Researching the Researchers: Finding Out How University Employees Manage their Digital Materials - PowerPoint PPT Presentation

About This Presentation
Title:

Researching the Researchers: Finding Out How University Employees Manage their Digital Materials

Description:

8,334 addresses at UNC. 17,327 addresses at Duke. About 212 emails bounced at UNC. ... Do you think any of the email messages or documents that you receive or produce ... – PowerPoint PPT presentation

Number of Views:47
Avg rating:3.0/5.0
Slides: 42
Provided by: helen61
Learn more at: https://ils.unc.edu
Category:

less

Transcript and Presenter's Notes

Title: Researching the Researchers: Finding Out How University Employees Manage their Digital Materials


1
Researching the Researchers Finding Out How
University Employees Manage their Digital
Materials
  • NHPRC ERR Fellowship Symposium
  • November 19, 2004
  • http//www.ils.unc.edu/digitaldesktop

2
Thank You to
  • The National Historical Publications and Records
    Commission
  • for funding this project

3
Todays Presentation
  • Overview and background of the project.
  • Discussion of the methodologies used for data
    collection and analysis in this project.
  • FAQs.
  • Preliminary results.
  • Challenges for archiving in distributed digital
    environment.
  • Conclusions.

4
Managing the Digital Desktop
  • NHPRC-funded, 7/1/2002-6/30/2005.
  • Collaboration of SILS, UNC Libraries, and Duke
    University Libraries.

5
Thought for the day.
  • The end-user manages e-mail.
  • -ARMA Guideline for Managing E-mail

6
The team!
  • Tim Pyatt, co-PI, Duke University UA
  • Kim Chang, Co-Project Manager
  • Megan Winget, Co-Project Manager
  • Paul Conway, Duke Library IT Director
  • Janis Holder, UNC UA
  • Frank Holt, UNC RM
  • David Mitchell, Duke RM
  • Russell Koonts, Duke Medical Archivist

7
Project Goals Overview
  • Understand how faculty staff at a public
    private universities manage their email other
    electronic files.
  • Create guidelines based on records requirements
    observed behaviors for file and email management.
  • Create learning tools based on guidelines.
  • Consider the place of electronic records
    management systems on the campuses.
  • Disseminate findings training.

8
1st Year Methodology
  • In order to learn how faculty, staff, and
    administrators manage their electronic materials
    we
  • Conducted campus-wide surveys at UNC-Chapel Hill
    and Duke University.
  • Interviewed 100 individuals.
  • Interviewed approximately 20 IT staff.

9
2nd Year Work
  • We coding the data from the interviews using
    NVIVO software.
  • We started to analyze filing arrangements we
    captured from interviewees computers.
  • We began creating guidelines and settled on FAQs.
  • Held focus group to review initial draft of FAQs.

10
3rd Year
  • We are essentially finished with FAQs for both
    email and file management.
  • http//ils.unc.edu/digitaldesktop
  • We are creating web-based and in-class learning
    tools.
  • We will more thoroughly analyze filing
    arrangements we captured from interviewees
    computers.
  • We will match capabilities of software used with
    responses to interview questions.
  • Write articles!

11
Best Answer?
  • Helping people become information management
    literate.
  • Moving people toward better practice.
  • Realizing that telling people to manage
    electronic files as paper has not been
    effective.

12
Who We Surveyed
  • 8,334 addresses at UNC.
  • 17,327 addresses at Duke.
  • About 212 emails bounced at UNC.
  • About 1,115 bounced at Duke.

13
Survey Questions
  • Email application most often used
  • Volume/time spent on email
  • Attachments
  • Storage practices
  • Importance to job
  • Specific Concerns
  • Willingness to do further interview

14
Top 10 Concerns Regarding Email at UNC
  • of Respondents
  • 23 Unsolicited
  • email
  • 21 Confidentiality
  • 16 Time
  • 15 Usage
  • 14 Software limitations
  • 14 Retention
  • 13 Security
  • 11 Management
  • 10 Deletion
  • 10 Viruses

15
Top Concerns Regarding Email at Duke
  • of Respondents
  • 21 Unsolicited email
  • 19 Software
  • limitations
  • 18 Confidentiality
  • 17 Security
  • 14 Volume
  • 13 Time
  • 12 Usage
  • 10 Viruses
  • 8 Retention
  • 7 Lotus Notes

16
Interview Protocol Development
  • Went back to our original goals.
  • To understand how individuals manage their
    digital desktops, both email messages and digital
    files.
  • To devise guidelines, aids, and learning models
    to support improved user behavior.
  • What are people doing?
  • How can we improve what they are doing both for
    their own work and for the university?

17
Designing the Interviews
  • Started with the concerns that surfaced in the
    survey returns.
  • Generated every possible question we could
    devise, in probably as inappropriate forms as we
    could.
  • Pooled our questions.
  • Used words like, appraisal, and authenticity.

18
Developing the Conceptual Framework
  • Categorized our questions.
  • Because we are exploring how individuals are
    functioning as their own records managers and
    archivists, we linked our questions to basic
    archival functions.

19
Framework for Questions
  • Electronic files must undergo appraisal in order
    to assess their importance, potential for
    long-term preservation, and their recordness.
  • In order to ensure authenticity, particular
    actions must happen and particular information
    must be created and preserved.

20
Interview Framework
  • In order to preserve electronic records, the
    digits and their context must be physically
    secured and preserved.
  • Arrangement in a logical file structure can be
    useful in making electronic records accessible.

21
Framework for Study
  • In order for electronic records to be accessible
    they must be described clearly and adequately.
    Description can involve indexing, abstracting,
    and other additional subject analysis or simply
    file naming and titling.

22
Framework
  • How individuals view ownership of electronic
    materials and issues of privacy and security will
    influence how they handle the items. Thus, we
    need to ask individuals to whom they believe the
    messages belong, what rights they have to privacy
    of the message content, and how secure the
    messages/email system is.

23
Appraisal questions
  • What criteria do you use to decide to keep an
    email message? To delete one?
  • What criteria do you use to decide to keep an
    electronic document? To delete one?
  • Do you think any of the email messages or
    documents that you receive or produce in the
    course of your daily work should be preserved for
    years to come by the university? Why?/Why not?

24
Authenticity Questions
  • How do you save attachments?
  • When you save an attachment, do you save the
    email message along with it?
  • If you store important messages electronically
    outside of your email application, does the
    header information stay with the messages?

25
Arrangement
  • Tell me about your email/file folder structure
    that we see here.
  • Get print-out of folder structure.
  • Would you say that you use a similar structure in
    email and file directories?
  • Paper file structure?
  • Tell us about the file structure on your hard
    drive. How have you organized materials?

26
Description
  • How do you determine subject lines you attach to
    work-related email messages you send?
  • How do you retrieve stored messages if you need
    them at a later time?
  • How do you name electronic files?
  • How do you retrieve your electronic files?

27
Physical Preservation
  • Are your email messages being backed up
    automatically?
  • Do you explicitly back up your email messages?
  • Are your electronic files (documents, images,
    etc.) automatically backed up?
  • Do you keep copies of all the messages you send?
    If so, where/how do you keep these?
  • How do you store important messages?

28
Privacy Security
  • Is your email yours or the universitys? Other
    files on your UNC computer?
  • Who owns your email? (Ownership vs. intellectual
    property issues with this question)
  • Who can has the ability to read your email
    without your permission? Your electronic files?
  • Do you distinguish between "official" and
    personal email? Do you manage and store them
    differently?
  • UNC ONLY Have you heard of the Public Records
    law in North Carolina?

29
Interview Participants
  • Goal was to interview a wide cross-section of
    faculty, staff, and administrators at both
    campuses.
  • Only selected people who indicated they wished
    further involvement after the survey.

30
Interviews
  • We conducted 100 interview during spring and
    summer of 2003.
  • Most averaged 45 minutes in length with some over
    an hour, some briefer.
  • One person interviewed another took notes in a
    spreadsheet.

31
Life After Coding
  • Next step was to make charts and tables for as
    many quantifiable questions as possible.
  • Highlight useful and telling quotations within
    notes.
  • Explore data topically.

32
Preliminary Conclusions
  • People do not, in large part, manage their
    electronic files as their print files, at least
    not at universities.
  • Telling folks to manage digital assets as they do
    their paper files appears to have little effect.
  • We have lost the largest cadre of records
    professionals many, many secretaries.
  • Unlikely most universities will have
    enterprise-wide ERMS or that there would be a
    high degree of compliance.

33
Management for Now, Not Later
  • People have little problem finding their own
    materials, although this situation may be
    deteriorating.
  • Archival theory has been built on existing
    information retrieval systems and naturally
    occurring metadata.
  • Computer searching, in large part, negates the
    need for folders, whether archivist like it or
    not.

34
Challenges
  • Distributed document creation.
  • Capture important material before it dies.
  • A living archive where records go from the
    moment of their creation?
  • ERMS?
  • Training creators?
  • Combination?

35
Challenges
  • Preservation of context and authenticity.
  • Metadata, metadata, metadata.
  • Distributed metadata creation (or automated) with
    centralized control of records.

36
Challenges
  • Need for people to be information management
    literate.
  • If not ubiquitous archiving then
  • Ubiquitous pre-archiving.
  • Distributed implementation of organizational
    policy.
  • Need for responsible appraisal.
  • If we dont need it dont ask someone to take the
    time to curate it.

37
Challenges
  • Recognition that record creators are partners in
    this enterprise
  • Not the enemy
  • Generally not evildoers
  • Frequently overworked
  • Smart enough not to want to waste their time.

38
Archival Response
  • Archivists, in conjunction with the IT community
    researchers and software developers must
    devise mechanisms to preserve context over time
    when creators dont provide it.

39
Triangulated Solution
  • A digital archiving solution must involve
  • An understanding of how individuals manage
    electronic records in various settings.
  • Inexpensive, ubiquitous software that factors in
    human information behaviors and the needs
    inherent in the archiving process, i.e.,
    preserving the bits over time maintaining
    context and preserving authenticity.

40
Triangulated Solution
  • A focus on dealing with the most important and
    most risky records and materials, i.e., a 90/10
    rule where individuals are taught
  • to carefully maintain the most important
    evidential/historical/mission critical materials
    and
  • to delete (within legal and regulatory
    requirements) the most risky materials.

41
Project URL
  • http//ils.unc.edu/digitaldesktop
  • Thank you!
Write a Comment
User Comments (0)
About PowerShow.com