1,134 Works

Selection and implementation of a Customer Relationship Management (CRM) program to track patron interactions

Megan Nunemaker, Kimberley Barker & Ellen Ramsey
Objectives: We sought to select a customer relationship management (CRM) tool in order to better track interactions with patrons and know where library connections in our clinical, research, and educational departments are strong or weak. Methods: A requirements document was drafted, and several CRMs were identified as possible solutions. Four CRMs were tried by the authors of this paper, and the requirements matrix was updated after each trial. The authors reached a consensus, and a...

Fundamental Characteristics of Wi-Fi and Wireless Local Area Network Re-identification for Transportation

Noah Goodall
Many transportation agencies use re-identification technologies to identify vehicles at multiple points along the roadway as a way to measure travel times and congestion. Examples of these technologies include license plate readers, toll tag transponders, and media access control (MAC) address scanners for Bluetooth devices. Recent advancements have allowed for the detection of unique MAC addresses from Wi‑Fi and wireless local area network enabled devices. This study represents one of the first attempts to measure...

Microscopic Estimation of Freeway Vehicle Positions from the Behaviors of Connected Vehicles

Noah Goodall, Brian Smith & B. Brian Park
The modern passenger vehicle is an incredibly sophisticated machine, with computer monitoring and control of most of its functions, including speed, acceleration, heading, and GPS-enabled position. Vehicles are beginning to communicate these data wirelessly to other vehicles and to roadside equipment. These communicating “probe” vehicles will drastically impact the way traffic is managed, allowing for more responsive traffic signals, more comprehensive traffic information, and more accurate travel time prediction. Research suggests that to begin experiencing...

Probability of Secondary Crash Occurrence on Freeways with the Use of Private-Sector Speed Data

Noah Goodall
A percentage of crashes on freeways are suspected to be caused in part by congestion or distraction from earlier incidents. Identification and prevention of these secondary crashes are major goals of transportation agencies, yet the characteristics of secondary crashes—in particular the probability of their occurrence—are poorly understood. Many secondary crashes occur when a vehicle encounters nonrecurring congestion, yet previous efforts to identify incident queues and their secondary crashes have relied either on deterministic queuing theory...

TwoStore: An Akubra-based extensible storage architecture for Fedora

Timothy Stevens & Adam Soroka
This poster explains the storage architecture supporting the Fedora repository containing our library-managed content at the University of Virginia Library. This architecture offers a number of attractive points: it is assembled from well-supported technologies, including Akubra and POSIX-type filesystems, it provides for the easy addition of new storage, it operates over multiple filesystems and is agnostic as to how those filesystems are assembled and mounted to repository servers, and it can be extended to other...

Realigning Digital Humanities Training: The Praxis Program at the Scholars’ Lab

Jeremy Boggs, Bethany Nowviskie, Eric Johnson, Brooke Lestock, Sarah Storti, Joanna Swafford, Lindsay O'Connor, Eric Rochester, Wayne Graham, Edward Triplett & Alex Gil
In September 2011, the Scholars’ Lab at the University of Virginia Library began the Praxis Program, an extra-curricular experiment at realigning graduate methodological training with the demands of the humanities in the digital age. The Praxis Program funds six humanities graduate students from a variety of disciplines to apprentice in the Scholars’ Lab, receiving methodological training and collaborating on a shared digital humanities project for a full academic year. Our goal is to equip knowledge...

Emergency Collecting Tabletop exercise

Kara McClurken & Tom Clareson
This tabletop exercise is designed to help cultural institutions assess their readiness and prepare for collecting in times of crisis. This exercise debuted at the Promoting Preservation Interest Group Meeting, Preservation and Reformatting Section, Association of Library and Technical Services, American Library Association Annual Meeting, New Orleans, LA, June 24, 2018.

APTrust and the Draft Declaration of Shared Values

Chip German
A blog post on the Digital Preservation Coalition blog that describes work on a statement of shared values among non-profit digital preservation service providers, including the Academic Preservation Trust.

Data Purchase Program: Lessons Learned

Jennifer Huck
The Data Purchase Program at the University of Virginia Library was created in order to formalize and rationalize our data purchases. In the past, we were willing to make data purchases, but patrons had to know to ask (and had to ask at the right point in the budget cycle). The Data Purchase Program gave us something specific to direct patrons to. Formalizing the program allowed us to do better outreach and marketing for this...

Treaty of peace, friendship, commerce, and navigation between the Argentine Confederation and the Republic of Paraguay

Elsa Nylund
Argentina and Paraguay had interesting relations before this treaty was written. In 1776, the Spanish king Carlos III created the Viceroyalty of the Río de la Plata, a Spanish empire which included both of these countries and made its capital Buenos Aires. In 1782, Spain created municipalities, Paraguay being one of them. Paraguay only had one city called Asuncion and did not have much say. After the 1810 May Revolution in Buenos Aires, the first...

Traffic Signal Control with Connected Vehicles

Noah Goodall, Brian Smith & B. Brian Park
The operation of traffic signals is currently limited by the data available from traditional point sensors. Point detectors, often in-ground inductive loop sensors, can provide only limited vehicle information at a fixed location. The most advanced adaptive control strategies are often not implemented in the field due to their operational complexity and high-resolution detection requirements. However, a new initiative known as connected vehicles would allow for the wireless transmission of vehicles’ positions, headings, and speeds...

Virginia Coast Reserve LTER Field Guide to Benthic Macrofauna

Sophia Rosenberg
This field guide serves as supplementary material to my senior thesis, conducted at the Virginia Coast Reserve during the period July 2019-October 2019. This guide contains pictures and morphological descriptions of all species collected in the study.

Comparison of Automated Vehicle Struck-from-Behind Crash Rates with National Rates Using Naturalistic Data

Noah Goodall
Automated vehicle developers in California are required to submit records of crashes and distances traveled in autonomous mode for all vehicles in their fleets. Several studies have investigated this database to compare automated vehicle crash rates with national rates. Although automated vehicles are struck from behind in 73% of their autonomous mode crashes, this is the first study to compare automated vehicle struck-from-behind crash rates to national rates using equivalent crash definitions. Rear-end collisions have...

On the way to the community-owned infrastructures: Code contributions

Ilkay Holt & Ellen Ramsey
Community ownership over infrastructure is about who controls and maintains the building blocks of the environment for the given technology. Blog post looking into it in terms of Advancing Hyku’s approach to stated project deliverables.

Sensitive Health Data and Privacy

Jason Ludwig & Dalton George
A tech company contracts Luminia, a healthcare information firm, to design an employee wellness program. The President of Luminia recommends that the company implement a secure messaging platform to protect employee's private health information (PHI). The company's vice president, however, thinks that the platform is too expensive and that the extra protection is unnecessary.

Dartmouth Professional Ethics Program for First Year Graduate Students

This webpage describes an institution-wide program of training in the basics of professional ethics for first year graduate students at Dartmouth.

Recommended Resources

Recommended readings and resources for theInstructor's Guide to Prepare Research Group Leaders as RCR Mentors.

Inez Austin - Inquiry Finds Illegal Surveillance of Workers in Nuclear Plants

An article from The New York Times about Inez Austin from August 1, 1991

Developers of \"Killer Robot\" Worked Under Enormous Stress

Richard G. Epstein
"The Sentinel-Observer learned today that Randy Samuels and others who worked on the "killer robot" project at Silicon Techtronics Inc. were under tremendous pressure to finish the robot software by January 1 of this year. According to an informed source, top level management warned killer robot project staff that "heads would roll" if the January 1 deadline was not met."

Education and Training in the Care and Use of Laboratory Animals: A Guide for Developing Institutional Programs

Link to the National Academies Report,Education and Training in the Care and Use of Laboratory Animals: A Guide for Developing Institutional Programs

April 8th, 1994 Reuter Article about the LaMacchia Indictment

A Boston Globe article about the indictment of LaMacchia and the rather murky interpretations of law brought forward when trying to regulate the internet.

City of L'Acide Remediation Case

Daniel A. Vallero
This case includes handouts for 4 teams, each with hidden agendas, to be used in class discussion. It is also accompanied by a companion presentation on "The Environmental Implications of Biotechnology." The case concerns the City of L'Acide that has contracted with an engineering firm to remediate a 3 hectare hazardous waste site from an old firing range.

Public and Community Engagement Subject Aid

Kelly Laas & Raie Ostman
A short guide to some key resources and readings on the topic of public and community engagement in research and practice.

Big Data Subject Aid

Rachelle Hollander
A short guide to some key resources and readings on the topic of the ethics of big data use.

Resources from Lockheed Martin Corporation

The following video resourcesare made available on Lockheed Martin Corporation's website for use by academic institutions for educational purposes. All other entities interested in using these videos must request permission from Lockheed Martin's Corporate Ethics Office.

Registration Year

  • 2021
  • 2020
  • 2019
  • 2018
  • 2017

Resource Types

  • Other


  • University of Virginia