Wednesday, June 16, 2010

data visualization

http://www.dataspora.com/presentations.html

Data Manipulation
connecting to data sources
slicing & dicing data

Modeling & Computation
statistical modeling
numerical simulation

Data Visualization
Visualizing fit or models
composing statistical graphics

ISO standards

ISO

Dates provided in the table below are based upon checking the ISO website 2004-09-08

ISO 216:1975
Writing paper and certain classes of printed matter - Trimmed sizes - A and B series

ISO 639-1:2002
ISO 639-2:1998
Codes for the representation of names of languages

— Part 1: Alpha-2 code
— Part 2: Alpha-3 code

ISO 1000:1992
and Amd 1:1998
SI units and recommendations for the use of their multiples and of certain other units

ISO/IEC 2382-1:1993
Information technology — Vocabulary — Part 1: Fundamental terms

ISO 2784:1974
Continuous forms used for information processing - Sizes and sprocket feed holes

ISO 2955:1983
Information processing - Representation of SI and other units for use in systems with limited character sets (Withdrawn)

ISO 3166-1:1997
ISO 3166-2:1998
ISO 3166-3:1999
Codes for the representation of names of countries and their subdivisions

— Part 1: Country codes
— Part 2: Country subdivision code
— Part 3: Code for formerly used names of countries

ISO 3535:1977
Forms design sheet and layout chart

ISO 4217:2001
Codes for the representation of currencies and funds

ISO 6346:1995
Freight containers - Coding, identification and marking

ISO 6422:1985
Layout Key for trade documents

ISO 8601:2004
Data elements and interchange formats - information interchange -representation of dates and times

ISO/IEC 8859-1:1998
ISO/IEC 8859-2:1999
ISO/IEC 8859-5:1999
ISO/IEC 8859-7:2003
Information processing - 8 bit single-byte coded graphic character sets-
Part 1: Latin alphabet No. 1
Part 2: Latin alphabet No. 2
Part 5: Latin/Cyrillic alphabet
Part 7: Latin/Greek alphabet

ISO 9735:2002-1/10
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules

Electronic Data Interchange EDI

http://archive.ifla.org/VI/5/reports/rep4/42.htm

Electronic Data Interchange: An Overview of EDI Standards for Libraries (1993)


Electronic Data Interchange is intended to handle all aspects of business transactions such as ordering, acknowledgements, pricing, status, scheduling, shipping, receiving, invoices, payments, and financial reporting. One of the principal aims of EDI has been to develop electronic surrogates for the myriad of paper forms used in commercial transactions such as purchase orders, bills of lading, and invoices. Since the early 1970's, efforts have been underway to develop standardized data formats for business transactions.
This chapter will describe the two main EDI standards that are currently used in North America and Europe; the ASC X12 group of standards supported by the American National Standards Institute (ANSI) and the EDIFACT standards supported by the United Nations Economic Commission for Europe (UN/ECE).

What is Scrum?

http://pm.versionone.com/AboutScrum.html?c-aws=i&gr-isscrum&gclid=CJ344Lb8pKICFdb75wodNEN5wQ

Webcast Highlights:


Get best practices for documentation in Scrum, process flow and acceptance criteria

Learn how to remove complexities and simplifying the process

See how VersionOne supports the complete Scrum process


Katia Sullivan is a Product Specialist at VersionOne. Katia has extensive experience in transitioning from waterfall through RUP and then into Agile practices. She spent more than two years managing requirements and as a ScrumMaster on NASA’s Integrated Enterprise Management Project. Prior to that, Katia worked in various other government contractor roles from Operations Support to Technical Writing. Katia’s professional background began with leadership training in the United States Marine Corps.

Getting Started with Scrum

What is Scrum? Scrum is an agile development framework that is structured around sprints (or iterations of work). A key component of a sprint is the product backlog which is made up of prioritized user stories (or requirements). Below are some resources to help you get started using Scrum and best practices for creating user stories, whether you're using a dedicated Scrum tool or not.

A Day in the Life of a User Story Webcast

This presentation will talk through the life of a user story from idea inception through delivery back to the Product Owner. Using Scrum principles, we will explore different processes of creating, maintaining and developing a story.

IFRS International Financial Reporting Standards

International Financial Reporting Standards
http://www.kpmg.ca/en/ms/ifrs/tools_ifrscdngaap.html

IFRS compared to Canadian GAAP:
An overview – Third Edition 2010


This publication is designed to assist you in understanding the significant differences between IFRS and Canadian Generally Accepted Accounting Principles (Canadian GAAP). It does not discuss every possible difference between the two standards; rather, it is a summary of those differences that we have encountered most frequently in practice, resulting from either a difference in emphasis or specific application guidance.



May 2010 Canada

Wednesday, June 9, 2010

Government of Canada Core Subject Thesaurus

Government of Canada Core Subject Thesaurus

www.thesaurus.gc.ca

http://www.thesaurus.gc.ca/recherche-search/thes-eng.html

Library and Archives Canada

Library and Archives Canada

www.collectionscanada.gc.ca
Contains a listing of all products, services and tools produced by Library and Archives Canada in support of information management for Government of Canada institutions.

Tools

Guidelines

Services

Metadata

Business Process Management Concept

Business Process Management Concept
From MIKE2.0 Methodology

http://mike2.openmethodology.org/wiki/Business_Process_Management_Concept

BPM (Business Process Management) is a software and an management activity that aims to improve and optimise organisational business processes. Repetitive business activities are organised as business processes with roles, actions, interactions, process goals and supporting infrastructure. BPM usually involves performing business process analsysis, creating a process architecture, modeling business processes, performing business process improvement and carrying out business activity monitoring. BPM software can also support the automation or semi-automation of business processes, also often referred to as Workflow.

MIKE 2.0

Method for an Integrated Knowledge Environment
http://mike2.openmethodology.org/

MIKE2.0 (Method for an Integrated Knowledge Environment) is an Open Source methodology for Enterprise Information Management that provides a framework for Information Development. The MIKE2.0 Methodology is part of the overall Open Methodology Framework. MIKE2.0 is a collaborative effort to help you improve your Information Management based initiatives:

Guidelines for Drawing Function Charts

Guidelines for Drawing Function Charts
http://it.toolbox.com/blogs/enterprise-solutions/guidelines-for-drawing-function-charts-14645

A Function Chart is a hierarchical diagram showing a progressively more detailed breakdown of the business functions and business processes of an organization.

Proactive Disclosure

Proactive Disclosure
http://www.tbs-sct.gc.ca/pd-dp/index-eng.asp



The Government of Canada has implemented a series of measures to strengthen public sector management by enhancing transparency and oversight of public resources in the federal government.

One of these measures includes the proactive disclosure of financial- and human resources-related information by departments and agencies. By making this information readily available on departmental web sites, Canadians and Parliament are better able to hold the Government and public sector officials to account.

To this end, the Government announced the mandatory publication on departmental Web sites of travel and hospitality expenses for selected government officials; contracts entered into by the Government of Canada for amounts over $10,000 (with only limited exceptions such as national security); and the reclassification of positions.

Government-Wide Reporting
Disclosure of Travel and Hospitality Expenses (TBS)
Disclosure of Contracts (TBS)
Disclosure of Position Reclassifications (TBS)
Disclosure of Grant and Contribution Awards (TBS)
Disclosure of Information on Founded Wrongdoing at the Treasury Board Secretariat (TBS)

ISO 13485 Infrastructures requirements

ISO 13485 Infrastructures requirements
http://www.13485quality.com/resources-management/61-iso-13485-standrad-resource-management-requirement/122-iso-13485-infrastructures-requirements.html

The purpose of these requirements is to control any maintenance activities related to any infrastructures. Infrastructures are directly related to your product, therefore must be controlled. The purpose is to define how one should handle the infrastructure, during the realization process.
Open University

http://openlearn.open.ac.uk/course/view.php?id=1512


Introduction

Introduction Resource
This unit will introduce you to some ideas about how information and communiction technologies (ICTs) systems work. We will look at how ICT systems convey, store and manipulate data, and how they process...

The International Records Management Trust

The International Records Management Trust

http://www.irmt.org/

Information and communications technology alone does not offer a complete solution to information management problems. If computerisation is to provide the basis for informed decision making, greater transparency and effective service delivery, the information generated or held must be reliable and trustworthy over time. Well managed records, paper and electronic, document the policies, transactions and activities of governments and provide a trusted source of information to support accountability. They are the foundation for good governance and for meeting development goals.

The IRMT assists governments and organisations in moving safely from a paper to an electronic environment through building reliable, trustworthy records systems as the basis for data integrity to support:

Financial management
Human resource management
Land administration
Health care management
Justice and courts administration
Services for citizens
Anti-corruption strategies
Access to information
Protection of rights and entitlements
Management information systems

Tuesday, June 8, 2010

Interpares Project

Interpares Project
http://interpares.org/ip2/ip2_terminology_db.cfm

The Terminology Database has been designed to support multidisciplinary communication in the InterPARES 2 research project. By extension, this Database now stands as a contribution to our understanding of records in dynamic, interactive and experiential systems in the artistic, scientific and governmental sectors.

Friday, June 4, 2010

data mining

Data Mining
http://statsoft.com/
algorithim to develop data pattern

Thursday, June 3, 2010

SharePoint 2010's Enterprise 2.0 Capabilities

Extending SharePoint 2010's Enterprise 2.0 Capabilities
By Jed Cawthorne

http://www.cmswire.com/cms/enterprise-20/extending-sharepoint-2010s-enterprise-20-capabilities-007696.php

In my last article “Evaluating SharePoint 2010 as an Enterprise 2.0 platform” I did a quick and dirty evaluation of SharePoint 2010 against Prof. McAfee’s SLATE framework. The average score for SP2010 was 7 out of 10 which I characterised as “pretty good”. But the article noted some obvious gaps in the lower scores in some areas. I was contacted by NewsGator (news, site) to discuss how their Social Sites product helps fill those gaps in the SharePoint 2010 “out of the box” Enterprise 2.0 experience.

Tuesday, June 1, 2010

WordPress

WordPress Semantics
As with many software packages, WordPress has its own lingo or jargon. This article will introduce you to some of the terminology used in WordPress.


http://codex.wordpress.org/WordPress_Semantics

Thursday, May 27, 2010

Chartwell - presentation

http://www.123people.ca/ext/frm?ti=person%20finder&search_term=roy%20wiseman&search_country=CA&st=person%20finder&target_url=http%3A%2F%2Fwww.chartwell-group.com%2Fresources%2Fpresentations.html§ion=weblink&wrt_id=430

various writters

clip art from Microsoft

clip art from Microsoft
http://office.microsoft.com/en-us/clipart/FX101321031033.aspx?pid=CL100570201033

Northern Territory Government Recordkeeping

Government Recordkeeping
http://www.nt.gov.au/nreta/ntas/records/

The coordination of recordkeeping for Northern Territory Government organisations involves the establishment and monitoring of standards relating to appraisal and disposal of government records and the management of permanent records.

recordkeeping Compliance Survey

Results for e-based Compliance Survey 2007

http://www.nt.gov.au/nreta/ntas/records/ntg/compliance/2007/q51-60.html#52

Compliance with the NTG Records Management Standards – 2006/07 to address recordkeeping issues

business plan game

The business plan game
http://www.ibisassoc.co.uk/business-plan-game.htm

With the creation of a platform for integrating key performance indicators into a system which uses the impact of different choices of investments on company cash flow, (KPI), Ibis has now created a fictional market in which four companies compete and decide on investments. The game is designed to demonstrate the major elements of business planning, by focussing on:

Basic introduction to strategy;
Forecasting;
Cash flow;
KPI's;
Balanced scorecard;
Benchmarks;
Planning horizon;
Investment appraisal;
Contingency planning;
Prioritisation;
Presentation skills.

Wednesday, May 26, 2010

Customer Value Management

Customer Value Management
http://www.1to1media.com/view.aspx?itemid=31023

Welcome to the 1to1 Media community, a rich, multi-media resource for you to learn innovative ideas and best practices in customer value management. Every form of content you'll enjoy from 1to1 Media has an over-arching theme-to help you succeed by creating customer relationships that lock-in brand loyalty and drive your company's profits. Plus, through our parent company, Peppers & Rogers Group, we provide the world's best--known consulting services for businesses looking for customer strategy solutions to reach their business marketing goals.

Friday, May 21, 2010

performance measurement IM

Using Measurement to Manage Connection the Scorecard to Reality

http://www.tbs-sct.gc.ca/emf-cag/measure-mesure/framework-cadre/page01-eng.asp

This is an EMF presentation on what the relationship is between IM/IT operations and client value, the value system, key relationships, measurement systems, and measurement vs. value.

Thursday, May 20, 2010

Generalised Enterprise Reference Architecture and Methodology

GERAM:

Generalised Enterprise Reference Architecture and Methodology

Version 1.6.3 (March 1999)

IFIP–IFAC Task Force on Architectures for Enterprise Integration

http://www.cit.griffith.edu.au/~bernus/taskforce/geram/versions/geram1-6-3/v1.6.3.html

Enterprise Architects

Recommended Practice for Architectural Description of Software-Intensive Systems
ANSI/IEEE Std 1471 :: ISO/IEC 42010
http://www.iso-architecture.org/ieee-1471/ieee-1471-faq.html

So, what is an architecture?
Architecture is that which is essential or unifying about a system; the set of properties of a system which determine the system's structure (form), behavior (function), value, cost, and risk. The definition in the recommended practice is:

architecture: the fundamental organization of a system embodied in its components, their relationships to each other and to the environment and the principles guiding its design and evolution.

Information Technology Vocabulary

TBITS 23: Information Technology Vocabulary - Implementation Criteria
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=17281

This Treasury Board Information Technology Standard (TBITS-23) endorses the information technology terminology, as specified in CAN/CSA Z243.58, for use by the Government of Canada. As such, CAN/CSA Z243.58 is to be considered an integral part of this document.


Cross index CAN/CSA Z243.58, Information Technology Vocabulary
ISO/IEC 2382, Information processing systems C Vocabulary parts 01 to 22

Forms management

http://www.tpsgc-pwgsc.gc.ca/ongc/info/news/2009_08_25-e.html

CGSB Publishes a New Standard for Forms Management
The Canadian General Standards Board (CGSB) has just published CAN/CGSB-6.2-2009, Forms Management. This new National Standard of Canada has been developed for public and private sector organizations and forms management professionals.

The standard provides best practices for the establishment and operation of a forms management program and provides guidance on program implementation, training, resource utilization and the promotion of the program.

The Canadian General Standards Board (CGSB)

The Canadian General Standards Board (CGSB)
http://www.tpsgc-pwgsc.gc.ca/ongc/home/index-e.html

The Canadian General Standards Board (CGSB) is a federal government organization that offers client-centred, comprehensive standards development and conformity assessment services in support of the economic, regulatory, procurement, health, safety and environmental interests of our stakeholders — government, industry and consumers.

Wednesday, May 19, 2010

Centera, Governance edition

Centera, Governance edition
http://www.emc.com/collateral/analyst-reports/kci-evaluation-of-emc-centera.pdf

mentioned all the compliance but did not illustrate how. What about ease of use and interoperatability

Centera review

Taneja Group, Technology analyst


disk-based archiving solutions
http://www.emc.com/collateral/analyst-reports/taneja-group-emc-centera-vs-filesystems-030206.pdf

the Taneja Group has
observed there are many critical advantages
to be gained by leveraging object-based
storage in the form of CAS disk-based
archiving solutions, such as EMC Centera

Term-Driven Records File Plan and Thesaurus Design

Term-Driven Records File Plan and Thesaurus Design
http://www.faqs.org/patents/app/20090177668#ixzz0oPIfaTAU

Inventors: Bruce Schinkelwitz
Agents: MOLLBORN PATENTS, INC.
Assignees: International Business Machines Corporation
Origin: BOULDER, CO US
IPC8 Class: AG06F1730FI
USPC Class: 707100

Read more: http://www.faqs.org/patents/app/20090177668#ixzz0oPLOYW5M


In general, in one aspect, the invention provides methods and apparatus, including computer program products, implementing and using techniques for generating a file plan and a thesaurus for a records management system. A first user input defining one or more top level terms to be used in the file plan is received. A second user input defining one or more child level terms to be used in the file plan for at least some of the top level terms is received. A third user input defining one or more term relationships among the collection of child level terms and the top level terms is received. Without further user input, a file plan and a thesaurus are generated based on the top level terms, the child level terms and the specified term relationships among the child level terms and top level terms.


Read more: http://www.faqs.org/patents/app/20090177668#ixzz0oPL0SKpP

What is Indexing

The American Society for Indexing
formerly The American Society of Indexers

http://www.asindexing.org/site/index.html

Training resources
http://www.asindexing.org/site/courses.shtml

American Society for Indexing
Frequently Asked Questions About Indexing
This FAQ (Frequently Asked Questions) document has been compiled to provide basic information on indexing as a freelance career, and to list resources for further information. There is a wealth of information on indexing, including books, workshops, and training courses. This file can only provide a brief orientation and a list of resources for study. As you read it, remember that the broad, general statements are not universal laws; there are many ways to approach indexing, and people doing indexing do not fit all the broad statements in every respect. We will be happy if this file tells a non-indexer a useful way (not the best or only way) to think about the work before deciding to try to do it. We know that many (perhaps most) will realize after a time that they don't fit the rules of thumb either. If you do decide to pursue this challenging, rewarding and important work, please seek out the many other wonderful resources available; stay in touch with the field and other indexers through ASI, never stop learning and improving your skills and understanding. We hope you find this file useful. We welcome your comments.

L. Pilar Wyman (pilarw@wymanindexing.com) and Larry Harrison.

Jump to: [ What is indexing? | Who does indexing? | How is indexing done? | Can't a computer do the indexing? | What skills or education do indexers need? | How do indexers get clients? | How much are indexers paid? | How do indexers price their services? | What kind of annual income can I expect from indexing? | How can I learn to index? ]


When I tell people that I am working on an index to a book, they tend to hang their heads in sorrow. I tell them that compiling an index for a book is a lot more fun than writing a book could ever be, a relaxing jaunt from A to Z compared with a jerky stop-start trek without maps.
— Craig Brown, Times Saturday Review, 21 July 1990

1. What is indexing?
According to the British indexing standard (BS3700:1988), an index is a systematic arrangement of entries designed to enable users to locate information in a document. The process of creating an index is called indexing, and a person who does it is called an indexer. There are many types of indexes, from cumulative indexes for journals to computer database indexes. This discussion concentrates on the back-of-the-book index, found in nonfiction books.

Indexes are among those necessary but never spectacular products of hard as well as skilled work that can sometimes make the difference between a book and a good book.
index review in Books Ireland, February 1994

The chief purpose of an index is distillation, and in performing that task it can manage to suggest a life's incongruities with a concision that the most powerful biographical stylist will have trouble matching.
Thomas Mallon, New York Times, 10 March 1991

The ocean flows of online information are all streaming together, and the access tools are becoming absolutely critical. If you don't index it, it doesn't exist. It's out there but you can't find it, so it might as well not be there.
Barbara Quint, ASI San Diego Conference, 1994

2. Who does indexing?
In the United States, according to tradition, the index for a non-fiction book is the responsibility of the author. Most authors don't actually do it. While a few publishers have in-house indexers, most indexing is done by freelancers, often working from home, hired by authors, publishers or packagers. (A packager is an independent business which manages the production of a book by hiring freelancers to accomplish the various tasks involved, including copyediting, proofreading and indexing.) More often, the indexer is hired by the publisher, and the fee is deducted from the money due the author. If a packager hires the indexer directly, various payment arrangements can be made.

Indexing work is not recommended to those who lack an orderly mind and a capacity for taking pains. A good index is a minor work of art but it is also the product of clear thought and meticulous care.
Peter Farrell, How to Make Money from Home

3. How is indexing done?
The indexer usually receives a set of page proofs for the book (images of the actual pages as they will appear, including final page numbers), often at the same time as final proofreading is being done by someone else. The indexer reads the page proofs, making a list of headings and subheadings (terms to appear in the index) and the location of each pertinent reference. After completing the rough index the indexer edits it for structure, clarity and consistency, formats it to specifications, proofreads it and submits it to the client in hard-copy form, on disk, by modem, or by email. Since the indexer is very late in the production process, there can be unreasonable time pressure.

As to how to index, what goes on between the ears, that's a subject for books, courses, workshops and lifelong learning from experience.

Less time is available for the preparation of the index than for almost any other step in the bookmaking process. For obvious reasons, most indexes cannot be completed until page proofs are available. Typesetters are anxious for those few final pages of copy; printers want to get the job on the press; binders are waiting; salesmen are clamoring for finished books surely you can get that index done over the weekend?
Chicago Manual of Style, 14th ed.

Indexers are in effect trying to provide answers to a host of unasked questions. Indexers therefore need to work as if their audience is present. But there are two snags: first, in most cases they do not know who this audience will be; second, in most cases they do not receive any feedback as to whether their judgments have been successful. From a communicative point of view, there is probably no more isolated intellectual task than indexing. The twilight howl of the indexer might well be Is there anybody there?
David Crystal, editorial, The Indexer, April 1995

4. Can't a computer do the indexing?
The short answer is no. Computers can easily construct a concordance (a list of words or phrases and where they appear), but this is not an index, and is not very useful to someone looking for information. The so-called automatic indexing software programs now appearing on the market are simply not up to the task of indexing a book. Book indexing involves a little bit of manipulating words appearing in a text, which computers can do, and a lot of understanding and organizing the ideas and information in the text, which computers cannot do and will not do for many years to come. An example of the difference is that a book on protective gloves for occupational use might have a chapter discussing surgical gloves, how they get punctured and how they are tested for integrity, but might never use the word holes. Yet a user of the book would expect to find this word in the index and be directed to the appropriate chapter. The indexer handles dozens or hundreds of such issues in every book.

Where the text is already on computer disk, the indexing features of word processing programs can ease the handling of page numbers and sorting, but the real indexing work is still done by the human. Powerful dedicated software is also available for personal computers to aid the professional indexer in constructing, sorting, editing and formatting the index, whether from hard-copy text or computer files. Many indexers use one of the programs listed on the Indexing Software page.

Automated indexing was never intended to produce back-of-the-book indexes. As Indexicon demonstrates so well, back-of-the-book indexes cannot be automatically generated.
Nancy Mulvany and Jessica Milstead, review of Indexicon, Key Words, Sep/Oct 1994

5. What skills or education do indexers need?
Many publishers and packagers don't ask for specific degrees or credentials unless they are looking for someone with subject matter expertise for a technical book. (See question 10 for more about courses on indexing.) Skills needed to learn indexing include excellent language skills, high clerical aptitude, accuracy and attention to detail. Once you are indexing professionally, you will find that self-discipline, curiosity, tolerance of isolation and love of books are necessary to keep going. In addition to all this, of course, there are the business and marketing skills needed to succeed as a self- employed professional. Clients take their cue from you: if you behave in a professional manner, most of them treat you accordingly.

Whoever the indexer is, he or she should be intelligent, widely read, and well acquainted with publishing practices also levelheaded, patient, scrupulous in handling detail, and analytically minded. This rare bird must while being intelligent, levelheaded, patient, accurate, and analytical work at top speed to meet an almost impossible deadline.
Chicago Manual of Style, 13th ed.

I wonder whether there is any profession in which a knowledge of one's tongue is of the slightest use.
T.E. Lawrence, on winning 1st place in English Language and Literature in the Senior Oxford Local Exams, 1906

6. How do indexers get clients?
Most people start by sending letters and résumés to publishers. Find their addresses in Literary Marketplace, Writer's Market and Books in Print, available in your library. It may take hundreds of letters to get a first indexing job. Experienced indexers say they get most jobs through recommendations from satisfied clients and networking, although some still come from marketing efforts. Now, many people interested in indexing are pursuing the apprenticeship model, working with an established indexer to build skills and experience. The three best ways to get work? Network, network, network.

7. How much are indexers paid?
That's the wrong question. (I know, I wrote the question, but that's the way it's usually asked.) A freelance indexer is running a small business; as a businessperson, you are not paid, you set prices and charge for a service. You are not an employee; you are an independent contractor. This is an important distinction because of how it changes your thinking. It's also very important for tax purposes, but that's off the subject. Try questions 8 and 9.

8. How do indexers price their services?
The two most common ways of quoting book index prices are per page and per entry. Different publishers prefer different methods, and indexes for different media (databases, periodicals, etc.) also are priced differently. All the different ways of quoting prices can be reduced to a fee per hour. While experienced indexers come to know what rates per page or per entry they can afford to accept, beginning indexers would be well-advised to focus on the hourly fee when figuring their bids. This enables new indexers to decide what kinds of work are best for them, and to track improvements in skill, efficiency and income as they become experienced.

If you are starting out as a freelance indexer, you won't be able to get the same fee as an indexer with 10 years of experience. This does not mean inviting exploitation by unscrupulous clients. Remember, if you are qualified as an indexer, you are producing a professional product, and you should be fairly compensated. Set yourself a rock-bottom hourly fee for run-of-the-mill indexing, the lowest figure you should ever accept, and stick to it. Remember, no one says you have to take what the prospective client is offering. No one says the client has to pay what you charge. Both parties are free to negotiate or go elsewhere. It is your responsibility to set the fee you charge for indexing, and negotiate to get it.

Indexers need to charge for their services according to the time they expect to spend on the work. On the other hand, many clients want a predictable price since they are under budget constraints. These clients will not pay by the hour, especially if they don't know your work. How do you quote your prices to get your hourly fee?

If the client opens the discussion by saying she wants the index done for $1,200, or for a certain amount per indexable page, a fixed bid is called for. (Pricing per page is a type of fixed bid; it can be agreed to in advance even if an exact page count is not known.) Fixed bids are good for the client but risky for the indexer. The indexer must be familiar with the book before a reasonable bid can be given, because of wide variations in words per page and complexity of material. The expected number of entries per page or in the whole index should also be specified, since this is a key factor in the time spent doing the index.

Publishers in some fields (medicine, for example) want to ensure a detailed index, so they use pricing by the entry. As long as both parties are clear on exactly what constitutes an entry and how they are counted, this has the advantage of compensating the indexer for extra time spent on complex material. Again, the expected number of entries per page should be specified.

No matter how the bid is to be figured, start with the hourly fee to make sure you are being compensated according to your set rate. First, estimate how many hours it will take you to do the index, including editing, proofing and preparing final copy. This estimate is crucial. Actually indexing a representative sample of the book is helpful here, and estimating skills should improve with experience. Then multiply by your hourly fee to get the total amount you expect for indexing the book. If the client wants a lump sum bid, you are done.

To prepare a bid or price quote for a client who uses per-page pricing, divide your total estimate by the page count. To prepare a price quote on a per-entry basis, figure the total number of entries in the book and divide this into the total estimate. In summary, use one of the following methods, where $FEE is the total fee, PAGES the indexable page count of the book, and ENTRIES the total number of entries in the book (ENTRIES is average entries per page times the number of pages):

Fixed price = $FEE

Per-page rate = $FEE / PAGES

Per-entry rate = $FEE / ENTRIES
If the client has a price or rate in mind, work the numbers backward to figure the hourly fee resulting from the client's number before deciding whether you can afford to accept it.

When someone offers you an indexing assignment at $12 per hour, take note of the advice from Dr. Wellisch in the next quote; you could do almost as well at McDonald's!

An hourly indexing fee should always be at least four times the wage one can earn by flipping hamburgers at a fast-food emporium.
Dr. Hans Wellisch, Indexing from A to Z

Hourly rates in 1993 started at $20 to $25 per hour and went up from there.
Nancy Mulvany, Indexing Books

9. What kind of annual income can I expect from indexing?
Here are some important factors which affect your income from indexing or any other independent service business:

How you set your prices.
How much you want to work.
How skilled you are at finding enough good clients to keep busy.
How skilled, and fast, you are at indexing.
How much your business expenses are.
In short, your income depends on your motivation and your business skills as well as your indexing skills. There are indexers who treat it as a relaxing, part-time business; there are indexers who work long hours and support themselves in nice middle-class style as a result. Most probably fall in between. You have to decide what you are looking for.

You need to spend time learning how to start and run a business as well as learning to index. Books and magazines on home-based business and entrepreneurship have lots of ideas and advice applicable to freelance indexers. Seminars and workshops on business skills and sales technique can be quite useful, but be careful with your money. Talk to graduates before signing up.

Suppose we look ahead to the future, finding that after gaining some experience, you reach a speed and skill level where the combination of rates paid by clients and the time you spend doing the work results in a good hourly rate. What hourly rate might you expect? ASI regularly surveys freelance and in-house indexers to find out what salaries and fees are being paid. The latest survey is available on this website, in the Members Area. If you are an ASI member, you may view and download the survey. In case you don't have access to this information, bear with me as I discuss the mechanics of estimating your self-employment income without using a specific rate.

To estimate your annual income from indexing, multiply your hourly rate by the average number of work hours in a year. Forty hours per week times 52 weeks a year is 2,080. Wait! If you want to index full-time, you need to consider all the time your business takes besides actual indexing. Writing letters and making calls to get work, rushing to the FedEx office before they close, billing, doing your tax return, shopping for supplies, backing up your computer files, meal breaks and occasional holidays and vacations (remember those?) are all unpaid time. Don't forget idle time between jobs; it takes several years of building a client base for most indexers to get full-time work. If you plan to put 40 hours per week into your business, then allowing for all the above within the 40 hours results in a rule of thumb of about 1,200 hours per year of actual paid indexing work.

OK, multiply your hourly fee by 1,200. That's your gross revenue. But remember, this is a business; your actual income is much less. To figure hourly income, self-employment taxes (currently 15.3%) and federal, state and local income taxes come off the top, plus the cost of your supplies, utilities, ASI membership dues and the amortized cost of your office equipment. (See Schedule C of Form 1040 for calculating business taxes, expense deductions and amortization.) A good rule of thumb is to take at least 50% off the rate.

So, multiply your hourly income (about 50% of your hourly rate) by how many hours you can work per year (1,200 while you are getting established, based on a 40-hour week). If this is not enough for you to live on, don't quit the day job yet. Most indexers start indexing as a part-time moonlighting effort, supporting themselves with another job. Once they are sure they want to do this kind of work full-time, and clients are paying well and keeping them so busy it is hard to get everything done, they can make the decision to try full-time indexing.

Once you are well-established, idle periods and time spent marketing diminish, resulting in more paid work hours. You can eventually reach 2,000 hours per year, if you are willing to work more than 40 hours per week. In addition, a very good indexer who works fast can make a higher hourly rate for a given page rate, because it takes fewer hours to do the work. Money magazine recently published an article on successful home-based businesses which quoted one experienced freelance indexer who says he averages $50,000 per year. Some indexers are skeptical; others say this is possible after a few years if you work hard and find the right clients.

Wealth ... is more accurately measured in what you enjoy than in what you possess.
Jean Aspen, Arctic Son

10. How can I learn to index?
A local college or university with a Library Science or Information Science department may offer indexing courses. Many people take the indexing correspondence courses (Basic Indexing and Applied Indexing) offered by the US Department of Agriculture. Assignments are graded by indexing professionals and a certificate of completion can be provided.

If you are considering ASI membership, take note of the excellent self-paced course offered to ASI members. Available on interactive CD-ROM, this comprehensive course includes many practical exercises and self-assessments. A certificate of completion can be obtained by taking the optional exams.

Look at the Indexing Courses and Workshops web page for more information about all these options. Before you invest money in an expensive course, check out some books on the subject to gauge your interest and aptitude.


--------------------------------------------------------------------------------

Indexing cannot be reduced to a set of steps that can be followed! It is not a mechanical process. Indexing books is a form of writing. Like other types of writing, it is a mixture of art and craft, judgment and selection. With practice and experience, indexers develop their own style as do other writers. The best we can do as teachers of indexing is to present the rules and offer guidance.
— Nancy C. Mulvany, Indexing Books

Index learning turns no student pale,
Yet holds the eel of science by the tail.
— Alexander Pope, The Dunciad

Copyright 2007 Larry Harrison and L. Pilar Wyman


To provide information or make a suggestion, send email to webmaster@asindexing.org

Home A–Z
Index News About ASI Indexing
Information Indexing
Resources
Annual
Meetings Letters from
ASI's President Chapters Special Interest Groups
(SIGS) Web Site
Policy
http://www.slais.ubc.ca/resources/indexing/database1.htm

The University of British Columbia, School of Library, Archival, and Information Studies

INDEXING RESOURCES ON THE WWW -- Database Indexing, Controlled Vocabularies & Thesauri


Database Indexing, Controlled Vocabularies & Thesauri

Constructing and Using Thesauri & Term Lists
Links to Online Thesauri, Term Lists & Classification Schemes
Online Classification Schemes
Database Indexing Guidelines & DIscussion
Automatic Indexing
Information Architecture
Constructing & Using Thesauri & Term Lists

About Thesauri, by Jessica L. Milstead

Across Languages, Across Cultures: Issues in Multilinguality and Digital Libraries, by Carol Peters and Eugenio Picchi

Adding Natural Language Processing Techniques to the Entry Vocabulary Module Building Process, by Youngin Kim and Barbara Norgard

ADL Thesaurus Protocol

Art & Architecture Thesaurus: User's Guide to the AAT Data Releases [PDF version]

Building a Synonymous Search Index, by Peter Morville

Canadian Literacy Thesaurus -- Indexing Guidelines

Cat-a-Cone: An Interactive Interface for Specifying Searches and Viewing Retrieval Results using a Large Category Hierarchy, by Marti A. Hearst and Chandu Karadi

The CERES/NBII Thesaurus Partnership Project

Controlled Subject Vocabularies and Thesauri

Converting a Controlled Vocabulary Into an Ontology: The Case of GEM, by Jian Qin and Stephen Paling

Cuisinarts, E-Commerce, and ... Controlled Vocabularies, by Lou Rosenfeld

A Definition of Thesauri and Classification as Indexing Tools. by Aida Slavic

Design/selection criteria for software used to handle controlled vocabularies. UK Office of the eEnvoy

Developing a Functions Thesaurus

Documenting & Access: Indexing with the Getty Vocabularies, by Patricia Harpring [click on link for PowerPoint presentation]

Enriched Thesauri as Networked Knowledge Bases for People and Machines, by Dagobert Soergel [pdf document]

Entry Vocabulary Modules and Agents, by Barbara Norgard

EPA Terminology Reference System (TRS), by Larry Fitzwater and Linda Spencer [PowerPoint presentation]

An Evaluation Methodology For Clinical Vocabularies And Evaluation Of The Read Codes

Extracting Value from Automated Classification Tools : The Role of Manual Involvement and Controlled Vocabularies, by Kat Hagedorn

FAST: Development of Simplified Headings for Metadata, by Rebecca Dean

Formal Ontology and Information Systems, by Nicola Guarino

Formal Ontology for Subject, by Christopher A. Welty and Jessica Jenkins

From Authority Files to Ontologies: Knowledge Management in a Networked Environment, by Joseph A. Busch [PowerPoint presentation]

Functions of a Thesaurus / Classification / Ontological Knowledge Base, by Dagobert Soergel

Geographic Names: The Implementation of a Gazetteer in a Georeferenced Digital Library, by Linda L. Hill, James Frew, and Qi Zheng

The Getty Thesaurus of Geographic Names: User's Guide to the TGN Data Releases [PDF version]

Getty Vocabularies Download Center

The Gist of Journal Indexing, by Carolyn Weaver

Guide for the Development and Maintenance of Controlled Vocabularies in the Government of Canada. Treasury Board Secretariat

A Guide to the Description of Architectural Drawings

A Guided Tour to Developing Ontologies Using Ontolingua

Guidelines for Constructing a Museum Object Name Thesaurus

Guidelines for Forming Language Equivalents: A Model Based on the Art & Architecture Thesaurus

How Do You Build a Thesaurus?, by Peter Morville

A Hypertextual Interface for a Searcher's Thesaurus, by Eric H. Johnson and Pauline A. Cochrane

I Say What I Mean, But do I Mean What I Say?, by Paul Miller

In theBbeginning was theWword : Making English Heritage Thesauri Available On-line, by/ Daphne Charles

Indexing Guidelines for USGS Gateway

Interactive Term Suggestion for Users of Digital Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval, by Bruce R. Schatz and others

Internet/Intranet and Thesauri, by Branka Kosovac

Introduction to Metadata, edited by Murtha Baca

Introduction to Vocabularies

Introduction to Vocabulary and Classification [Heritage Canada]

LIV (Legislative Indexing Vocabulary) Introduction and Manual

Mapping Entry Vocabulary to Unfamiliar Metadata Vocabularies, by Michael Buckland and others

Mapping New LCSH with DDC numbers

Medical Subject Headings (MeSH) Indexing Tips

Metadata for the ADL Feature Type Thesaurus

A Multi-thesauri Management System with Web Interface, by Marcia Lei Zeng and Yu Chen [PowerPoint presentation]

NISO Z39.19: Standard for Structure and Organization of Information Retrieval Thesauri, by Jessica L. Milstead

Presentations from the Subject Analysis and Retrieval Working Group Conference Controlled Vocabulary and the Internet, September 29, 1999

RDF and Thesauri, by Ron Daniel Jr. [PowerPoint presentation]

Relational Data Structures for Extensible Thesauri, by Randy Ballew [PowerPoint presentation]

Reusable Ontologies: A Key Enabler for Electronic Commerce, byr Richard Fikes [PowerPoint presentation]

The Role of the Unified Medical Language System (UMLS) in Vocabulary Control, by Stuart J. Nelson [PowerPoint presentation]

Systems of Knowledge Organization for Digital Libraries: Beyond Traditional Authority Files, by Gail Hodge

Taxonomy of Knowledge Organization Sources/Systems -- Draft

Thesauri on the Web: Current Developments and Trends, by Ali Asghar shiri and Crawford Revie [click on link for PowerPoint presentation]

Thesaurus Construction [tutorial from Western Ontario]

Thesaurus Construction and Maintenance Guidelines [RBMS Manual]

Thesaurus Design and Development, by Ray R. Larson [PowerPoint presentation]

Thesaurus Design for Information Systems - seminar by Dr. Bella Hass Weinberg

Thesaurus Principles and Practice, by Leonard Will

Thesaurus Software and Keyword Constellation Construction, by Jan Wright

The Unified Medical Language System, by Stuart Nelson [PowerPoint presentation]

Union List of Artist Names: User's Guide to the ULAN Data Releases [PDF version]

Use of Thesauri in the Full-Text Environment, by Jessica L. Milstead

USGS Gateway to the Earth, by Candy Schwartz [PowerPoint presentation]
USGS Gateway to the Earth : Controlled Vocabulary Project

Using controlled vocabularies to improve findability, by Christina Wodtke

Vocabulary as a Central Concept in Library and Information Science, by Michael Buckland

Vocabulary Links:// Thesaurus Design for Information Systems: seminar by Dr. Bella Hass Weinberg, Synthesis by Fred Brown

What is an Ontology?, by Tom Gruber

Whither Come the Words?, by Elizabeth D. Liddy [click on link for PowerPoint presentation]

WWW -- Wealth, Weariness or Waste: Controlled Vocabulary and Thesauri in Support of Online Information Access, by David Batty

Zthes: a Z39.50 Profile for Thesaurus Navigation, by Mike Taylor

Links to Online Thesauri, Term Lists & Classification Schemes


Aquatic Sciences and Fisheries Thesaurus

AGRI/AGRISANASTO [Thesaurus of the Agricultural Library at the University of Helsinki]

AGRICOLA Subject Category Code Scope Notes

Agrovoc

The Alcohol and Other Drug (AOD) Thesaurus: A Guide to Concepts and Terminology in Substance Abuse and Addiction

Alexandria Digital Library Feature Type Thesaurus -- Version of July 3, 2002

Alzheimer's Disease Thesaurus

AOD Thesaurus [Alcohol and Other Drug Thesaurus]

APAIS Thesaurus [Australian Public Affairs Information Service]

Archaeological Objects Thesaurus

The Art & Architecture Thesaurus Browser

Australian Governments' Interactive Functions Thesaurus - AGIFT

Australian Pictorial Thesaurus (APT)

Australian Standard Classification of Occupations, Second Edition

Australian Transport Index Thesaurus

The Astronomy Thesaurus

A Basic Dictionary of ASL Terms [American Sign Language]

Biocomplexity Thesaurus

BIOSIS Controlled Vocabulary: Lists

The British Museum Materials Thesaurus

The British Museum Object Names Thesaurus

Broad System or Ordering

BZZURKK - The Thesaurus of Champions

Canadian Geographical Names

Canadian Literacy Thesaurus

Canadian Subject Headings

Canadian Thesaurus of Construction Science and Technology

Carnivorous Plant Database

The CATIE Thesaurus [Community AIDS Treatment Information Exchange]

The CERES/NBII Thesaurus Partnership Project

The Cooks Thesaurus

CRTC Thesaurus

CSQuest

Curtin Keyword Thesaurus [derived from the Keyword AAA Thesaurus]

ETHNOLOGUE: Languages of the World

Eurodicautom

The European multilingual thesaurus on health promotion in 12 languages [downloadable thesaurus]

Feature Type Thesaurus -- Alexandria Digital Library

Flora of North America

Florida Environments Online Thesaurus

GEM Controlled Vocabularies

General Multilingual Environmental Thesaurus, GEMET

Getty Thesaurus of Geographic Names

Global Legal Information Network

GMET- General Multilingual Environmental Thesaurus

Gnomon Thesauri [in German]

Government of Canada Core Subject Thesaurus

A Guide to Medicinal and Aromatic Plants [contains links to organized lists of proper names]

HASSET - Humanities And Social Science Electronic Thesaurus

Health and Ageing Thesaurus

Heavy Metal Thesaurus

Historical Thesaurus of English

HIV/AIDS Treatment Thesaurus [Canadian]

Iconclass

INFODATA-Thesaurus

INFOTERRA Thesaurus

INGRID Library Thesaurus

International Classifications [from WIPO]

International Index of Film Periodicals Subject Headings

The International Thesaurus of Refugee Terminology

Integrated Taxonomic Information System (ITIS) [Canada]

Keyword AAA [Australia]

Legislative Indexing Vocabulary (LIV)

Lexical FreeNet

Library of Congress Subject Headings - Principles of Structure and Policies for Application: Contents

Library of Congress Subject Headings Weekly Lists

Los Angeles Comprehensive Bibliographic Database Subject Thesaurus

The Mathematics Subject Classification (MSC)

MeSH Subject Headings

MISQ Keyword Classification Scheme

Multilingual Egyptological Thesaurus

NAL Agricultural Thesaurus

NAL Animal Use Alternatives Thesaurus

NASA Thesaurus

National Monuments Record Thesauri

The NCBI Taxonomy

NEXIS Topical Indexing

North American Industry Classification System (NAICS)

Occupations Thesaurus -- Register of Australian Archives and Manuscripts (RAAM)

The OECD MACROTHESAURUS

Ontosaurus -- Loom Web Browser

Optics Classification and Indexing Scheme (OCIS)

Physics and Astronomy Classification Scheme (PACS)

The Plumb Design Visual Thesaurus

Population Multilingual Thesaurus

Public Health Thesaurus

Royal Canadian Mounted Police English-French Police Terminological Glossary = Lexique terminologique policier français-anglais de la Gendarmerie royale du Canada

Schools Online Thesaurus

SCOP: Structural Classification of Proteins

Seattle City Clerk Thesaurus

The Semantic Rhyming Dictionary

Simple Subject Headings

Social History and Industrial Classification

The Southwest Thesaurus

Spindrift Music Thesaurus

Statistics Canada Thesaurus

Taxomony Warehouse

Terms of Environment [Environmental Terms]

Thesaurus Ethics in the Life Sciences

Thesaurus for Graphic Materials II (Genre and Physical Characteristic Terms)

Thesaurus for Graphic Materials I (Subject Terms)

Thesaurus Musicarum Latinarum

Thesaurus of Economic, Social and Cultural Rights

Thesaurus of Musical Instruments

TreeBASE [relational database of phylogenetic information]

TESE - Thesaurus for Education Systems in Europe

UK Archival Thesaurus (UKAT)

UNBIS Thesaurus [United Nations Bibliographic Information System]

UNESCO Thesaurus

Unified Medical Language System (UMLS)

The Union List of Artist Names Browser

United Nations Statistics Division Classification Registry

USGS Enterprise Web Thesaurus

USGS Gateway to the Earth Project: Version 9

Vocabulary of Basic Terms for Cataloguing Costume

wordHOARD

WorldBank Thesaurus

Zoological Record Subject Thesaurus

Zoological Record Systematic Thesaurus



Online Classification Schemes
The ACM Computing Classification System [1998 Version]

ADAM: Art, Design, Architecture & Media Information Gateway. Index+ Dewey Search

Athena Minerology

Canadian Information By Subject

CyberDewey

CyberStacks

Expanding Universe: A Classified Search Tool for Amateur Astronomy

GRAMA Index to Classifications [Utah State Archives]

The ICONCLASS Browser

Journal of Economic Literature (JEL) Classification System

LC Classification Outline

Library of Congress Classification System [from About.com]

Manual of U.S. Patent Classification

Materials Organized by Mathematical Subject Classification

Mathematics Subject Classification

MISQ Keyword Classification Scheme

North American Industry Classification System (NAICS)

The Physics and Astronomy Classification Scheme (PACS)



Database Indexing Guidelines & DIscussions
Accelerating Indexed Searching, by Charles J. Bontempo and C. M. Saracco

Addressing the Heterogeneity of Subject Indexing in the ADS Databases, by David S. Dubin

Best Practices for Indexing and Abstracting Tobacco Industry Documents

CERIF: The Common European Research Information Format Subject Indexing Guidelines

Citation Indexing -- Its Theory and Application in Science, Technology, and Humanities

Classifying Internet Objects

The Concept of Citation Indexing: A Unique and Innovative Tool for Navigating the Research Literature

ERIC Indexing Guidelines

Frequently Asked Questions About Indexing

Grounded Classification: Grounded Theory and Faceted Classification

History of Citation Indexing

Indexing Guidelines for the ADAM Database, by Rebecca Bradshaw

Indexing Guidelines for USGS Gateway

Indexing Public Databases, by Lee Mandell [PowerPoint presentation]

Public Database Indexing [North Carolina Department of Cultural Resources Division of Archives and History]


Automatic Indexing
Automatic Subject Indexing using An Associative Neural Network, by Yi-Ming Chung and others

Digital Libraries - Automatic Indexing

Important Automatic Indexing Concepts

Levels of the Machine-Aided Indexing Continuum


Information Architecture
Argus Center for Information Architecture

An Information Architect's Manifesto, by Peter Morville

Articles and Papers on Information Architecture [from Elegant Hack]

Community Infrastructure for Information Architects

Defining Information Architecture, by Peter Morville

Information Architecture and User Centered Design Reading List, [books] by Christina Wodtke [from Elegant Hack]

Information Architecture Glossary, By Kat Hagedorn

Information Architecture Links [from Elegant Hack]

Information Architecture Resources

Information Design: Part 1 [from Webmonkey Radio -- streaming audio -- includes useful links]

Introduction to Information Architecture, by Louis Rosenfeld & Peter Morville [chapter from Information Architecture for the World Wide Web Designing Large-scale Web Sites

Squishy's Crash Course in Information Architecture --Tutorial, by John Shiple [from WebMonkey]

Summit 2000: Defining Information Architecture [includes links to presentations]

A Visual Vocabulary for Describing Information Architecture and Interaction Design [version 1.1b --6 March 2002], by Jesse James Garrett

Glossary Terms

A Glossary of Archival and Records Terminology

http://www.archivists.org/glossary/list.asp?letter=a

Information Management Related Acts

Directive on Information Management Roles and Responsibilities

http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?evttoo=X&id=12754§ion=118

This directive references this legislation


Access to Information Act

Canada Evidence Act

Copyright Act

Emergency Preparedness Act

Federal Accountability Act

Financial Administration Act

Library and Archives of Canada Act

Official Languages Act

Personal Information Protection and Electronic Documents Act

Privacy Act

Security of Information Act

Statistics Act

Tuesday, May 18, 2010

Information management

Information management magazine
http://www.information-management.com/

Friday, May 14, 2010

Yahoo Blog guidelines

Yahoo! Personal Blog Guidelines:

http://jeremy.zawodny.com/yahoo/yahoo-blog-guidelines.pdf

Yahoo! Personal Blog Guidelines: 1.0
Yahoo! believes in fostering a thriving online community and supports blogging as a valuable component of shared media. The Yahoo! Personal Blog Guidelines have been developed for Yahoos who maintain personal blogs that contain postings about Yahoo!’s business, products, or fellow Yahoos and the work they do. They are also applicable to Yahoos who post about the company on the blogs of others. The guidelines outline the legal implications of blogging about the company and also include recommended best practices to consider when posting about Yahoo!.

Fortune 500 Business Blogging Wiki

active public blogs by company employees about the company and/or its products

http://www.socialtext.net/bizblogs/index.cgi


If you would like to volunteer to write a review of a Fortune 500 corporate blog, simply post that review on your own blog and then link to the review from this wiki. Alternatively conduct an interview with a Fortune 500 corporate blogger, post the interview on your site, and then link to the interview from this wiki. As a courtesy please also mention and link to the wiki in your review.


About this wiki

This site began as a collaboration between Chris Anderson (Wired Magazine) and Ross Mayfield (Socialtext). A post giving the background of the project is here. Original data compiled by Wired Magazine. See the About page for more details.

As of October 2007 John Cass (PR Communications) is working with Ross Mayfield (Socialtext) and has instigated a volunteer effort to expand on the existing wiki and combine the wiki with the Fortune 500 Blog Project Wiki, another wiki project that sought to review all the Fortune 500 companies that blog.

Global 1,000 Business Blogging
Discussion of the share price Performance Methodology
Spectrum of Corporate Social Media
Traits Of The Fortune 500 Blogs
The official Fortune 500 list is here and is now free.

Self-Service Knowledge Repository

Case Study: Microsoft Engages Employees and Creates a Self-Service Knowledge Repository

http://www.gartner.com/technology/media-products/reprints/microsoft/vol10/article11/article11.html

ntroduction
The Microsoft brand is recognized worldwide. As a global organization with over $60 billion in revenue in 2009, it creates a wide range of software applications that organizations use to run their businesses. This case study will be valuable for any organization that is trying to reach a tipping point in the adoption of social media to support knowledge sharing.


Results
Today, nearly two years after the start of the effort, there are over 12,000 podcasts in Academy Mobile. Users can search, use pivot views and subscribe to people. Search results can be refined, letting users find the specific type of knowledge they need. There are 2,000 frequent podcasters, 650 uploads/month and 125,000 page views. Initially, Academy Mobile rewarded podcasters 25 points to create a podcast, 5 points for a comment and 1 point for every download. Employees could turn in their points to get a gift.......

Web Analytics in SharePoint

Introducing Web Analytics in SharePoint 2010

http://blogs.technet.com/sharepointexperts/archive/2010/03/23/introducing-web-analytics-in-sharepoint-2010-by-sangya-singh.aspx

Guest post by Sangya Singh

As part of SharePoint Server 2010, we have created a new set of features to help you collect, report, and analyze the usage and effectiveness of your SharePoint 2010 deployment – whether it’s used as an internal or external web portal, a collaboration tool or a document and records management repository. These features are part of the Web Analytics capabilities of SharePoint 2010.


Conclusion

Using the new Web Analytics features in SharePoint 2010, you will be able to get a deeper understanding of what users are doing, what they want from your site and how you can tailor the SharePoint experience to bets meet their needs. Keep an eye out for future posts where we will delve deeper into each of the features mentioned above.

Published 23 March 10 12:23 by Jean-Paul Gomes
Filed under: SharePoint, Jean-Paul Gomes, Web Content Management, WCM, Analytics

Slide Sharing

Free Resources

http://www.slideshare.net/

share slides

Tuesday, May 11, 2010

Authenticity

http://www.clir.org/pubs/reports/pub92/lynch.html
Authenticity

Validating authenticity entails verifying claims that are associated with an object—in effect, verifying that an object is indeed what it claims to be, or what it is claimed to be (by external metadata). For example, an object may claim to be created on a given date, to be authored by a specific person, or to be the object that corresponds with a name or identifier assigned by some organization. Some claims may be more mechanistic and indirect than others. For example, a claim that "This object was deposited in a given repository by an entity holding this public/private key pair at this time" might be used as evidence to support authorship or precedence in discovery. Typically, claims are linked to an object in such a way that they include, at least implicitly, a verification of integrity of the object about which claims are made. Rather than simply speaking of the (implied) object accompanying the claim (under the assumption that the correct object will be kept with the claims, and that the object management environment will ensure the integrity of the object) one may include a message digest (and any necessary information about canonicalization algorithms to be applied prior to computing the digest) as part of the metadata assertion that embodies the claim.

It is important to note that tests of authenticity deal only with specific claims (for example, "did X author this document?") and not with open-ended inquiry ("Who wrote it?"). Validating the authenticity of an object is more limited than is an open-ended inquiry into its nature and provenance.

There are two basic strategies for testing a claim. The first is to believe the claim because we can verify its integrity and authenticate its source, and because we choose to trust the source. In other words, we validate the claim that "A is the author of the object with digest X" by first verifying the integrity of the object relative to the claim (that it has digest X), and then by checking that the claim is authenticated (i.e., digitally signed) by a trusted entity (T). The heart of the problem is ensuring that we are certain who T really is, and that T really makes or warrants the claim. The second strategy is what we might call "independent verification" of the claim. For example, if there is a national author registry that we trust, we might verify that the data in the author registry are consistent with the claim of authorship. In both cases, however, validating a claim that is associated with an object ultimately means nothing more or less than making the decision to trust some entity that makes or warrants the claim.

Several final points about authenticity merit attention. First, trust in the maker or warrantor of a claim is not necessarily binary; in the real world, we deal with levels of confidence or degrees of trust. Second, many claims may accompany an object; in evaluating different claims, we may assign them differing degrees of confidence or trust. Thus, it does not necessarily make sense to speak about checking the authenticity of an object as if it were a simple true-or-false test—a computation that produces a one or a zero. It may be more constructive to think about checking authenticity as a process of examining and assigning confidence to a collection of claims. Finally, claims may be interdependent. For example, an object may be accompanied by claims that "This is the object with identifier N," and "The object with identifier N was authored by A" (the second claim, of course, is independent of the document itself, in some sense). Perhaps more interesting, in an archival context, would be claims that "This object was derived from the object with message digest M by a specific reformatting process" and "The object with message digest M was authored by A." (See Lynch 1999 for a more detailed discussion of this case.)

Definition: Integrity

http://www.clir.org/pubs/reports/pub92/lynch.html

Integrity

When we say that a digital object has "integrity," we mean that it has not been corrupted over time or in transit; in other words, that we have in hand the same set of sequences of bits that came into existence when the object was created. The introduction of appropriate canonicalization algorithms allows us to consider the integrity of various abstractions of the object, rather than of the literal bits that make it up, and to operationalize this discussion of abstractions into equality of sets of sequences of bits produced by the canonicalization algorithm.

When we seek to test the integrity of an object, however, we encounter paradoxes and puzzles. One way to test integrity is to compare the object in hand with a copy that is known to be "true."5 Yet, if we have a secure channel to a known true copy, we can simply take a duplicate of the known true copy. We do not need to worry about the accuracy of the copy in hand, unless the point of the exercise is to ensure that the copy in hand is correct—for example, to detect an attempt at fraud, rather than to be sure that we have a correct copy. These are subtly different questions.6

If we do not have secure access to an independently maintained, known true copy of the object (or at least a digest surrogate), then our testing of integrity is limited to internal consistency checking. If the object is accompanied by an authenticated ("digitally signed") digest, we can check whether the object is consistent with the digest (and thus whether its integrity has been maintained) by recomputing the digest from the object in hand and then comparing it with the authenticated digest. But our confidence in the integrity of the object is only as good as our confidence in the authenticity and integrity of the digest. We have only changed the locus of the question to say that if the digest is authentic and accurate, then we can trust the integrity of the object. Verifying integrity is no different from verifying the authenticity of a claim that "the correct message digest for this object is M" without assigning a name to the object. The linkage between claim and object is done by association and context—by keeping the claim bound with the object, perhaps within the scope of a trusted processing system such as an object repository.

In the digital environment, we also commonly encounter the issue of what might be termed "situational" integrity, i.e., the integrity of derivative works. Consider questions such as "Is this an accurate transcript?", "Is this a correct translation?", or "Is this the best possible version given a specific set of constraints on display capability?" Here we are raising a pair of questions: one about the integrity of a base object, and another about the correctness of a computation or other transformation applied to the object. (To be comprehensive, we must also consider the integrity of the result of the computation or transformation after it has been produced). This usually boils down to trust in the source or provider of the computation or transformation, and thus to a question of authentication of source or of validity, integrity, and correctness of code.

Clifford Lynch

http://www.cni.org/staff/clifford_index.html

Clifford Lynch has been the Director of the Coalition for Networked Information (CNI) since July 1997. CNI, jointly sponsored by the Association of Research Libraries and EDUCAUSE, includes about 200 member organizations concerned with the use of information technology and networked information to enhance scholarship and intellectual productivity.

Prior to joining CNI, Lynch spent 18 years at the University of California Office of the President, the last ten as Director of Library Automation. Lynch, who holds a Ph.D. in Computer Science from the University of California, Berkeley, is an adjunct professor at Berkeley's School of Information. He is a past president of the American Society for Information Science and a fellow of the American Association for the Advancement of Science and the National Information Standards Organization.

Lynch currently serves on the National Digital Strategy Advisory Board of the Library of Congress, Microsoft's Technical Computing Science Advisory Board, the board of the New Media Consortium, and the Task Force on Sustainable Digital Preservation and Access; he was a member of the National Research Council committees that published The Digital Dilemma: Intellectual Property in the Information Age and Broadband: Bringing Home the Bits.

Talks, Presentations, and Interviews
Publications


Clifford A. Lynch
Executive Director, Coalition for Networked Information
21 Dupont Circle
Washington, DC, 20036
202.296.5098
202.872.0884 (fax)
clifford@cni.org

How to prove integrity or authenticity

http://www.clir.org/pubs/reports/pub92/lynch.html

we want to ask questions about the authenticity of the object: If its integrity is intact, are the assertions that cluster around the object (including those embedded within it, if any) true or false?

How do we begin to answer questions about authenticity and integrity? There are only a few fundamental approaches.

We examine the provenance of the object (for example, the documentation of the chain of custody) and the extent to which we trust and believe this documentation as well as the extent to which we trust the custodians themselves.
We perform a forensic and diplomatic examination of the object (both its content and its artifactual form) to ensure that its characteristics and content are consistent with the claims made about it and the record of its provenance.
We rely on signatures and seals that are attached to the object or the claims that come with it, or both, and evaluate their forensics and diplomatics and their consistency with claims and provenance.
For mass-produced and distributed (i.e., published) objects, we compare the object in hand with other versions (copies) of the object that may be available (which, in turn, means also assessing the integrity and provenance of these other versions or copies).

Monday, May 10, 2010

Taxonomy and Classification Scheme

http://www.knowledgeonecorp.com/news/pdfs/Do%20you%20really%20need%20a%20Taxonomy%20V2.pdf

Do you really need a Taxonomy/Classification Scheme with a Records Management System?
Why are we still doing it the old way?

Taxonomy and Classification for RIM

http://www.arma-gla.org/presentations/2009-10/Schinkelwitz_Taxonomy.pdf


Taxonomy and
Classification for RIM
Bruce Schinkelwitz, MAS CRM
Presented to Greater Los Angeles ARMA, Nov. 18, 2009

RIM Taxonomy and Developing Effective Classification

Friday, May 7, 2010

The National Archives

Managing Digital Records Without an Electronic Record Management System

The National Archives produces standards and guidance on all aspects of records management. These represent best practice and focus on public record bodies.
http://www.nationalarchives.gov.uk/documents/managing-electronic-records-without-an-erms-publication-edition.pdf
http://nationalarchives.fileburst.com/rmas/
Home
Information management
Records management
Guidance:
Standards:
Best practice guidance:
Cataloguing guidelines:
Records Management Capacity Assessment System:
Electronic records toolkits:
Exporting and transferring electronic data:
XML schema:
Management, appraisal and preservation of electronic records:
Requirements for an offsite store:
Essential Records Management:

Wednesday, April 28, 2010

Web strategy

Web Strategy
by Jeremiah Owyang
http://www.web-strategist.com/blog/
Altimeter Report: Social Marketing Analytics (Altimeter Group & Web Analytics Demystified)
Categories: Altimeter, Analysis, Social Media, Social Media MeasurementPosted on April 22nd, 2010

Altimeter Group

Welcome to Altimeter Group
http://www.altimetergroup.com/
Altimeter Group is a strategy consulting firm that provides companies with a pragmatic approach to disruptive technologies. We have four areas of focus: Leadership and Management, Customer Strategy, Enterprise Strategy, and Innovation and Design.

top 100 blog

http://technorati.com/blogs/top100/
Top 100 blogs on Technorati

Social Marketing Analytics

Social Marketing Analytics: A New Framework for Measuring Results in Social Media
https://www2.gotomeeting.com/register/156018258

Social customer relationship management

"CRM is a philosophy & a business strategy, supported by a technology platform, business rules, workflow, processes & social characteristics, designed to engage the customer in a collaborative conversation in order to provide mutually beneficial value in a trusted & transparent business environment. It's the company's response to the customer's ownership of the conversation."


A Tweetable Definition
"The company's response to the customer's control of the conversation."


Social CRM acknowledges that company equity is created or destroyed by processes outside of the traditional corporate boundaries. Have I shown you my Five Forces of Customer Experience? The takeaway is MIB: Manage what you can, influence what you cannot directly manage, and balance what you can neither manage nor influence. These three need to be core corporate competences (management, partner and customer attitudes and beliefs often using social media tools, and crisis communications).


Social CRM
http://technorati.com/tag/social-crm

Social Media

http://technobabble2dot0.wordpress.com/2007/07/16/social-media-index/

Social Media Index

Friday, April 23, 2010

Ontology: Words of Wisdom

http://www.jfsowa.com/ontology/

Ontology
Definition and Scope
The subject of ontology is the study of the categories of things that exist or may exist in some domain. The product of such a study, called an ontology, is a catalog of the types of things that are assumed to exist in a domain of interest D from the perspective of a person who uses a language L for the purpose of talking about D. The types in the ontology represent the predicates, word senses, or concept and relation types of the language L when used to discuss topics in the domain D.

Digital Preservation Management

http://www.icpsr.umich.edu/dpm/

Digital Preservation Management Training
http://www.icpsr.umich.edu/dpm/dpm-eng/contents.html
Links to Preservation Metadata
This is a preliminary set of links to content in the document captures the links and text where metadata is referenced in the Digital Preservation Management tutorial. Look for future updates as we incorporate and highlight additional tutorial content about key digital preservation topics, in this case preservation metadata. The list indicates the section of the tutorial where the reference is located.

http://www.icpsr.umich.edu/dpm/procedural-accountability.html
Links to Procedural Accountability, Policy Development, and Certification
This is a preliminary set of links to content in the document captures the links and text where metadata is referenced in the Digital Preservation Management tutorial. Look for future updates as we incorporate and highlight additional tutorial content about key digital preservation topics, in this case to procedural accountability, policy development, and certification. The list indicates the section of the tutorial where the reference is located.

http://www.dlib.org/groups.html

Calendar

Below is a listing of digital library meetings, workshops, and conferences, as well as other activities associated with digital libraries research and technologies.

http://www.dlib.org/about.html

A B O U T D - L I B M A G A Z I N E

D-Lib Magazine is an electronic publication with a focus on digital library research and development, including new technologies, applications, and contextual social and economic issues. D-Lib Magazine appeals to a broad technical and professional audience. The primary goal of the magazine is timely and efficient information exchange for the digital library community to help digital libraries be a broad interdisciplinary field, and not a set of specialties that know little of each other.

The Corporation for National Research Initiatives (CNRI) is making D-Lib Magazine available for the advancement of knowledge and practice on digital library research and related matters. Funding was previously provided by the US Defense Advanced Research Projects Agency (DARPA) under Grant No. N66001-98-1-8908 and by the National Science Foundation (NSF) under Grant No. IIS-0243042. The magazine is currently supported by the D-Lib Alliance.

Friday, March 5, 2010

Method in text-analysis

AV1000
Fundamentals of the digital humanities
Method in text-analysis: An introduction
http://www.cch.kcl.ac.uk/legacy/teaching/av1000/textanalysis/method.html

Friday, February 26, 2010

Library index

Library index
http://www.libdex.com/
Discover our directory of library across the world as well as an extensive collection of books.
Read, write & reviews your favourite readings on Libdex!

Needle in a haystack

Needle in a haystack
http://www.economist.com/specialreports/displaystory.cfm?story_id=15557497
A special report on managing information
Needle in a haystack
The uses of information about information
Feb 25th 2010 | From The Economist print edition

Thursday, February 25, 2010

Metadata encoding and transmission standard

Metadata encoding and transmission standard
http://www.loc.gov/standards/mets/
The METS schema is a standard for encoding descriptive, administrative, and structural metadata regarding objects within a digital library, expressed using the XML schema language of the World Wide Web Consortium. The standard is maintained in the Network Development and MARC Standards Office of the Library of Congress, and is being developed as an initiative of the Digital Library Federation.

Wednesday, February 24, 2010

Library to the world

The Bookyards
http://www.bookyards.com/
Our goal is to be "The Library To The World", a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.

Alacra Pulse

About Alacra Pulse
http://pulse.alacra.com/analyst-comments
Alacra Pulse is a technology platform that extracts key business and financial events from traditional news and alternative media/blog sources.

Next Government

Next Gov
http://www.nextgov.com/channels/?oref=topnav
Technology and the Business of Government
Tech Channels
Top Technology Contractors
Managing Technology Archive
Quiz: How Much 2.0 Do You Know?
The Feed: What Feds Are Twittering
Word-By-Word: Federal Tweets
What Transparency Means to Feds
Making Great Gov Web Sites

data elements listed

Organization Descriptions from the Archival Research Catalog (ARC)
data elements listed in the Lifecycle Data Requirements Guide (LCDRG)

Accession NumberFile Format
www.archives.gov/research/arc/lifecycle-data-requirements.doc
The purpose of the Lifecycle Data Requirements Guide is to offer a framework that explains the elements (fields) used to capture lifecycle data at the ...

Use Government Data

Data.gov
http://www.data.gov/
The purpose of Data.gov is to increase public access to high value, machine readable datasets generated by the Executive Branch of the Federal Government.

How to use Data.gov
Data.gov includes searchable data catalogs providing access to data in three ways: through the "raw" data catalog, the tool catalog and the geodata catalog.


http://datagov.ideascale.com/
Evolving Data.gov with You
We opened this discussion to encourage the community to share creative ideas and help us evolve Data.gov.

Sunlight foundation

Sunlight foundation
http://sunlightfoundation.com/about/
The Sunlight Foundation uses cutting-edge technology and ideas to make government transparent and accountable.
The Sunlight Foundation is:
A think-tank that develops and encourages new policies inside the government to make it more open and transparent.
A campaign to engage citizens in demanding the policies that will open government and hold their elected officials accountable for being transparent.
An investigative organization that uses the data we uncover to demonstrate why we need new policies that free government data.
A grant-giving institution that provides resources to organizations using technology to further our mission and create community
An open source technology community that revolves around the Sunlight Foundation's core mission
We very much hope you'll join us in making that vision a reality.

Tuesday, February 23, 2010

Government Agency Application

Government Agency applications
https://www.apps.gov/cloud/advantage/main/start_page.do
efore using/purchasing the products and services on apps.gov, please do so in accordance with your agency's policies and procedures pertaining to Procurement, Information Technology, Cyber Security, Privacy, Accessibility, Social Media, and any other applicable Federal mandates.
Cloud IT Apps
Social Media Apps
Productivity Apps
Business Apps

Security Categorization

FIPS PUB 199
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION
Standards for Security Categorization of Federal Information and Information Systems
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf
Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900
February 2004

Security classification by impact and base on Confidentiality, impact, integrity, availability
POTENTIAL IMPACT DEFINITIONS FOR SECURITY OBJECTIVES

Page 1 notes:
Information is categorized according to its information type. An information type is a specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management) defined by an organization or, in some instances, by a specific law, Executive Order, directive, policy, or regulation.

Security Objectives:
The FISMA defines three security objectives for information and information systems:
CONFIDENTIALITY
“Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information...” [44 U.S.C., Sec. 3542]
A loss of confidentiality is the unauthorized disclosure of information.
INTEGRITY
“Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity...” [44 U.S.C., Sec. 3542]
A loss of integrity is the unauthorized modification or destruction of information.
AVAILABILITY
“Ensuring timely and reliable access to and use of information...” [44 U.S.C., SEC. 3542] A loss of availability is the disruption of access to or use of information or an information system.

Security Categorization Applied to Information Types
The security category of an information type can be associated with both user information and system information3 and can be applicable to information in either electronic or non-electronic form. It can also be used as input in considering the appropriate security category of an information system (see description of security categories for information systems below). Establishing an appropriate security category of an information type essentially requires determining the potential impact for each security objective associated with the particular information type.
The generalized format for expressing the security category, SC, of an information type is:
SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)}, where the acceptable values for potential impact are LOW, MODERATE, HIGH, or NOT APPLICABLE.4
EXAMPLE 1: An organization managing public information on its web server determines that there is no potential impact from a loss of confidentiality (i.e., confidentiality requirements are not applicable), a moderate potential impact from a loss of integrity, and a moderate potential impact from a loss of availability. The resulting security category, SC, of this information type is expressed as:
SC public information = {(confidentiality, NA), (integrity, MODERATE), (availability, MODERATE)}.


TERMS:
AVAILABILITY: Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542] CONFIDENTIALITY: Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary information. [44 U.S.C., SEC. 3542]
SECURITY CATEGORY: The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals.
SECURITY CONTROLS: The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
SECURITY OBJECTIVE: Confidentiality, integrity, or availability.

Minimum Security Requirements

Federal Information processing Standards
Minimum Security Requirements for Federal Information and Information Systems
http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf
FIPS PUB 200
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

3 MINIMUM SECURITY REQUIREMENTS
The minimum security requirements cover seventeen security-related areas with regard to protecting the confidentiality, integrity, and availability of federal information systems and the information processed, stored, and transmitted by those systems. The security-related areas include: (i) access control; (ii) awareness and training; (iii) audit and accountability; (iv) certification, accreditation, and security assessments; (v) configuration management; (vi) contingency planning; (vii) identification and authentication; (viii) incident response; (ix) maintenance; (x) media protection; (xi) physical and environmental protection; (xii) planning; (xiii) personnel security; (xiv) risk assessment; (xv) systems and services acquisition; (xvi) system and communications protection; and (xvii) system and information integrity. The seventeen areas represent a broad-based, balanced information security program that addresses the management, operational, and technical aspects of protecting federal information and information systems.

Specifications for Minimum Security Requirements
AccessControl(AC): Organizationsmustlimitinformationsystemaccesstoauthorizedusers,processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise.
AwarenessandTraining(AT): Organizationsmust:(i)ensurethatmanagersandusersoforganizational information systems are made aware of the security risks associated with their activities and of the applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, or procedures related to the security of organizational information systems; and (ii) ensure that organizational personnel are adequately trained to carry out their assigned information security-related duties and responsibilities.
AuditandAccountability(AU): Organizationsmust:(i)create,protect,andretaininformationsystemaudit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions.
Certification,Accreditation,andSecurityAssessments(CA): Organizationsmust:(i)periodicallyassessthe security controls in organizational information systems to determine if the controls are effective in their application; (ii) develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems; (iii) authorize the operation of organizational information systems and any associated information system connections; and (iv) monitor information system security controls on an ongoing basis to ensure the continued effectiveness of the controls.
2
FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
________________________________________________________________________________________________
ConfigurationManagement(CM): Organizationsmust:(i)establishandmaintainbaselineconfigurationsand inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; and (ii) establish and enforce security configuration settings for information technology products employed in organizational information systems.
ContingencyPlanning(CP): Organizationsmustestablish,maintain,andeffectivelyimplementplansfor emergency response, backup operations, and post-disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations.
IdentificationandAuthentication(IA): Organizationsmustidentifyinformationsystemusers,processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
IncidentResponse(IR): Organizationsmust:(i)establishanoperationalincidenthandlingcapabilityfor organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; and (ii) track, document, and report incidents to appropriate organizational officials and/or authorities.
Maintenance(MA): Organizationsmust:(i)performperiodicandtimelymaintenanceonorganizational information systems; and (ii) provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system maintenance.
MediaProtection(MP): Organizationsmust:(i)protectinformationsystemmedia,bothpaperanddigital;(ii) limit access to information on information system media to authorized users; and (iii) sanitize or destroy information system media before disposal or release for reuse.
Physical and Environmental Protection (PE): Organizations must: (i) limit physical access to information systems, equipment, and the respective operating environments to authorized individuals; (ii) protect the physical plant and support infrastructure for information systems; (iii) provide supporting utilities for information systems; (iv) protect information systems against environmental hazards; and (v) provide appropriate environmental controls in facilities containing information systems.
Planning(PL): Organizationsmustdevelop,document,periodicallyupdate,andimplementsecurityplans for organizational information systems that describe the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems.
PersonnelSecurity(PS): Organizationsmust:(i)ensurethatindividualsoccupyingpositionsof responsibility within organizations (including third-party service providers) are trustworthy and meet established security criteria for those positions; (ii) ensure that organizational information and information systems are protected during and after personnel actions such as terminations and transfers; and (iii) employ formal sanctions for personnel failing to comply with organizational security policies and procedures.
Risk Assessment (RA): Organizations must periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission of organizational information.
SystemandServicesAcquisition(SA): Organizationsmust:(i)allocatesufficientresourcestoadequately protect organizational information systems; (ii) employ system development life cycle processes that incorporate information security considerations; (iii) employ software usage and installation restrictions; and (iv) ensure that third-party providers employ adequate security measures to protect information, applications, and/or services outsourced from the organization.
3
FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
________________________________________________________________________________________________
SystemandCommunicationsProtection(SC): Organizationsmust:(i)monitor,control,andprotect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems; and (ii) employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems.
SystemandInformationIntegrity(SI): Organizationsmust:(i)identify,report,andcorrectinformationand information system flaws in a timely manner; (ii) provide protection from malicious code at appropriate locations within organizational information systems; and (iii) monitor information system security alerts and advisories and take appropriate actions in response.

Computer security

Computer Security Resources Centre in USA
http://csrc.nist.gov/index.html
Computer Security Division, National Institute of Standards and Technology (NIST)

Guide to NIST Information Security Documents

Guide to NIST Information Security Documents
http://csrc.nist.gov/publications/CSD_DocsGuide.pdf
Guide to NIST Information Security Documents

Data Privacy Regulations & Management

Data Privacy Regulations & Management
http://privacyregulation.com/
A global dashboard for privacy issue, USA base

About Steve Meltzer
Profile: Attorney with strong background in privacy regulation, business and real estate. Areas of expertise include privacy law.

http://privacyregulation.com/?cat=1
Articles in Canada

teachers TV

Teaching resources
http://www.teachers.tv/
Through engaging videos, practical resources and an active online community, Teachers TV supports the professional development of anyone working in school, enabling them to widen their skills, develop their practice, and connect with others in the field.