275
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

An Institutional Repository in a Developing Country: security and Ethical Encounters at the Bindura University of Science Education, Zimbabwe

ORCID Icon &

References

  • Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and organizations. Journal of Library Administration, 54(1), 46–56. doi:10.1080/01930826.2014.893116
  • Barton, M. R., & Waters, M. M. (2004). Creating an institutional repository: LEADIRS workbook. Massachusetts: MIT Libraries.
  • Barwick, J. (2007). Building an institutional repository at Loughborough University: Some experiences. Program, 41(2), 113–123. doi:10.1108/00330330710742890
  • Beall, J. (2013). Avoiding the Peril of Publishing Qualitative Scholarship in Predatory Journals. Journal of Ethnographic & Qualitative Research, 8(1), 1–12.
  • Bindura University of Science Education Library. (2019). Institutional Repository. Available at: http://ir.buse.ac.zw/xmlui/. Accessed 5 February 2019.
  • Bindura University of Science Education. (2016). Plagiarism policy. Available at: http://www.buse.ac.zw/downloads/anti-plagarism-policy/. Accessed 5 February 2019.
  • Chiparausha, B., & Chigwada, J. (2016). Contributing to the open access movement through an institutional repository: Experiences at Bindura University of Science Education. Available at: https://www.researchgate.net/publication/308915676_Contributing_to_the_open_access_movement_through_an_institutional_repository_experiences_at_Bindura_University_of_Science_Education. Accessed 5 February 2019.
  • Computer Security Institute (CSI). (2011). CSI Computer Crime and Security Survey 2010/2011.
  • Cragin, M. H., Palmer, C. L., Carlson, J. R., & Witt, M. (2010). Data sharing, small science and institutional repositories. Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences, 368(1926), 4023–4038. doi:10.1098/rsta.2010.0165
  • Cullen, R., & Chawner, B. (2010). Institutional repositories: Assessing their value to the academic community. Performance Measurement and Metrics, 11(2), 131–147.
  • Darby, R. M., Jones, C. M., Gilbert, L. D., & Lambert, S. C. (2009). Increasing the productivity of interactions between subject and institutional repositories. New Review of Information Networking, 14(2), 117–135. doi:10.1080/13614570903359381
  • Denning, D. E. (2003, January). Cyber Security as an Emergent Infrastructure. In World Conference on Information Security Education (pp. 1–2).
  • EBSCO. (2017). Three challenges for corporate institutional repositories – answered | EBSCO post. Available at: https://www.ebsco.com/blog-archives/article/three-challenges-for-corporate-institutional-repositories-answered.
  • Ejikeme, A. N., & Ezema, I. J. (2019). The potentials of open access initiative and the development of institutional repositories in Nigeria: implications for scholarly communication. Publishing Research Quarterly, 35(1), 6–21.
  • Emerald Publishing. (2019). How to… conduct a focus group Part: 1. Available at: http://www.emeraldgrouppublishing.com/research/guides/methods/focus.htm.
  • Evaluation Research Team (2009). Data collection methods for evaluation: Document review – Evaluation Briefs No. 18. Available at: https://www.cdc.gov/healthyyouth/evaluation/pdf/brief18.pdf.
  • Exline, E. (2016). Extending the institutional repository to include undergraduate research. College & Undergraduate Libraries, 23(1), 16–27.
  • Ezema, I. J. (2011). Building open access institutional repositories for global visibility of Nigerian scholarly publication. Library Review, 60(6), 473–485. doi:10.1108/00242531111147198
  • Foster, N. F., & Gibbons, S. (2005). Understanding faculty to improve content recruitment for institutional repositories. Online Submission, 11(1).
  • Ganame, A. K., Bourgeois, J., Bidou, R., & Spies, F. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1-2), 30–47.
  • Greenstein, D. (2000). Digital libraries and their challenges. Library Trends, 49(2), 290–303.
  • Hwang, S. Y., Elkins, S., Hanson, M., Shotwell, T., & Thompson, M. (2020). Institutional repository promotion: Current practices and opinions in Texas academia. New Review of Academic Librarianship, 26(1), 133–150.
  • Jones, R., Andrew, T., & MacColl, J. (2006). The institutional repository. Oxford: Chandos Publishing.
  • Kim, J. (2007). Motivating and impeding factors affecting faculty contribution to institutional repositories. Journal of Digital Information, 8(2), 1–11.
  • Lehmann, R. L. (1981). Tracking potential security violations. ACM SIGSAC Review, 1(1), 26–39. doi:10.1145/1317419.1317423
  • Lougee, W. P. (1998). Building an institutional infrastructure. New Orleans, LA: School for Scanning. Available at: http://ww.lib.uniich.edu/libhome/DLI/presentations/scanning/index.htm. Accessed 7 February, 2019.
  • Lynch, C. A. (2003). Institutional repositories: Essential infrastructure for scholarship in the digital age. Portal: Libraries and the Academy, 3(2), 327–336. doi:10.1353/pla.2003.0039
  • Marsh, C., Wackerman, D., & Stubbs, J. A. (2017). Creating an Institutional Repository: Elements for Success!. The Serials Librarian, 72(1-4), 3–6. doi:10.1080/0361526X.2017.1297587
  • Mpofu, V., Samukange, T., Kusure, L. M., Zinyandu, T. M., Denhere, C., Ndlovu, S., … Wiseman, C. (2012). Challenges of virtual and open distance science teacher education in Zimbabwe. The International Review of Research in Open and Distributed Learning, 13(1), 207–219. doi:10.19173/irrodl.v13i1.968
  • Nkiko, C., Bolu, C., & Michael-Onuoha, H. (2014). Managing a sustainable institutional repository: The covenant university experience. Samaru Journal of Information Studies, 14(1-2), 1–6.
  • Okoroma, F. N. (2018). Technological and Infrastructural Issues of Institutional Repositories in University Libraries in Nigeria: And the Way Forward. International Information & Library Review, 50(3), 251–262.
  • Pinfield, S., Gardner, M., & MacColl, J. (2002). Setting up an institutional e-print archive. Ariadne.
  • Post, G. V., & Kievit, K. A. (1991). Accessibility vs. security: A look at the demand for computer security. Computers & Security, 10(4), 331–344.
  • Ranga, S. R. (2015). Development and initiatives towards creating ETD archives of University Libraries with special reference to Gujarat State: A study. In R. C. Gaur, P. Babbar, S. K. Sukula, S. K. Sunny, & M. Chand (Eds.), ETD 2015 INDIA 18th International Symposium on Electronic Theses and Dissertations (pp: 473–486).
  • Sompel, H. V. D., Payette, S., Erickson, J., Lagoze, C., & Warner, S. (2004). Rethinking scholarly communication: Building the system that scholars deserve. D-Lib Magazine, 2004 (10), 9.
  • Straub, D. W. Jr. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276. doi:10.1287/isre.1.3.255
  • Trèek, D. (2003). An integral framework for information systems security management. Computers & Security, 22(4), 337–360.
  • Ukwoma, S. C., & Okafor, V. N. (2017). Institutional repository in Nigerian universities: Trends and development. Library Collections, Acquisitions, & Technical Services, 40(1-2), 46–57.
  • Van Wyk, B. (2016). Trends in digital scholarship curation in public and private higher education institutions in Southern Africa: A sociotechnical approach towards sustainability (Doctoral dissertation). University of Pretoria.
  • Verizon. (2008). 2008 Data Breach Investigations Report. Available at: http://www.wired.com/images_blogs/threatlevel/2011/04/Verizon-2011-DBIR_04-13-11.pdf.
  • Westell, M. (2006). Institutional repositories: Proposed indicators of success. Library Hi Tech, 24(2), 211–226. doi:10.1108/07378830610669583
  • Xia, J., Harmon, J. L., Connolly, K. G., Donnelly, R. M., Anderson, M. R., & Howard, H. A. (2015). Who publishes in “predatory” journals? Journal of the Association for Information Science and Technology, 66(7), 1406–1417. doi:10.1002/asi.23265
  • Yin, R. K. (2014). Case study research and applications: Design and methods. Los Angeles: SAGE Publications.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.