179 Matching Annotations
  1. Feb 2025
    1. The PID Meta Resolver is a generalized resolver for mapping items into records. The  PID Meta Resolver will know where to route different types of identifiers – e.g. DOI or URN:NBN. The PID Meta Resolver will improve machine based data processing and will allow getting digital object information without in-depth knowledge of the resolution mechanism of different PID systems. That enhances the compilation and analysis of data collections originating not only from different sources but also referenced by different PID systems.

      Example metaresolver

    1. N2T is an identifier scheme resolver that given a provided identifier, matches it to an identifier scheme definition. Depending on the form of the request, a successful match will either redirect to the registered target or present information about the matched definition.

      Example of a metaresolver

  2. Nov 2024
  3. Sep 2024
    1. ISO 24619:2011 specifies requirements for the persistent identifier (PID) framework and for using PIDs for referencing and citing documents, files and language resources (e.g digital dictionaries, text corpora, linguistic annotated corpora). A PID is an electronic identification referring to or citing electronic documents, files, resources, resource collections such as books, articles, papers, images etc. ISO 24619:2011 also addresses issues of persistence and granularity of references to resources, first by requiring that persistent references be implemented by using a PID framework and further by imposing requirements on any PID frameworks used for this purpose.
  4. Aug 2024
  5. May 2024
  6. www.islrn.org www.islrn.org
    1. The International Standard Language Resource Number (ISLRN) is a new, unique and universal identification schema for Language Resources which provides Language Resources with unique names using a standardized nomenclature. It also ensures Language Resources are identified, and consequently recognized with proper references in activities within Human Language Technologies, as well as in documents and scientific papers.
  7. Jan 2024
  8. Nov 2023
  9. Oct 2023
    1. DOIs have a business model. LSIDs currently do not. Without a business model (read funding) we should stick to something that doesn’t have the implementation/adoption impediment of LSIDs and make the best of it (i.e. just have a usage policy for HTTP URIs).
    2. Without some kind of persistence mechanism the only advantage of LSIDs is that they look like they are supposed to be persistent. Unfortunately, because many people are using UUIDs as their object identifiers LSIDs actually look like something you wouldn’t want to look at let alone expose to a user! CoL actually hide them because they look like this: urn:lsid:catalogueoflife.org:taxon:d755ba3e-29c1-102b-9a4a-00304854f820:ac2009
    1. The preferred PID scheme In consideration of the foregoing, the strongest option across the studied major dimensions of the available Handle System PID schemes and operational modes is for DiSSCo to use DOIs to identify Digital Specimens. The case for choosing DOI comes out slightly more strongly than choosing ePIC for reasons related to the substantial achievements, operational experience and reputation of DOI/ IDF to date. Operating under another Handle-system prefix than those used by IDF and ePIC is the substantially weakest option because of the difficulties associated with introducing an identifier that is not perceived to be a DOI. The term ‘DOI’ is trademarked by the IDF and thus not available for describing other identifiers. The practical and sensible avenue to explore further are the options to establish and become an RA member of the DOI Foundation (option A5) and to enter a strategic alliance at the level of the DOI Foundation (option A1). These options are likely most effective when actioned in combination.

      Preferred PID Scheme

    2. When digitized, each resulting ‘Digital Specimen’ must be persistently and unambiguously identified. Subsequent events or transactions associated with the Digital Specimen, such as annotation and/or modification by a scientist must be recorded, stored and also unambiguously identified.

      Workflows

    3. Persistent identifiers (PID) to identify digital representations of physical specimens in natural science collections (i.e., digital specimens) unambiguously and uniquely on the Internet are one of the mechanisms for digitally transforming collections-based science.

      Use case

    1. Compact identifiers are a longstanding informal convention in bioinformatics. To be used as globally unique, persistent, web-resolvable identifiers, they require a commonly agreed namespace registry with maintenance rules and clear governance; a set of redirection rules for converting namespace prefixes, provider codes and local identifiers to resolution URLs; and deployed production-quality resolvers with long-term sustainability.

      Characteristics

    1. Wittenburg, P., Hellström, M., Zwölf, C.-M., Abroshan, H., Asmi, A., Di Bernardo, G., Couvreur, D., Gaizer, T., Holub, P., Hooft, R., Häggström, I., Kohler, M., Koureas, D., Kuchinke, W., Milanesi, L., Padfield, J., Rosato, A., Staiger, C., van Uytvanck, D., & Weigel, T. (2017). Persistent identifiers: Consolidated assertions. Status of November, 2017. Zenodo. https://doi.org/10.5281/zenodo.1116189

      Characteristics

    1. Over time the risk grows that the document is no longer accessible at the loca-tion given as reference. Web servers that follow the HTTP protocol then givethe notorious reply: ‘404 not found’. This resembles the situation of a book in a– very large – library that is not on the shelf at the position indicated in the cata-logue. How is it to be found?

      PID Issues

    1. Archives. The Member shall use best efforts to contract with a third-party archive or other content host (an "Archive") (a list of which can be found here) for such Archive to preserve the Member's Content and, in the event that the Member ceases to host the Member's Content, to make such Content available for persistent linking.

      Characteristics

    1. 5.2. Key ? was(DESCRIPTION) when(DATE) resync This "metadata" command form provides nothing more than a way to carry a Key along with its description. The form is a "no-op" (except when "resync" is present) in the sense that the Key is treated as an adorned URL (as if no THUMP request were present). This form is designed as a passive data structrue that pairs a hyperlink with its metadata so that a formatted description might be surfaced by a client-side trigger event such as a "mouse-over". It is passive in the sense that selecting ("clicking on") the URL should result in ordinary access via the Key-as-pure-link as if no THUMP request were present. The form is effectively a metadata cache, and the DATE of last extraction tells how fresh it is. The "was" pseudo-command takes multiple arguments separated by "|", the first argument identifying the kind of DESCRIPTION that follows, e.g,

      ARK Kernel Metadata Query

    1. To resolve a Compact ARK (ie, an ARK beginning "ark:") it must initially be promoted to a Mapping ARK so that it becomes actionable. On the web, this means finding a suitable web Resolver Service to prepend to the compact form of the identifier in order to convert it to a URL (cf [CURIE]). (This is more or less true for any type of identifier not already in URL form.)

      Characteristics

    1. CLARIN: European Research Infrastructure for Language Resources and Technology CNIC: Computer Network Information Center, Chinese Academy of Sciences, China CSC: IT Center for Science CSCS: Swiss National Supercomputing Centre DKRZ: Deutsches Klimarechenzentrum GRNET: Greek Research and Technology Network GWDG: Gesellschaft für wissenschaftliche Datenverarbeitung Göttingen SND: Swedish National Data Center SURF: SURF is the collaborative ICT organization for higher education and research in the Netherlands

      ePIC Members

    1. When content underlying a DOI is updated, we recommend updating the DOI metadata and, for major changes, assigning a new DOI. For minor content changes, the same DOI may be used with updated metadata. A new DOI is not required. For major content changes, we recommend assigning a new DOI and linking the new DOI to the previous DOI with related identifiers.

      Characteristics

    1. succession: The plan for dealing with sudden loss of provider viability, including set-aside funding and length of time that operations would be able to support continued operation while a successor provider is found to keep references intact.

      Succession

    2. landing: content intended mostly for human consumption, such as an object description and links to primary information (e.g., an image file or a spreadsheet), to alternate versions and formats, and to related information; from “landing page”, this is intended to support a browsing experience of an abstract overall view of the object.

      Expectations

    3. waxing: change that is limited to appending content in a way that does not in itself disrupt or displace previously recorded content. Examples of waxing objects include live sensor-based data feeds, citation databases, and serial publications.

      Expectations Dynamic Citation

    4. finite: availability is expected to end on or around a given date (e.g., limited support for software versions not marked “long term stable”) or trigger event (e.g., single-use link). indefinite: the provider has no particular commitment to the object. lifetime: the object is expected to be available as long as the provider exists. subinfinite: due to succession arrangements, the object is expected to be available beyond the provider organization’s lifetime.

      Expectations

      'Indefinite' should rather be 'Undefined'

    5. We define content variance to be a description of the ways in which provider policy or practice anticipates how an object’s content will change over time. Approaches to content variance differ depending on the object, version, service, and provider.

      Expectations

    6. molting: Previously recorded content may be entirely overwritten at any time with content that preserves thematic continuity. For example, an organization’s homepage may be completely reworked while continuing to be its homepage, and a weather or financial service page may reflect dramatic changes in conditions several times a day.

      Expectations

    7. rising: Previously recorded content may be improved at any time, for example, with better metadata (datasets), new features (software), or new insights (pre- and post-prints). This encompasses any change under “fixing”

      Expectations

    8. keeping: Previously recorded content will not change, but character, compression, and markup encodings may change during a format migration, and high-priority security concerns will be acted upon (e.g., software virus decontamination, security patching).

      Expectations

    9. id string: the sequence of characters that is the identifier string itself, possibly modified by adding a well-known prefix (often starting with http://) in order to turn it into a URL. identifier: an association between an id string and a thing; e.g., an identifier “breaks” when the association breaks, but to act on an identifier requires its id string. actionable identifier: an identifier whose id string may be acted upon by widely available software systems such as web browsers; e.g., URLs are actionable identifiers.

      Classes of identifier

    10. By contrast, repositories such as figshare (figshare 2016) and Merritt (Abrams et al. 2011) tolerate changes to metadata under the PID assigned originally, but create a new “versioned” PID if the object title or a component file changes, and in the latter case, the original non-versioned PID always references the latest version

      Versioning

    1. In addition, PIDs may be local to an individual organization (e.g. identifiers in an internal human resources system), national (e.g. the DAI – Digital Author Identifier, used in the Netherlands), or global (all the examples in the paragraph above).

      PID Scope

    2. identifiers for organizations, including GRID (Global Research Identifier Database), Ringgold IDs, ISNIs (International Standard Name Identifiers), LEIs (legal entity identifiers) and the identifiers that will be provided by the recently announced Research Organization Registry2

      PID Entities - organisations

    1. ARK systems such as Noid and N2T can record and provide metadata about any resource with an ARK.  That metadata becomes available via APIs, and can be seen when you add “?” to the end of an ARK URL. (See “Inflections” below) ARK metadata is very flexible, with no initial required metadata, but with support for multiple metadata schemas.  This flexibility is intentional: ARKs are designed to support a full digital object workflow, including the earliest stages before a resource is well-understood or described.

      ARK Metadata

  10. Sep 2023
    1. DOIs are a great solution for the problem of URIs that change over time, but this approach does depend on journal publishers, repositories, libraries, and other major hosting organization to be responsible for maintaining current link information within the DOI records that they have created

      Integrity

    1. Brown, Josh, Jones, Phill, Meadows, Alice, & Murphy, Fiona. (2022). Incentives to invest in identifiers: A cost-benefit analysis of persistent identifiers in Australian research systems. Zenodo. https://doi.org/10.5281/zenodo.7100578

      P1: Benefits of PIDs

    1. PIDs for research dataPIDs for instrumentsPIDs for academic eventsPIDs for cultural objects and their contextsPIDs for organizations and projectsPIDs for researchers and contributorsPIDs for physical objectsPIDs for open-access publishing services and current research information systems (CRIS)PIDs for softwarePIDs for text publications

      PID Use Case Elements, entities

    1. Registration of research output is necessary to report tofunders like NWO, ZonMW, SIA, etc. for monitoring andevaluation of research (e.g. according to SEP or BKOprotocols). Persistent identifiers can be applied to ease theadministrative burden. This results in better reporting,better information management and in the end betterresearch information.

      Registering and reporting research

    1. Deduplication of researchersLinkage with awardsAuthoritative attribution of affiliationand worksORCID iD RecommendedIdentification of datasets, software andother types of research outputsDataCite DOI RecommendedIdentification of organisations GRID/ROR RecommendedIdentification of organisations inNZRISNZBN Required for data providers

      PID Use Cases

    1. The progress and impact of the project will be measured and monitored through the collection ofquantitative indicators. The different systems of the project partners as well as ORCID Inc. andROR will be queried. If possible, indicators for all 10 PID use cases should be measured. Theseinclude for example the following indicators:● Number of registered DataCite DOIs by scientific institutions in Germany.● Number of registered DataCite-DOIs that have a link to further resources via arelated-IDentifier relationship.● Number of ROR implementations at scientific institutions in Germany.● Number of GND records that have an ORCID iD or a ROR ID.● Etc.

      PID Use Cases

    1. Key features● KISTI’s mission is to curate collect, consolidate, and provide scientific information toKorean researchers and institutions. It includes but is not limited to.■ Curating Korean R&D outputs. Curate them higher state of identification for bettercuration, tracking research impact, analysing research outcomes.■ DOI RA management. Issuing DOIs to Korean research outputs, Intellectualproperties, research data■ Support Korean societies to stimulate better visibilities of their journal articlesaround the world.■ Collaborate for better curation (identification and interlinking) with domestic andglobal scientific information management institutions, publishers and identifiermanaging agencies

      PID Use Cases

    1. Name of infrastructure Key purpose List of integrated PIDsFairdata.fi Research data publication,metadata hub andpreservation serviceDOI, URN, ORCID (updaResearch.fi National research data hub. Current draft:ADSbibcode - AstrophysicsData System -Bibliographic ReferenceCode (en)ARK - Archival ResourceKey (en)arXiv - arXiv identifierscheme (en)BusinessID - Y-tunnus (fi)(en)Crossref_funders -Crossref Funder Registry(en)DOI - Digital ObjectIdentifier (en)Case Study: FINLAND Page 3 of 6

      PID Use Cases

    1. Name of infrastructure Key purpose List ofintegratedPIDse-infra This large infrastructure will build the NationalRepository Platform in the upcoming years. Thatshould greatly facilitate adoption of PIDs.TBDNational CRIS - IS VaVaI(R&D Information System)National research information system. We planon working with Research, Development andInnovation Council (in charge of IS VaVaI) onintegrating global PIDs into their submissionprocesses as required. Nowadays it uses mostlylocal identifiers.TBDInstitutional CRIS systems Various institutional CRIS systems at CzechRPOs. OBD (Personal Bibliographic Database)application is an outstanding case of aninstitutional CRIS system in the Czech Republicdeveloped locally by a Czech company DERS.An ORCID integration for OBD is currently indevelopment.TBD, OBDORCID inprocessInstitutional or subjectrepositoriesThere are several repositories in the Czechrepublic collecting different objects, some arealready using PIDs but there is still enough roomto improve and really integrate those PIDs, notonly allow their evidence.Handle,DOI,maybeotherMajor research funders Grant application processes TBDLocal publishers Content submission processes TBD

      PID Use Cases

    2. TARGET INSTITUTIONS:● Public research performing organisations (RPOs): Higher Education Institutions andResearch organizations● Research funding organizations (RFOs): Ministry of Education, Youth and Sports, CzechScience Foundation, Technology Agency of the Czech Republic etc.● Policymakers: Ministry of Education, Youth and Sports; Research, Development andInnovation Council (R&D&I Council)● Libraries: National library, National Library of Technology, academic libraries● Publishers based in Czechia● Service providers, research infrastructuresTARGET GROUPS:● Researchers● Librarians● Open Science/Open Access managers/coordinators● CRIS system managers● Repository managers● Other research support positions, e.g. data stewards, data curators

      PID Stakeholders and Target Groups

    1. PIDs comparison tableCase study Function PID typeFinland Researchers, persons ORCID; ISNIOrganisations VAT-number (not resolvableyet)RoRISNI___________________________________________________________________________________________________________________Pathways to National PID Strategies: Guide and Checklist to facilitate uptake and alignment Page 13 of 20

      PID usage by country

  11. Jul 2023
  12. May 2023
  13. Nov 2019
  14. Oct 2019
    1. Programas efectivos de prevención e intervención en Bullying

      Múltiples y diversas intervenciones se han desarrollado para afrontar esta problemática (por ejemplo, Minton & O'Moore, 2008; Olweus, 1993; Smith, Ananiadou, & Cowie, 2003; Varela & Tijmes, 2008 entre otros). Sin embargo, a pesar de los numerosos programas existentes, solo unos pocos han demostrado ser efectivos. De hecho, los programas exitosos se caracterizan por abordar esta problemática en sus diversos niveles y no con actividades puntuales ni aisladas.

      Con respecto a la experiencia internacional, "Olweus Bullying Prevention Program", es uno de los programas pioneros en la intervención del Bullying (Olweus, 1993). Este programa se basa en un modelo comprensivo que opera en distintos niveles: escolar, sala de clases e individual. Tiene como objetivo reducir y eliminar tanto el Bullying directo como el indirecto, mejorar las relaciones de pares en el establecimiento educacional y crear las condiciones que permitan que tanto víctima como victimario logren funcionar mejor dentro y fuera de éste. Las estrategias del programa incluyen la promoción y creación de un ambiente positivo en todo el establecimiento educacional, donde la participación de los adultos (docentes y familias) es fundamental; y la creación de límites claros frente a la conductas que no son aceptadas dentro del contexto escolar, requiriendo que las sanciones que se aplican a los victimarios sean consistentes, no castigadoras e involucren un proceso de reflexión y reparación (Olweus, 2004). La evaluación de este programa indica que fue exitoso, disminuyendo en un 50% el autoreporte de Bullying (tanto de víctima como victimario), la incursión en otro tipo de conductas antisociales, y mejorando el clima escolar (Olweus, 2004).

      En Inglaterra se llevó a cabo el programa "Sheffield Anti-Bullying Project", inspirado en el programa de Olweus. Este programa busca desarrollar políticas institucionales en el establecimiento educacional que permitan detener la victimización por Bullying a nivel de toda la comunidad escolar, utilizando estrategias como el desarrollo de políticas integrales para detener la victimización, el desarrollo curricular para crear conciencia del problema, el trabajo individual, seguimiento y monitoreo tanto de la víctima como del agresor, modificación de los espacios físicos de riesgo, y el monitoreo permanente de los niveles de victimización dentro de la escuela. La evaluación del programa, llevado a cabo en cuatro establecimientos educacionales durante 18 meses, demostró que disminuyó el porcentaje de victimización (14% en primaria y 7% en secundaria), la tasa de agresión (12% en primaria y secundaria), y aumentaron las denuncias por agresión a los profesores (Smith, et al., 2003).

      El "Programa educativo de prevención de maltrato entre compañeros y compañeras" (SAVE) desarrollado en España, es otro ejemplo de programas con resultados exitosos. Este programa toma un modelo integral, preventivo, ecológico y comunitario e involucra a los alumnos, profesores, familia y comunidad. El programa no solo disminuyó las conductas de Bullying, sino que logró promover las relaciones interpersonales como un factor protector frente a la violencia escolar (Ortega, Del Rey, & Mora-Merchán, 2004).

      Por otra parte, Finlandia cuenta con el "Programa Anti-bullying Kiva" desarrollado en la Universidad de Turku y financiado por el Ministerio de Educación de este país, el cual presenta estrategias universales para prevenir situaciones de intimidación y, a su vez, detener la intimidación en curso. El programa contiene una serie de herramientas concretas para los educadores, lecciones para estudiantes, material de aprendizaje virtual, e indicaciones claras para los integrantes de la comunidad escolar para detener las situaciones de intimidación de manera efectiva (Salmivalli, Kärnä & Poskiparta, 2011; Kärnä, Voeten, Little, Poskiparta, Kaljonen & Salmivalli, 2011).

      Otros programas internacionales que han demostrado efectividad son el "Programa Apoyo Positivo al Estudiante" (Positive Behavior Support-PBS, Sprague & Golly, 2005) y los Programas Anti-bullying en Irlanda: "Programa ABC" (Minton & O'Moore, 2008). Todos se basan en una aproximación multinivel del fenómeno, la implementación de estrategias de prevención e intervención de manera sistemática, organizadas y planificadas a largo plazo. Así como también, la implementación de estrategias orientadas al desarrollo de un clima social escolar positivo y al fomento de habilidades socio-emocionales.

      En Chile, uno de los primeros programas en evaluar su efectividad fue el programa piloto "Aprendiendo Juntos", basado en el modelo de intervención del "Positive Behavior Support-PBS". Se implementó en un establecimiento educacional de la cuidad de Santiago, donde se logró disminuir en un 34,7%, los incidentes violentos entre los alumnos, medido a través de la disminución del promedio diario de alumnos derivados a inspectora1 en los años 2006 y 2007 (Varela, Tijmes & Sprague 2009). Otra experiencia chilena evaluada fue el Programa Recoleta en Buena implementado en 4 establecimientos educacionales donde se evaluó a 677 estudiantes el año 2006 y 553 el año 2008, de 5º básico a IVº medio. El programa logró disminuir el promedio de los reportes de violencia (víctimas, victimarios y testigos), salvo los reportes de violencia de tipo delictual (violencia más grave). Sin embargo, sus resultados reportaron efectividad a nivel primario permitiendo impactar en toda la comunidad escolar (Varela, 2011).

      Tanto la experiencia internacional como en Chile en la implementación de programas de prevención e intervención de violencia en las escuelas ha demostrado la importancia de abordar esta problemática desde un modelo ecológico (Orpinas, 2009). Es decir, que los programas presenten un abordaje integral, los cuales apunten a los distintos niveles del sistema escolar: políticas públicas, red educativa, familias, y personas, así como la interrelación entre estos niveles. Asimismo, las estrategias de intervención y de prevención deben ser organizadas, sistemáticas y planificadas a largo plazo. Estas estrategias deben estar orientadas a prevenir, intervenir y promover un clima social escolar positivo, incrementar la empatía, el desarrollo de las competencias sociales, la promoción de conductas prosociales, la resolución de conflictos y la mediación.

      A pesar de lo anterior, la experiencia ha demostrado que existe una escasez de estudios de efectividad sobre programas integrales de prevención del Bullying, a nivel de los países de Sudamérica. Es por esto que el presente artículo evalúa la efectividad de un programa de prevención e intervención de Bullying y Ciberbulling, basado en los lineamientos de los programas que han demostrado ser exitosos, en alumnas que cursan de 4º año básico a IVº año medio de un establecimiento educacional femenino de Santiago de Chile.

  15. Aug 2018