Friday, February 26, 2010

Library index

Library index
http://www.libdex.com/
Discover our directory of library across the world as well as an extensive collection of books.
Read, write & reviews your favourite readings on Libdex!

Needle in a haystack

Needle in a haystack
http://www.economist.com/specialreports/displaystory.cfm?story_id=15557497
A special report on managing information
Needle in a haystack
The uses of information about information
Feb 25th 2010 | From The Economist print edition

Thursday, February 25, 2010

Metadata encoding and transmission standard

Metadata encoding and transmission standard
http://www.loc.gov/standards/mets/
The METS schema is a standard for encoding descriptive, administrative, and structural metadata regarding objects within a digital library, expressed using the XML schema language of the World Wide Web Consortium. The standard is maintained in the Network Development and MARC Standards Office of the Library of Congress, and is being developed as an initiative of the Digital Library Federation.

Wednesday, February 24, 2010

Library to the world

The Bookyards
http://www.bookyards.com/
Our goal is to be "The Library To The World", a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.

Alacra Pulse

About Alacra Pulse
http://pulse.alacra.com/analyst-comments
Alacra Pulse is a technology platform that extracts key business and financial events from traditional news and alternative media/blog sources.

Next Government

Next Gov
http://www.nextgov.com/channels/?oref=topnav
Technology and the Business of Government
Tech Channels
Top Technology Contractors
Managing Technology Archive
Quiz: How Much 2.0 Do You Know?
The Feed: What Feds Are Twittering
Word-By-Word: Federal Tweets
What Transparency Means to Feds
Making Great Gov Web Sites

data elements listed

Organization Descriptions from the Archival Research Catalog (ARC)
data elements listed in the Lifecycle Data Requirements Guide (LCDRG)

Accession NumberFile Format
www.archives.gov/research/arc/lifecycle-data-requirements.doc
The purpose of the Lifecycle Data Requirements Guide is to offer a framework that explains the elements (fields) used to capture lifecycle data at the ...

Use Government Data

Data.gov
http://www.data.gov/
The purpose of Data.gov is to increase public access to high value, machine readable datasets generated by the Executive Branch of the Federal Government.

How to use Data.gov
Data.gov includes searchable data catalogs providing access to data in three ways: through the "raw" data catalog, the tool catalog and the geodata catalog.


http://datagov.ideascale.com/
Evolving Data.gov with You
We opened this discussion to encourage the community to share creative ideas and help us evolve Data.gov.

Sunlight foundation

Sunlight foundation
http://sunlightfoundation.com/about/
The Sunlight Foundation uses cutting-edge technology and ideas to make government transparent and accountable.
The Sunlight Foundation is:
A think-tank that develops and encourages new policies inside the government to make it more open and transparent.
A campaign to engage citizens in demanding the policies that will open government and hold their elected officials accountable for being transparent.
An investigative organization that uses the data we uncover to demonstrate why we need new policies that free government data.
A grant-giving institution that provides resources to organizations using technology to further our mission and create community
An open source technology community that revolves around the Sunlight Foundation's core mission
We very much hope you'll join us in making that vision a reality.

Tuesday, February 23, 2010

Government Agency Application

Government Agency applications
https://www.apps.gov/cloud/advantage/main/start_page.do
efore using/purchasing the products and services on apps.gov, please do so in accordance with your agency's policies and procedures pertaining to Procurement, Information Technology, Cyber Security, Privacy, Accessibility, Social Media, and any other applicable Federal mandates.
Cloud IT Apps
Social Media Apps
Productivity Apps
Business Apps

Security Categorization

FIPS PUB 199
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION
Standards for Security Categorization of Federal Information and Information Systems
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf
Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900
February 2004

Security classification by impact and base on Confidentiality, impact, integrity, availability
POTENTIAL IMPACT DEFINITIONS FOR SECURITY OBJECTIVES

Page 1 notes:
Information is categorized according to its information type. An information type is a specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management) defined by an organization or, in some instances, by a specific law, Executive Order, directive, policy, or regulation.

Security Objectives:
The FISMA defines three security objectives for information and information systems:
CONFIDENTIALITY
“Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information...” [44 U.S.C., Sec. 3542]
A loss of confidentiality is the unauthorized disclosure of information.
INTEGRITY
“Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity...” [44 U.S.C., Sec. 3542]
A loss of integrity is the unauthorized modification or destruction of information.
AVAILABILITY
“Ensuring timely and reliable access to and use of information...” [44 U.S.C., SEC. 3542] A loss of availability is the disruption of access to or use of information or an information system.

Security Categorization Applied to Information Types
The security category of an information type can be associated with both user information and system information3 and can be applicable to information in either electronic or non-electronic form. It can also be used as input in considering the appropriate security category of an information system (see description of security categories for information systems below). Establishing an appropriate security category of an information type essentially requires determining the potential impact for each security objective associated with the particular information type.
The generalized format for expressing the security category, SC, of an information type is:
SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)}, where the acceptable values for potential impact are LOW, MODERATE, HIGH, or NOT APPLICABLE.4
EXAMPLE 1: An organization managing public information on its web server determines that there is no potential impact from a loss of confidentiality (i.e., confidentiality requirements are not applicable), a moderate potential impact from a loss of integrity, and a moderate potential impact from a loss of availability. The resulting security category, SC, of this information type is expressed as:
SC public information = {(confidentiality, NA), (integrity, MODERATE), (availability, MODERATE)}.


TERMS:
AVAILABILITY: Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542] CONFIDENTIALITY: Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary information. [44 U.S.C., SEC. 3542]
SECURITY CATEGORY: The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals.
SECURITY CONTROLS: The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
SECURITY OBJECTIVE: Confidentiality, integrity, or availability.

Minimum Security Requirements

Federal Information processing Standards
Minimum Security Requirements for Federal Information and Information Systems
http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf
FIPS PUB 200
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

3 MINIMUM SECURITY REQUIREMENTS
The minimum security requirements cover seventeen security-related areas with regard to protecting the confidentiality, integrity, and availability of federal information systems and the information processed, stored, and transmitted by those systems. The security-related areas include: (i) access control; (ii) awareness and training; (iii) audit and accountability; (iv) certification, accreditation, and security assessments; (v) configuration management; (vi) contingency planning; (vii) identification and authentication; (viii) incident response; (ix) maintenance; (x) media protection; (xi) physical and environmental protection; (xii) planning; (xiii) personnel security; (xiv) risk assessment; (xv) systems and services acquisition; (xvi) system and communications protection; and (xvii) system and information integrity. The seventeen areas represent a broad-based, balanced information security program that addresses the management, operational, and technical aspects of protecting federal information and information systems.

Specifications for Minimum Security Requirements
AccessControl(AC): Organizationsmustlimitinformationsystemaccesstoauthorizedusers,processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise.
AwarenessandTraining(AT): Organizationsmust:(i)ensurethatmanagersandusersoforganizational information systems are made aware of the security risks associated with their activities and of the applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, or procedures related to the security of organizational information systems; and (ii) ensure that organizational personnel are adequately trained to carry out their assigned information security-related duties and responsibilities.
AuditandAccountability(AU): Organizationsmust:(i)create,protect,andretaininformationsystemaudit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions.
Certification,Accreditation,andSecurityAssessments(CA): Organizationsmust:(i)periodicallyassessthe security controls in organizational information systems to determine if the controls are effective in their application; (ii) develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems; (iii) authorize the operation of organizational information systems and any associated information system connections; and (iv) monitor information system security controls on an ongoing basis to ensure the continued effectiveness of the controls.
2
FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
________________________________________________________________________________________________
ConfigurationManagement(CM): Organizationsmust:(i)establishandmaintainbaselineconfigurationsand inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; and (ii) establish and enforce security configuration settings for information technology products employed in organizational information systems.
ContingencyPlanning(CP): Organizationsmustestablish,maintain,andeffectivelyimplementplansfor emergency response, backup operations, and post-disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations.
IdentificationandAuthentication(IA): Organizationsmustidentifyinformationsystemusers,processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
IncidentResponse(IR): Organizationsmust:(i)establishanoperationalincidenthandlingcapabilityfor organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; and (ii) track, document, and report incidents to appropriate organizational officials and/or authorities.
Maintenance(MA): Organizationsmust:(i)performperiodicandtimelymaintenanceonorganizational information systems; and (ii) provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system maintenance.
MediaProtection(MP): Organizationsmust:(i)protectinformationsystemmedia,bothpaperanddigital;(ii) limit access to information on information system media to authorized users; and (iii) sanitize or destroy information system media before disposal or release for reuse.
Physical and Environmental Protection (PE): Organizations must: (i) limit physical access to information systems, equipment, and the respective operating environments to authorized individuals; (ii) protect the physical plant and support infrastructure for information systems; (iii) provide supporting utilities for information systems; (iv) protect information systems against environmental hazards; and (v) provide appropriate environmental controls in facilities containing information systems.
Planning(PL): Organizationsmustdevelop,document,periodicallyupdate,andimplementsecurityplans for organizational information systems that describe the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems.
PersonnelSecurity(PS): Organizationsmust:(i)ensurethatindividualsoccupyingpositionsof responsibility within organizations (including third-party service providers) are trustworthy and meet established security criteria for those positions; (ii) ensure that organizational information and information systems are protected during and after personnel actions such as terminations and transfers; and (iii) employ formal sanctions for personnel failing to comply with organizational security policies and procedures.
Risk Assessment (RA): Organizations must periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission of organizational information.
SystemandServicesAcquisition(SA): Organizationsmust:(i)allocatesufficientresourcestoadequately protect organizational information systems; (ii) employ system development life cycle processes that incorporate information security considerations; (iii) employ software usage and installation restrictions; and (iv) ensure that third-party providers employ adequate security measures to protect information, applications, and/or services outsourced from the organization.
3
FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
________________________________________________________________________________________________
SystemandCommunicationsProtection(SC): Organizationsmust:(i)monitor,control,andprotect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems; and (ii) employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems.
SystemandInformationIntegrity(SI): Organizationsmust:(i)identify,report,andcorrectinformationand information system flaws in a timely manner; (ii) provide protection from malicious code at appropriate locations within organizational information systems; and (iii) monitor information system security alerts and advisories and take appropriate actions in response.

Computer security

Computer Security Resources Centre in USA
http://csrc.nist.gov/index.html
Computer Security Division, National Institute of Standards and Technology (NIST)

Guide to NIST Information Security Documents

Guide to NIST Information Security Documents
http://csrc.nist.gov/publications/CSD_DocsGuide.pdf
Guide to NIST Information Security Documents

Data Privacy Regulations & Management

Data Privacy Regulations & Management
http://privacyregulation.com/
A global dashboard for privacy issue, USA base

About Steve Meltzer
Profile: Attorney with strong background in privacy regulation, business and real estate. Areas of expertise include privacy law.

http://privacyregulation.com/?cat=1
Articles in Canada

teachers TV

Teaching resources
http://www.teachers.tv/
Through engaging videos, practical resources and an active online community, Teachers TV supports the professional development of anyone working in school, enabling them to widen their skills, develop their practice, and connect with others in the field.

Tag (metadata)

Tag (metadata)
http://en.wikipedia.org/wiki/Tag_(metadata)
In online computer systems terminology, a tag is a non-hierarchical keyword or term assigned to a piece of information (such as an internet bookmark, digital image, or computer file)

1 min notes

The Internet Engineering Task Force (IETF)

The Internet Engineering Task Force (IETF)
http://www.ietf.org/
The goal of the IETF is to make the Internet work better.
The mission of the IETF is make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.

https://datatracker.ietf.org/ipr/
IETF Page of Intellectual Property Rights Disclosures

Search the IPR Disclosures
Generic IPR Disclosures
Specific IPR Disclosures
Specific Third Party IPR Disclosures

ISOC - Internet Society

ISOC - Internet Society
http://www.ietf.org/
ISOC is a not-for-profit organization founded in 1992 to provide leadership in Internet related standards, education, and policy. ISOC is supported by more than 90 organizational members and 26,000 individual members.

Friday, February 19, 2010

The Text REtrieval Conference

The Text REtrieval Conference (TREC),
http://trec.nist.gov/overview.html
The Text REtrieval Conference (TREC), co-sponsored by the National Institute of Standards and Technology (NIST) and U.S. Department of Defense, was started in 1992 as part of the TIPSTER Text program. Its purpose was to support research within the information retrieval community by providing the infrastructure necessary for large-scale evaluation of text

Dublincore

Dublincore
(http://dublincore.org
The mission of the Dublin Core Metadata Initiative is to provide simple standards to facilitate the finding, sharing and management of information
Project list
http://dublincore.org/projects/

Knowledge Lost in Information

Knowledge Lost in Information
http://www.sis.pitt.edu/~dlwkshop/JISC/NSFreport.pdf
Report of the NSF Workshop
on Research Directions for Digital Libraries
June 15-17, 2003
Chatham, MA
NSF Award No. IIS-0331314

Metadata Harvesting

The Open Archives Initiative Protocol for Metadata Harvesting
Protocol Version 2.0 of 2002-06-14
Document Version 2008-12-07T20:42:00Z
http://www.openarchives.org/OAI/2.0/openarchivesprotocol.htm
Previous protocol version: Protocol Version 1.1 of 2001-07-02
Instructions for migrating from Version 1.1 to 2.0
Implementation Guidelines

Implementation Guidelines for the Open Archives Initiative Protocol for Metadata Harvesting
Protocol Version 2.0 of 2002-06-14
Document Version 2005/05/03T22:51:00Z
http://www.openarchives.org/OAI/2.0/guidelines.htm

Personal digital libraries

Personal digital libraries
http://www.sis.pitt.edu/~dlwkshop/paper_borgman.html
Personal digital libraries: Creating individual spaces for innovation
Christine L. Borgman, University of California

the Sagamore Institute

the Sagamore Institute
http://www.sipr.org
We are a nonprofit, nonpartisan think tank headquartered in Indianapolis.
Welcome to the Sagamore Institute for Policy Research, a nonprofit, nonpartisan think tank headquartered in Indianapolis. Sagamore Institute is committed to what is known as "applied research"-research that actually puts theories and ideas to the test in the real world by working alongside practitioners, learning from them, and measuring the results of theories put into practice, rather than simply hypothesizing from an ivory tower.

Movie sites index

Movie sites index
http://www.moviemaker.com/producing/article/50_best_websites_for_moviemakers_2009_20090610/
50 Best Websites for Moviemakers 2009

Topics

Privacy
Open Government
Web 2.0, Enterprise 2.0
Analyst
Resources (free)
Government organization
Standards
Trend

The Best Websites

The Best Websites
http://www.the-bestwebsites.com/categories/reference/libraries.html
listing of websites

Index of wiki sites

Index of wiki sites
http://wikindex.com/

Search User Interfaces

Search User Interfaces
http://searchuserinterfaces.com/book/
New Book: Search User Interfaces
Marti Hearst | Cambridge University Press | 2009
Cambridge University Press
ISBN 9780521113793

Thursday, February 18, 2010

The Revolution Will be Digitized

The Revolution Will be Digitized: How IT is Affecting Business and Competition
http://www.ischool.berkeley.edu/newsandevents/events/dls20091104
The Revolution Will be Digitized: How IT is Affecting Business and Competition
Speaker: Andrew McAfee
Distinguished Lecture
Wednesday, November 4, 2009, 4:00 pm - 5:30 pm
202 South Hall
Andrew McAfee - name Web 2.0

ischool, berkeley

UC Berkeley's (The) School of Information
http://www.ischool.berkeley.edu/
The School of Information is both UC Berkeley's newest and its smallest school. Located in the center of campus, the I School is a graduate research and education community committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy. This requires the insights of scholars from diverse fields—information and computer science, design, social sciences, management, law, and policy.





The iSchools
http://www.ischools.org/
The iSchools are interested in the relationship between information, people and technology. This is characterized by a commitment to learning and understanding the role of information in human endeavors. The iSchools take it as given that expertise in all forms of information is required for progress in science, business, education, and culture. This expertise must include understanding of the uses and users of information, as well as information technologies and their applications.

What is a "Blog"?

This is the beginning of a new journey..................


This is page to redirect a miscelaneous information regarding information management. When the topic grow to a certain volume, it should be move to individual topy