities that make space for students to bring their own experiences and perspectives into the classroom, including self-evaluation, student-led discussion sessions, small-group discussions, creative activities, and hands-on projects. We intend for the assignments and topics of this chapter to be used beyond a credit-bearing context. Librarians teach in so many different contexts. With that in mind, we offer points of consideration for adapting our assignments for other settings, like workshops, one-shot instruction, or a sequence of course-embedded instruction to be completed over two or three class sessions.Item Radical Collaboration: Making the Computational Turn in Special Collections and Archives(2019-11) Shanks, Justin D.; Mannheimer, Sara; Clark, Jason A.As more archival collections are digitized or born-digital, the work of archivists increasingly overlaps with the work of librarians who are responsible for research data and digital scholarship. This editorial uses Nancy McGovern's idea of radical collaboration as a framework, presenting a case study from Montana State University Library in which we collaborated across the domains of research data management, digital scholarship, archives, and special collections to integrate computational approaches into research, teaching, and service aspects of digital archival collections.Item Service Blueprinting: A Method for Assessing Library Technologies within an Interconnected Service Ecosystem(Taylor & Francis, 2019-06) Young, Scott W. H.; Mannheimer, Sara; Rossmann, Doralyn; Swedman, David; Shanks, Justin D.Service blueprinting is a method for designing, assessing, and improving services. This article provides a practical overview of the service blueprinting process for library technology services. We begin by outlining the recent conversation around library technologies, service design, and service blueprinting. We then detail an iterative case study for the creation process of a service blueprint, followed by a discussion of the service insights and improvements that resulted from this activity. We conclude by offering a set of recommendations for creating and analyzing service blueprints. Ultimately, the service blueprint is a useful tool for understanding the operation of a service, and for situating that service within a broader and interconnected library ecosystem.Item A National Forum on Web Privacy and Web Analytics: Action Handbook(Montana State University, May 2019) Young, Scott W. H.; Clark, Jason A.; Mannheimer, Sara; Hinchliffe, Lisa JanickeThis is a practice-oriented action handbook that provides background, resources, and good practices to guide libraries in ethically implementing web analytics with a view towards privacy.This guide contains two main parts, followed by a references section. In Part 1, we detail technical strategies for implementing privacy-aware web analytics. In Part 2, we focus on communication strategies for building support for privacy-aware analytics practices.Item A Roadmap for Achieving Privacy in the Age of Analytics: A White Paper from A National Forum on Web Privacy and Web Analytics(Montana State University, May 2019) Young, Scott W. H.; Mannheimer, Sara; Clark, Jason A.; Hinchliffe, Lisa JanickeA National Forum on Web Privacy and Web Analytics is an IMLS-funded, community-fueled effort to shape a better analytics practice that protects our users’ privacy from unwanted third-party tracking and targeting. The main Forum event was held September 2018 in Bozeman, Montana, where 40 librarians, technologists, and privacy researchers collaborated in producing a practical roadmap for enhancing our analytics practice in support of privacy. Forum participants co-created eight Pathways to Action for enhancing web privacy. Forum activities also informed the development of an Action Handbook that contains practical skills and strategies for implementing privacy-oriented, ethical web analytics in libraries. This white paper provides an overview of the project, with a summary of the Pathways to Action and the Action Handbook. We present these resources to the wider community to remix, reuse, and apply towards action.Item Assessing and Improving Library Technology with Service Blueprinting(2018-07) Young, Scott W. H.; Mannheimer, Sara; Rossmann, Doralyn; Swedman, David; Shanks, Justin D.Objective: The objective of this article is to illustrate the application of service blueprinting—a design tool that comes from the service design tradition—for assessing and improving library technology services. Setting: A mid-sized library at a public university in the western United States. Methods: A service blueprint was co-created by library and IT staff in a design workshop in order to map the operational flow of a data visualization display wall. Results: Guided by the service blueprint, the project team identified points of improvement for the service of the data visualization display wall, and developed recommendations to aid further applications of service blueprinting. Conclusions: Ultimately, service blueprinting was found to be a useful tool that can be applied to assess and improve library technology services.Item Discovery and Reuse of Open Datasets: An Exploratory Study(Journal of eScience Librarianship, 2016-07) Mannheimer, Sara; Sterman, Leila B.; Borda, SusanObjective: This article analyzes twenty cited or downloaded datasets and the repositories that house them, in order to produce insights that can be used by academic libraries to encourage discovery and reuse of research data in institutional repositories. Methods: Using Thomson Reuters’ Data Citation Index and repository download statistics, we identified twenty cited/downloaded datasets. We documented the characteristics of the cited/downloaded datasets and their corresponding repositories in a self-designed rubric. The rubric includes six major categories: basic information; funding agency and journal information; linking and sharing; factors to encourage reuse; repository characteristics; and data description. Results: Our small-scale study suggests that cited/downloaded datasets generally comply with basic recommendations for facilitating reuse: data are documented well; formatted for use with a variety of software; and shared in established, open access repositories. Three significant factors also appear to contribute to dataset discovery: publishing in discipline-specific repositories; indexing in more than one location on the web; and using persistent identifiers. The cited/downloaded datasets in our analysis came from a few specific disciplines, and tended to be funded by agencies with data publication mandates. Conclusions: The results of this exploratory research provide insights that can inform academic librarians as they work to encourage discovery and reuse of institutional datasets. Our analysis also suggests areas in which academic librarians can target open data advocacy in their communities in order to begin to build open data success stories that will fuel future advocacy efforts.Item Qualitative Data Sharing: Data Repositories and Academic Libraries as Key Partners in Addressing Challenges(2018-06-28) Mannheimer, Sara; Pienta, Amy; Kirilova, Dessislava; Elman, Colin; Wutich, AmberData sharing is increasingly perceived to be beneficial to knowledge production, and is therefore increasingly required by federal funding agencies, private funders, and journals. As qualitative researchers are faced with new expectations to share their data, data repositories and academic libraries are working to address the specific challenges of qualitative research data. This article describes how data repositories and academic libraries can partner with researchers to support three challenges associated with qualitative data sharing: (1) obtaining informed consent from participants for data sharing and scholarly reuse, (2) ensuring that qualitative data are legally and ethically shared, and (3) sharing data that cannot be deidentified. This article also describes three continuing challenges of qualitative data sharing that data repositories and academic libraries cannot specifically address—research using qualitative big data, copyright concerns, and risk of decontextualization. While data repositories and academic libraries cannot provide easy solutions to these three continuing challenges, they can partner with researchers and connect them with other relevant specialists to examine these challenges. Ultimately, this article suggests that data repositories and academic libraries can help researchers address some of the challenges associated with ethical and lawful qualitative data sharing.Item Building strategic alliances to support advocacy and planning for digital preservation(2017-12) Baucom, Erin; Troup, Tammy; Cote, Conor; Mannheimer, SaraWhile the business benefits of digital asset management are well documented, the benefits and importance of digital preservation are not. Digital preservation is a sustained commitment to maintenance activities which require a system of plans, policies, and implementation workflows. Coordination across departments is helpful for digital asset management, but it is mandatory for digital preservation. The Montana Digital Preservation Working Group (DPWG) operated under a five-point plan for collaboration between organizations. The plan consisted of cultivating shared knowledge, assessing the current digital preservation landscape at each institution, advocating for the value of digital preservation, implementing digital preservation practices, and sustaining the partnership by developing structures for ongoing projects and mutual support. In this article, the five-point plan for collaboration used by DPWG is adapted to build alliances in four key areas of an organization: the Project and Process Team, the Management Team, the Executive Team, and the Information Technology Team. By building strategic alliances that support digital preservation advocacy and planning, information managers extend their reach and resources, ultimately leading to more robust preservation of valuable digital assets.
- «
- 1 (current)
- 2
- 3
- »