Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Yet, surprisingly, metadata are often still categorized as non-sensitive.

Crawling COVID-19: What (and how) web archivists collect

Archive-It

In this case, that digital space is less a parallel publishing platform for institutions than a subject in and of itself, with context and character of its own to capture and represent. Metadata is for sharing. Case Studies COVID-19

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! There was a table of metadata to be produced associated with the discovery specifications, but it was not included in the order. Case opinion link courtesy of eDiscovery Assistant.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Archiving Spontaneous Events Case Studies

COVID-19 collections and resouces: An update for web archivists

Archive-It

Case studies. We monitor new public collections like these for relevant naming and metadata. Case Studies Collaborative Collecting COVID-19 How Toby Karl-Rainer Blumenthal, Web Archivist for Archive-It. Web archiving partners of all kinds are collecting the records of COVID-19 on the web. At the time of writing, nearly 200 distinct collections have already been created represent different aspects of the global crisis.

Learn more about web archiving with Archive-It Advanced Training

Archive-It

Hear Archive-It partners and metadata experts discuss their approaches in the Describing Web Archives training. This training features advice from librarians and archivists at Harvard University Library, the University of North Carolina Chapel Hill, and the Frick Art Reference Library, including the connections between each organization’s practices and recommendations from the OCLC Research Library Partnership: Web Archiving Metadata Working Group. Case Studies How To

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

In order to aid this work, Mariana and Natalie put together a written tutorial and provided the metadata fields necessary for creating the seeds, and head of cataloging Guadalupe de Vega and cataloger Carmen Yasmina López took charge of organizing and authoring metadata for the seeds. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

Expand the reach of Archive-It collections with these access integrations

Archive-It

Archive-It partners can enable direct access to their captures, collection descriptions, and other related metadata beyond the default portal of archive-it.org, customizing where and how patrons find and explore their web archives. Case Studies How To

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

A second change we made was adding broad subject facets and creator facets to our Archive-It metadata, allowing users to narrow down the 138 collections currently part of the FDLP Web Archive. Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S. Government Publishing Office (GPO).

Data Mapping Tools: What Are the Key Differentiators

erwin

BFSI, PHARMA, INSURANCE AND NON-PROFIT) CASE STUDIES FOR AUTOMATED METADATA-DRIVEN AUTOMATION. Additionally, a tool that leverages and draws from a single metadata repository means that mappings are dynamically linked with underlying metadata to render automated lineage views, including full transformation logic in real time. As stated above, a data governance platform that draws from a single metadata source is even more advantageous here.

7 Questions to Determine if Your Data is an Asset

AIIM

FREE Webinar: Learn more from this Case Study on Leveraging Data to Transform Customer Experience]. Knowledge and documentation metadata? Join us for a free webinar on Wednesday, March 20th at 2pm as Leading Financial Services Analyst, Norman Wren, walks through a case study to show how his company leveraged smart technology to take back control of their data and improve customer experience.

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Since a taxonomy is a reflection of what it organizes, in this case we’re reflecting our profession. Dark data : There is a case to be made that this should have been added last year, but we deferred then, and have added it this year.

ROT 59

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Cybaze -Yoroi ZLAB team also decided to play around with it, but this time using a real case study, AZORult : one of the most active threats spreading nowadays, always using new methodologies to avoid detection.

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources). Interestingly, many of the case studies reported similar challenges, for example concerns about the impact on commercial opportunities or the difficulties in selecting the most suitable CC licence.

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

The above heuristics are organized in the 3 categories, the “Account attributes,” “Content,” and “Content Metadata.” The experts shared a case study related to the discovery of a sophisticated botnet of at least 15,000 bots involved in a cryptocurrency scam.

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Kelly also briefly discussed an experimental workflow that uses Zotero to create descriptive metadata for web archives. In essence, metadata about various web resources was captured in a Zotero library and exported into a CSV spreadsheet where it could be cleaned up, mapped to Archive-It’s Dublin core metadata elements, and uploaded to Archive-It. However, Kelly referenced an article recently published in the Journal of Contemporary Archival Studies concerning trauma.

Truth, Lies & Videotape: Digital Video Archivists Gather at MoMA

Archives Blogs

Through a combination of case studies, key notes, and panels, DAS examines the full lifecycle of digital content. Levine from HBO and metadata architect Sally Hubbard explored the relationship between information science and data science in “ Smart Stacking of Data and Information Science.” The afternoon featured two cases studies. We live in a video age. Make that a digital video age.

Archive-It Partner News, May 2018

Archive-It

If you have use cases for automatically integrating more descriptive, administrative, or technical metadata about your web archives into finding aids, catalogs, preservation systems, access portals, or elsewhere, we want to hear from you! To share your ideas, use cases, and to become a beta tester, contact us directly at: ait [at] archive [dot] org. Developing a Web Archiving Application Metadata Profile at UVA. by the Archive-It team.

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

There are three primary and distinct roles to consider, whether you're building or buying DaaS - regardless of the type or characteristics of data that's being exchanged; big data, open data, fast data, IoT/IoE data, metadata, microdata, multimedia content, structured, non-structured, semi-structured.

THE MOTIVATION AND DESIGN BEHIND AUTOGENERATED CHALLENGES

ForAllSecure

In our approach, an autogenerated challenge is comprised of challenge metadata, a generation script, and templatable challenge files (source code and other problem resources). The metadata provides information about the challenge such as the author, category, point value, and any hints pertaining to the challenge. CASE STUDY: VARIABLE LENGTH BUFFERS AND CANARIES. This is our basic challenge metadata.