Please wait a minute...
New Technology of Library and Information Service  2008, Vol. 24 Issue (3): 87-94    DOI: 10.11925/infotech.1003-3513.2008.03.16
Current Issue | Archive | Adv Search |
Personal Name Identification in the Practice of Digital Repositories
Jingfeng Xia
(Data Library of Rutgers University, Newark, New Jersey, USA)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

 Purpose-To propose improvements to the identification of authors’ names in digital repositories.
Design/methodology/approach-Analysis of current name authorities in digital resources,particularly in digital repositories,and analysis of some features of existing repository application.
Findings-This paper finds that the variations of authors’ names have negatively affected the retrieval capability of digital repositories.Two possible solutions include using composite identifiers that variants of their name, if any, at the time of depositing articles.
Originality/value-This is the first time that the approach of authors self-depositing their name variations is proposed. This approach will be able to reduce confusions in name identification.

Key wordsDigital libraries      Data handling      Control     
Published: 25 March 2008
: 

G250

 
Corresponding Authors: Jingfeng Xia     E-mail: xia@andromeda.rutgers.edu
About author:: Jingfeng Xia

Cite this article:

Jingfeng Xia. Personal Name Identification in the Practice of Digital Repositories. New Technology of Library and Information Service, 2008, 24(3): 87-94.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2008.03.16     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2008/V24/I3/87

[1] arXiv (2006), “arXiv monthly submission rate statistics”, available at: http://arxiv.org/show_monthly_ submissions (accessed 4 March 2006).
[2] Atkins, H., Lyons, C., Ratner, H., Risher, C., Shillum, C., Sidman, D. and Stevens, A. (2000),“Reference linking with DOIs”, D-Lib Magazine, Vol. 6 No. 2, available at: www.dlib.org/dlib/february00/02risher.html (accessed 4 March 2006).
[3] Bilenko, M., Mooney, R., Chen, W., Pavikumar, P. and Fienberg, S. (2003), “Adaptive name matching in information integration”, IEEE Intelligent Systems, Vol. 18 No. 5, pp. 16-23.
[4] Choudhury, G.S., Requardt, C., Fujinaga, I., DiLauro, T.G., Brown, E.W., Warner, J.W. and Harrington, B. (2000), “Digital workflow management: the Lester S. Levy digitized collection of sheet music”, First Monday, Vol.    5 No. 6, available at: www.firstmonday.org/issues/issue5_6/choudhury/index.htm (accessed 4 March 2006).
[5] Cleveland, G. (1998), “Digital libraries: definitions, issues and challenges”, IFLA Universal Dataflow and Telecommunications Core Programme, Occasional Paper 8, available at: www.ifla.org/VI/5/op/udtop8/udtop8.htm (accessed 4 March 2006).
[6] Cornell (2001), “Online physics archive that is transforming global science communication,‘arXiv.org,’ is moving from Los Alamos to Cornell University”, Cornell News, available at:www.news.cornell.edu/releases/ July01/ginsparg.archive.ws.html (accessed 4 March 2006).
[7] Cruz, J.M.B., Klink, M.J.R. and Krichel, T. (2000), “Personal data in a large digital library”,Proceedings of the 4th European Conference on Research and Advanced Technology for Digital Libraries, p. 127, available at: http://openlib.org/home/krichel/phoenix.a4.pdf(accessed 4 March 2006).
[8] Davis, P.T., Elson, D.K. and Klavans, J.L. (2003), “Methods for precise named entity matching in digital collections”, Proceedings of the 3rd ACM/IEEE-CS Joint Conference on Digital Libraries, Houston, Texas, pp. 125-7, available at: www1.cs.columbia.edu/nlp/papers/2003/davis_al_03.pdf (accessed 4 March 2006).
[9] DiLauro, T.G., Choudhury, S., Patton, M. and Warner, J.W. (2001), “Automated name authority control and enhanced searching in the Levy collection”, D-Lib Magazine, Vol. 7 No. 4, available at: www.dlib.org/ dlib/april01/dilauro/04dilauro.html (accessed 4 March 2006).
[10] Eprints (2005), “Modifying the metadata fields in an archive”, EPrints 2 Technical Documentation, available at: www.eprints.org/documentation/tech/php/intro.php (accessed 4 March 2006).
[11] Fellegi, L.P. and Sunter, A.B. (1969), “A theory for record linkage”, Journal of the American Statistical Society, Vol. 64 No. 328, pp. 1183-210.
[12] French, J.C., Powell, A.L., Schulman, E. and Pfaltz, J.L. (1997), “Automating the construction of authority files in digital libraries: a case study”, in Peters, C. and Thanos, C. (Eds),
[13] Research and Advanced Technology for Digital Libraries, First European Conference,ECDL ’97, Springer, Berlin, pp. 55-71.
[14] Han, H., Giles, L., Zha, H., Li, C. and Tsioutsiouliklis, K. (2004), “Two supervised learning approaches for name disambiguation in author citations”, Proceedings of the Joint Conference on Digital Libraries, Tucson, Arizona, pp. 296-305, available at: http://clgiles.ist.psu.edu/papers/JCDL-2004-author-disambiguation.pdf (accessed 4 March 2006).
[15] Hong, Y., On, B.W. and Lee, D. (2004), “System support for name authority control problem in digital libraries; open-DBLP approach”, available at: http://nike.psu.edu/publications/ecdl04.pdf (accessed 4 March 2006).
[16] IFLA (2005), “Functional requirements for authority records: a conceptual model”, IFLA UBCIM Working Group on Functional Requirements and Numbering of Authority Records (FRANAR), available at: www.ifla.org/VII/d4/FRANAR-Conceptual-M-Draft-e.pdf (accessed 4 March 2006).
[17] Lynch, C.A. (2003), “Institutional repositories: essential infrastructure for scholarship in thedigital age”, ARL Bimonthly Report, No. 226, available at: http://www.arl.org/newsltr/226/ir.html (accessed 4 March 2006).
[18] Lynch, C.A. and Lippincott, J.K. (2005), “Institutional repository deployment in the United States as of early 2005”, D-Lib Magazine, Vol. 11 No. 9, available at: www.dlib.org/dlib/september05/lynch/09lynch.html (accessed 4 March 2006).
[19] Pasula, H., Marthi, B., Milch, B., Russell, S. and Shpitser, I. (2002), “Identity uncertainty and citation matching”, Proceedings of Neural Information Processing System: Natural and Synthetic, No. 15, available at: www.cs.berkeley.edu/milch/papers/nipsnewer.pdf(accessed 4 March 2006).
[20] Suber, P. (2006), Open Access Review, available at: www.earlham.edu/, peters/fos/overview.htm(accessed 4 March 2006).
[21] Van Ryn, P. and Starck, W.L. (Eds) (2005), NACO Participants’ Manual, 3rd ed., Library of Congress, Washington, DC, available at: www.loc.gov/catdir/pcc/naco/npm3rd.pdf(accessed 4 March 2006).
[22] Warner, J.W. and Brown, E.W. (2001), “Automated name authority control”, Proceedings of JCDL, 24-28 June, Roanoke, Virginia, pp. 21-2.

[1] Li Guangjian,Wang Kai,Zhang Qingzhi. Analysis Framework Based on Multi-Source Data for US Export Control: An Empirical Study[J]. 数据分析与知识发现, 2020, 4(9): 26-40.
[2] Li Junlian,Wu Yingjie,Deng Panpan,Leng Fuhai. Automatic Data Processing Strategy of Citation Anomie Based on Feature Fusion[J]. 数据分析与知识发现, 2020, 4(5): 38-45.
[3] Zhuang Mei, Wang Ping, Yang Jie, Chen Hong, Wang Yifei. Construction and Application of Assistant Management System for Regulation Violation Cases in Tsinghua University Library[J]. 现代图书情报技术, 2013, 29(7/8): 132-136.
[4] Chen Minghong, Qi Xianjun. A User’s Acceptance Model of Academic Blog and Its Empirical Study[J]. 现代图书情报技术, 2013, (12): 81-87.
[5] Shi Liping, Yuan Jingting, Tang Shulin, Liu Qiang. Role Mechanism of Internal Control Mechanism and Shared Mental Model on Knowledge Sharing: The Perspectives of Extending Knowledge Sharing Achievement Paths[J]. 现代图书情报技术, 2013, 29(11): 40-45.
[6] Chen Wu, Qian Qing, Zhao Xiong, Ma Xuemei, Jiang Airong, Zhu Jinghui. Designing and Implementation of Tsinghua University Smart Seats Management System[J]. 现代图书情报技术, 2013, 29(10): 90-95.
[7] He Lin, He Juan, Shen Gengyu, Yang Bo, Huang Shuiqing. An Approach to Discovery of Reference Control Gene for qRT-PCR Experiment Based on Texting Mining[J]. 现代图书情报技术, 2012, 28(7): 109-114.
[8] Gu Yong, Chu Yunfeng, Ju Xinlei. Research and Development of Remote Monitoring System for Computer Room in Digital Library[J]. 现代图书情报技术, 2011, 27(12): 84-89.
[9] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[10] Li Wenjiang, Chen Shiqin. Full-text Retrieval Based on Lucene.net Application in Document Management[J]. 现代图书情报技术, 2010, 26(11): 84-89.
[11] Ed Summers,Antoine Isaac,Clay Redding,Dan Krech. LCSH, SKOS and Linked Data[J]. 现代图书情报技术, 2009, 3(3): 8-14.
[12] Chen Jinxing,Zhu Zhongming. Research Progress of the Name Authority Control for the Contributor[J]. 现代图书情报技术, 2009, 25(12): 12-17.
[13] Zhong Keyin. Design and Implementation of a Library Digital Resource Flux Statistic Analysis System[J]. 现代图书情报技术, 2008, 24(6): 91-94.
[14] Luo Lin,Zhang Kai,Xia Zhengwei. Design and Implementation About Network Access Control of the Electronic Reading Room in the Library[J]. 现代图书情报技术, 2008, 24(4): 90-94.
[15] Liu Wei,Zhang Chunjing . Authority Control of Web Resources[J]. 现代图书情报技术, 2008, 24(12): 27-31.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn