Integration of Scholarly Communication Metadata Using Knowledge Graphs

Author(s):  
Afshin Sadeghi ◽  
Christoph Lange ◽  
Maria-Esther Vidal ◽  
Sören Auer
2016 ◽  
Author(s):  
Tiffany L Bogich ◽  
Sebastien P Ballesteros

Author(s):  
Markus Wust

This qualitative study investigates how faculty gather information for teaching and research and their opinions on open access approaches to scholarly communication. Despite generally favorable reactions, a perceived lack of peer review and impact factors were among the most common reasons for not publishing through open-access forums.Cette étude qualitative examine comment les membres du corps professoral recueillent l’information pour l’enseignement et la recherche, et leurs opinions envers les approches de la communication scientifique à libre accès. Malgré des réactions généralement favorables, le manque perçu de révision par les pairs et les facteurs d’impact comptent parmi les motifs habituellement évoqués pour ne pas publier sur ces tribunes à libre accès. 


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2018 ◽  
Author(s):  
Mike Nutt ◽  
Gregory Raschke

Library spaces that blend collaboration areas, advanced technologies, and librarian expertise are creating new modes of scholarly communication. These spaces enable scholarship created within high-definition, large-scale visual collaborative environments. This emergent model of scholarly communication can be experienced within those specific contexts or through digital surrogates on the networked Web. From experiencing in three dimensions the sermons of John Donne in 1622 to interactive media interpretations of American wars, scholars are partnering with libraries to create immersive digital scholarship. Viewing the library as a research platform for these emergent forms of digital scholarship presents several opportunities and challenges. Opportunities include re-engaging faculty in the use of library space, integrating the full life-cycle of the research enterprise, and engaging broad communities in the changing nature of digitally-driven scholarship. Issues such as identifying and filtering collaborations, strategically managing staff resources, creating surrogates of immersive digital scholarship, and preserving this content for the future present an array of challenges for libraries that require coordination across organizations. From engaging and using high-technology spaces to documenting the data and digital objects created, this developing scholarly communication medium brings to bear the multifaceted skills and organizational capabilities of libraries.


Author(s):  
Tianshuo Zhou ◽  
Ziyang Li ◽  
Gong Cheng ◽  
Jun Wang ◽  
Yu'Ang Wei

Sign in / Sign up

Export Citation Format

Share Document