Page 31 - Building Digital Libraries
P. 31

CHAPTER 2


                                                          •	 Is metadata extracted from the objects themselves,
                                                             uploaded in a separate process, or is it keyed in?

                                                          •	 What requirements are there for the metadata in terms of
                                                             structure, format, and content?
                                                          •	 What operations such as normalization into standard
                                                             formats or generation of derivatives are necessary for new
                                                             resources?
                                                          •	 What opportunities for automation are available?
                                                          •	 Who will be managing which parts of the metadata?

                                                   Of the questions in the list above, the most important regard the addition
                                                   of metadata and batch support. Metadata provides the context for resources
                                                   which makes them useful, so special attention needs to be devoted to the
                                                   addition of metadata, since the success of the repository ultimately hinges
                                                   on the ability to efficiently provide the metadata needed to use and manage
                                                   resources. Are the needed data fields supported, and can the required fields
                                                   be completely and efficiently populated?
                                                      If support for batch operations is required, are the batch operations
                                                   provided sufficient, and can they be made compatible with existing work-
                                                   flows or ones that could be realistically implemented? Even if an application
                                                   programming interface (API) is provided that allows the library to design
                                                   a custom interface, all tools must ultimately interface with humans and the
                                                   way they actually work.



                                                   What Rights Management and Access
                                                   Controls Do You Need?
                                                   All systems require access controls, if only to define who can assign rights
                                                   as well as upload and modify data and objects. Support for access controls
                                                   varies widely across systems and includes the ability to restrict the ability
                                                   to create, view, modify, download, and perform operations on collections,
                                                   objects, or metadata based on factors such as:

                                                          •	 user
                                                          •	 group
                                                          •	 role (e.g., administrator, staff, collection manager, student
                                                             worker, authenticated user, general public, etc.)
                                                          •	 network location
                                                          •	 object or metadata properties such as being protected by
                                                             embargo, the Health Insurance Portability and Accountabil-
                                                             ity Act, or the Family Educational Rights and Privacy Act
                                                          •	 other factors

                                                   Rights management potentially involves identity management systems,
                                                   authentication protocols, and the storage of staff and user data. Legal
                                                   and institutional requirements that dictate where and how data and user

            16
   26   27   28   29   30   31   32   33   34   35   36