researching the researchers: finding out how university employees manage their digital materials...

41
Researching the Researchers: Finding Out How University Employees Manage their Digital Materials NHPRC ERR Fellowship Symposium November 19, 2004 http:// www.ils.unc.edu/digitaldeskt op

Post on 21-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Researching the Researchers: Finding

Out How University Employees Manage

their Digital Materials NHPRC ERR Fellowship Symposium

November 19, 2004

http://www.ils.unc.edu/digitaldesktop

2

Thank You to

The National Historical Publications and Records Commission

for funding this project

3

Today’s Presentation

Overview and background of the project. Discussion of the methodologies used for

data collection and analysis in this project. FAQs. Preliminary results. Challenges for archiving in distributed

digital environment. Conclusions.

4

Managing the Digital Desktop

NHPRC-funded, 7/1/2002-6/30/2005.

Collaboration of SILS, UNC Libraries, and Duke University Libraries.

5

Thought for the day….

“The end-user manages e-mail.”

-ARMA Guideline for Managing E-mail

6

The team!

Tim Pyatt, co-PI, Duke University UA Kim Chang, Co-Project Manager Megan Winget, Co-Project Manager Paul Conway, Duke Library IT Director Janis Holder, UNC UA Frank Holt, UNC RM David Mitchell, Duke RM Russell Koonts, Duke Medical Archivist

7

Project Goals & Overview

Understand how faculty & staff at a public & private universities manage their email & other electronic files.

Create guidelines based on records requirements & observed behaviors for file and email management.

Create learning tools based on guidelines. Consider the place of electronic records

management systems on the campuses. Disseminate findings & training.

8

1st Year Methodology

In order to learn how faculty, staff, and administrators manage their electronic materials we– Conducted campus-wide surveys at

UNC-Chapel Hill and Duke University.– Interviewed 100 individuals.– Interviewed approximately 20 IT staff.

9

2nd Year Work

We coding the data from the interviews using NVIVO software.

We started to analyze filing arrangements we captured from interviewees’ computers.

We began creating guidelines and settled on FAQs.

Held focus group to review initial draft of FAQs.

10

3rd Year

We are essentially finished with FAQs for both email and file management.http://ils.unc.edu/digitaldesktop

We are creating web-based and in-class learning tools.

We will more thoroughly analyze filing arrangements we captured from interviewees’ computers.

We will match capabilities of software used with responses to interview questions.

Write articles!

11

Best Answer?

Helping people become information management literate.

Moving people toward better practice.

Realizing that telling people to manage electronic files as “paper” has not been effective.

12

Who We Surveyed

8,334 addresses at UNC. 17,327 addresses at Duke.About 212 emails bounced at UNC.About 1,115 bounced at Duke.

13

Survey Questions

Email application most often usedVolume/time spent on emailAttachmentsStorage practicesImportance to jobSpecific ConcernsWillingness to do further interview

14

Top 10 Concerns Regarding Email at UNC

% of Respondents:

23% Unsolicited email

21% Confidentiality

16% Time 15% Usage 14% Software

limitations

14% Retention 13% Security 11%

Management 10% Deletion 10% Viruses

15

Top Concerns Regarding Email at Duke

% of Respondents: 21% Unsolicited

email 19% Software

limitations 18%

Confidentiality 17% Security

14% Volume 13% Time 12% Usage 10% Viruses 8%

Retention 7% Lotus

Notes

16

Interview Protocol Development

Went back to our original goals.– To understand how individuals manage their digital

desktops, both email messages and digital files.– To devise guidelines, aids, and learning models to

support improved user behavior. What are people doing? How can we improve what they are doing both

for their own work and for the university?

17

Designing the Interviews

Started with the concerns that surfaced in the survey returns.

Generated every possible question we could devise, in probably as inappropriate forms as we could.– Pooled our questions.– Used words like, “appraisal,” and

“authenticity.”

18

Developing the Conceptual Framework

Categorized our questions.Because we are exploring how

individuals are functioning as their own records managers and archivists, we linked our questions to basic archival functions.

19

Framework for Questions

Electronic files must undergo appraisal in order to assess their importance, potential for long-term preservation, and their “recordness.”

In order to ensure authenticity, particular actions must happen and particular information must be created and preserved.

20

Interview Framework

In order to preserve electronic records, the digits and their context must be physically secured and preserved.

Arrangement in a logical file structure can be useful in making electronic records accessible.

21

Framework for Study

In order for electronic records to be accessible they must be described clearly and adequately. Description can involve indexing, abstracting, and other additional subject analysis or simply file naming and titling.

22

Framework

How individuals view ownership of electronic materials and issues of privacy and security will influence how they handle the items. Thus, we need to ask individuals to whom they believe the messages belong, what rights they have to privacy of the message content, and how secure the messages/email system is.

23

Appraisal questions

What criteria do you use to decide to keep an email message? To delete one?

What criteria do you use to decide to keep an electronic document? To delete one?

Do you think any of the email messages or documents that you receive or produce in the course of your daily work should be preserved for years to come by the university? Why?/Why not?

24

Authenticity Questions

How do you save attachments? When you save an attachment, do you

save the email message along with it? If you store important messages

electronically outside of your email application, does the header information stay with the messages?

25

Arrangement

Tell me about your email/file folder structure that we see here.

Get print-out of folder structure. Would you say that you use a similar

structure in email and file directories? Paper file structure? Tell us about the file structure on your

hard drive. How have you organized materials?

26

Description

How do you determine subject lines you attach to work-related email messages you send?

How do you retrieve stored messages if you need them at a later time?

How do you name electronic files? How do you retrieve your electronic

files?

27

Physical Preservation

Are your email messages being backed up automatically?

Do you explicitly back up your email messages?

Are your electronic files (documents, images, etc.) automatically backed up?

Do you keep copies of all the messages you send? If so, where/how do you keep these?

How do you store important messages?

28

Privacy & Security

Is your email yours or the university’s? Other files on your UNC computer?

Who owns your email? (Ownership vs. intellectual property issues with this question)

Who can [has the ability] to read your email without your permission? Your electronic files?

Do you distinguish between "official" and personal email? Do you manage and store them differently?

UNC ONLY: Have you heard of the Public Records law in North Carolina?

29

Interview Participants

Goal was to interview a wide cross-section of faculty, staff, and administrators at both campuses.

Only selected people who indicated they wished further involvement after the survey.

30

Interviews

We conducted 100 interview during spring and summer of 2003.

Most averaged 45 minutes in length with some over an hour, some briefer.

One person interviewed; another took notes in a spreadsheet.

31

Life After Coding

Next step was to make charts and tables for as many quantifiable questions as possible.

Highlight useful and telling quotations within notes.

Explore data topically.

32

Preliminary Conclusions

People do not, in large part, manage their electronic files as their print files, at least not at universities.

Telling folks to manage digital assets as they do their paper files appears to have little effect.

We have lost the largest cadre of records professionals – many, many secretaries.

Unlikely most universities will have enterprise-wide ERMS or that there would be a high degree of compliance.

33

Management for Now, Not Later

People have little problem finding their own materials, although this situation may be deteriorating.

Archival theory has been built on existing information retrieval systems and naturally occurring metadata.

Computer searching, in large part, negates the need for folders, whether archivist like it or not.

34

Challenges

Distributed document creation.“Capture” important material

before it dies.– A “living” archive where records go

from the moment of their creation? ERMS? Training creators?Combination?

35

Challenges

Preservation of context and authenticity.– Metadata, metadata, metadata.– Distributed metadata creation (or

automated) with centralized control of records.

36

Challenges

Need for people to be information management literate.– If not ubiquitous archiving then– Ubiquitous pre-archiving.– Distributed implementation of

organizational policy.Need for responsible appraisal.

– If we don’t need it don’t ask someone to take the time to curate it.

37

Challenges

Recognition that record creators are partners in this enterprise– Not the enemy– Generally not evildoers– Frequently overworked– Smart enough not to want to waste

their time.

38

Archival Response

Archivists, in conjunction with the IT community – researchers and software developers – must devise mechanisms to preserve context over time when creators don’t provide it.

39

Triangulated Solution

A digital archiving “solution” must involve:– An understanding of how individuals manage

electronic records in various settings.– Inexpensive, ubiquitous software that factors

in human information behaviors and the needs inherent in the archiving process, i.e., preserving the bits over time; maintaining context; and preserving authenticity.

40

Triangulated Solution

A focus on dealing with the most important and most risky records and materials, i.e., a 90/10 rule where individuals are taught – to carefully maintain the most important

evidential/historical/mission critical materials and

– to delete (within legal and regulatory requirements) the most risky materials.

41

Project URL

http://ils.unc.edu/digitaldesktop

Thank you!