skip to main content
research-article

Ubiquitous Access to Digital Cultural Heritage

Published: 14 April 2017 Publication History

Abstract

The digitization initiatives in the past decades have led to a tremendous increase in digitized objects in the cultural heritage domain. Although digitally available, these objects are often not easily accessible for interested users because of the distributed allocation of the content in different repositories and the variety in data structure and standards. When users search for cultural content, they first need to identify the specific repository and then need to know how to search within this platform (e.g., usage of specific vocabulary). The goal of the EEXCESS project is to design and implement an infrastructure that enables ubiquitous access to digital cultural heritage content. Cultural content should be made available in the channels that users habitually visit and be tailored to their current context without the need to manually search multiple portals or content repositories. To realize this goal, open-source software components and services have been developed that can either be used as an integrated infrastructure or as modular components suitable to be integrated in other products and services. The EEXCESS modules and components comprise (i) Web-based context detection, (ii) information retrieval-based, federated content aggregation, (iii) metadata definition and mapping, and (iv) a component responsible for privacy preservation. Various applications have been realized based on these components that bring cultural content to the user in content consumption and content creation scenarios. For example, content consumption is realized by a browser extension generating automatic search queries from the current page context and the focus paragraph and presenting related results aggregated from different data providers. A Google Docs add-on allows retrieval of relevant content aggregated from multiple data providers while collaboratively writing a document. These relevant resources then can be included in the current document either as citation, an image, or a link (with preview) without having to leave disrupt the current writing task for an explicit search in various content providers’ portals.

References

[1]
James Allan, Bruce Croft, Alistair Moffat, and Mark Sanderson. 2012. Frontiers, challenges, and opportunities for information retrieval: Report from SWIRL 2012. SIGIR Forum 46, 1, 2--32.
[2]
Avi Arampatzis, Pavlos S. Efraimidis, and George Drosatos. 2013. A query scrambler for search privacy on the Internet. Information Retrieval 16, 6, 657--679.
[3]
Albert-Lásló Barabási, Réka Albert, and Hawoong Jeong. 2000. Scale-free characteristics of random networks: The topology of the World-Wide Web. Physica A: Statistical Mechanics and Its Applications 281, 1--4, 69--77.
[4]
Emanuele Bellini and Paolo Nesi. 2013. Metadata quality assessment tool for open access cultural heritage institutional repositories. In Information Technologies for Performing Arts, Media Access, and Entertainment. Lecture Notes in Computer Science, Vol. 7990. Springer, 90--103.
[5]
Sonia Ben Mokhtar, Gautier Berthou, Amadou Diarra, Vivien Quéma, and Ali Shoker. 2013. RAC: A freerider-resilient, scalable, anonymous communication protocol. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS’13). 520--529.
[6]
John Brooke. 1996. SUS: A ‘quick and dirty’ usability scale. In Usability Evaluation in Industry, P. W. Jordan, B. Weerdmeester, A. Thomas, and I. L. Mclelland (Eds.). Taylor 8 Francis, London, England, 189--194.
[7]
Thomas R. Bruce and Diane I. Hillmann. 2004. The Continuum of Metadata Quality: Defining, Expressing, Exploiting. ALA Editions, Chicago, IL, 238--256.
[8]
Jay Budzik and Kristian Hammond. 1999. Watson: Anticipating and contextualizing information needs. In Proceedings of the Annual Meeting of the American Society for Information Science. 727--740.
[9]
Jordi Castellà-Roca, Alexandre Viejo, and Jordi Herrera-Joancomartí. 2009. Preserving user’s privacy in Web search engines. Computer Communications 32, 13, 1541--1551.
[10]
J. Debattista, S. Londoo, C. Lange, and S. Auer. 2014. LUZZU—a framework for linked data quality assessment. arXiv:1412.3750. http://arxiv.org/abs/1412.3750
[11]
Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium, Volume 13 (SSYM’04). 21.
[12]
Josep Domingo-Ferrer, Agusti Solanas, and Jordi Castellà-Roca. 2009. h(k)-Private information retrieval from privacy-uncooperative queryable databases. Online Information Review 33, 4, 720--744.
[13]
Evelyn Dröge. 2012. Criteria for Vocabulary Evaluation and Comparison. Technical Report. Humboldt-Universität zu Berlin.
[14]
C. Dwork, E, Kumar, M. Naor, and D. Sivakumar. 2001. Rank aggregation methods for the Web. In Proceedings of the 10th International Conference on World Wide Web. 613--622.
[15]
Europeana Foundation. 2015. Definition of the Europeana Data Model. Technical Report. Europeana Foundation. http://pro.europeana.eu/page/edm-documentation.
[16]
D. Gavrilis, D.-N. Makri, L. Papachristopoulos, S. Angelis, K. Kravvaritis, C. Papatheodorou, and P. Constantopoulos. 2015. Measuring quality in metadata repositories. In Research and Advanced Technology for Digital Libraries. Lecture Notes in Computer Science, Vol. 9316. Springer, 56--67.
[17]
Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, and Vincent Lenders. 2014. Quantifying Web-search privacy. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 966--977.
[18]
David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion routing. Communications of the ACM 42, 2, 39--41.
[19]
Michael Granitzer and Christin Seifert. 2016. Taking cultural and scientific content to users through the EEXCESS project. D-Lib Magazine 22, 3--4, 1.
[20]
Michael Granitzer, Christin Seifert, Silvia Russegger, and Klaus Tochtermann. 2013. Unfolding cultural, educational and scientific long-tail content in the Web. In Late-Breaking Results, Project Papers, and Workshop Proceedings of the 21st Conference on User Modeling, Adaptation, and Personalization. http://ceur-ws.org/Vol-997/umap2013_project_1.pdf.
[21]
Jiafeng Guo, Gu Xu, Xueqi Cheng, and Hang Li. 2009. Named entity recognition in query. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’09). ACM, New York, NY, 267--274.
[22]
Matthias Hagen, Martin Potthast, Anna Beyer, and Benno Stein. 2012. Towards optimum query segmentation: In doubt without. In Proceedings of the International Conference on Information and Knowledge Management (CIKM’12). ACM, New York, NY, 1015--1024.
[23]
David Hauger, Alexandros Paramythis, and Stephan Weibelzahl. 2011. Using browser interaction data to determine page reading behavior. In Proceedings of the 19th International Conference on User Modeling, Adaptation, and Personalization (UMAP’11). 147--158. http://dl.acm.org/citation.cfm?id=2021855.2021869
[24]
Martin Höffernig, Werner Bailer, Günter Nagler, and Helmut Mülner. 2010. Mapping audiovisual metadata formats using formal semantics. In Semantic Multimedia. Lecture Notes in Computer Science, Vol. 6725. Springer, 80--94.
[25]
Martin Höffernig, Thomas Orgel, Silvia Russegger, and Werner Bailer. 2015. Assessing quality in automated metadata aggregation and mapping services. In Proceedings of the Workshop on Cloud-Based Services for Digital Libraries.
[26]
ISO 21127. 2014. ISO 21127:2014: Information and documentation—a reference ontology for the interchange of cultural heritage information. Retrieved February 20, 2017, from http://www.iso.org/iso/catalogue_detail?csnumber=57832.
[27]
Marc Juarez and Vicenc Torra. 2015. DisPA: An intelligent agent for private Web search. In Advanced Research in Data Privacy. Vol. 567. Springer, 389--405.
[28]
Arlind Kopliku, Karen Pinel-Sauvagnat, and Mohand Boughanem. 2014. Aggregated search: A new information retrieval paradigm. ACM Computing Surveys 46, 3, 41.
[29]
Quoc V. Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of the 31st International Conference on Machine Learning (ICML’14). 1188--1196.
[30]
Timothy Lebo, Satya Sahoo, and Deborah McGuinness (Eds.). 2013. PROV-O: The PROV Ontology. Retrieved February 20, 2017, from http://www.w3.org/TR/prov-o/.
[31]
Ryong Lee and Kazutoshi Sumiya. 2009. Zero-effort search and integration model for augmented Web applications. In Proceedings of the 9th International Conference on Web Engineering (ICWE’09). 330--339.
[32]
Henry Lieberman. 1997. Autonomous interface agents. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI’97). ACM, New York, NY, 67--74.
[33]
Yehuda Lindell and Erez Waisbard. 2010. Private Web search with malicious adversaries. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies (PETS’10). 220--235.
[34]
Pasquale Lops, Marco De Gemmis, and Giovanni Semeraro. 2011. Content-based recommender systems: State of the art and trends. In Recommender Systems Handbook. Springer, 73--105.
[35]
Jie Lu and Jamie Callan. 2005. Federated search of text-based digital libraries in hierarchical peer-to-peer networks. In Advances in Information Retrieval. Springer, 52--66.
[36]
Kay Michal. 2007. XSL Transformations (XSLT) Version 2.0. W3C Recommendation. Retrieved February 20, 2017, from http://www.w3.org/TR/2007/REC-xslt20-20070123/.
[37]
Rada Mihalcea and Paul Tarau. 2004. TextRank: Bringing order into texts. In Proceedings of the Conference on Empirical Methods in Natural Language Processing.
[38]
Jesse Montgomery, Luo Si, Jamie Callan, and David A. Evans. 2004. Effect of varying number of documents in blind feedback: Analysis of the 2003 NRRC RIA workshop “bf_numdocs” experiment suite. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’04). ACM, New York, NY, 476--477.
[39]
Vanessa Murdock and Mounia Lalmas. 2008. Workshop on aggregated search. ACM SIGIR Forum 42, 2, 80.
[40]
Mummoorthy Murugesan and Chris Clifton. 2009. Providing privacy through plausibly deniable search. In Proceedings of the 2009 SIAM International Conference on Data Mining. 768--779.
[41]
Thomas Orgel, Werner Bailer, Martin Höffernig, Werner Preininger, and Silvia Russegger. 2016. Integration and Enrichment Services Final Prototype. Technical Report. EEXCESS Deliverable 4.4. EEXCESS.
[42]
Thomas Orgel, Martin Höffernig, Werner Bailer, and Silvia Russegger. 2015. A metadata model and mapping approach for facilitating access to heterogeneous cultural heritage assets. International Journal on Digital Libraries 15, 2--4, 189--207.
[43]
Sai Teja Peddinti and Nitesh Saxena. 2014. Web search query privacy: Evaluating query obfuscation and anonymizing networks. Journal of Computer Security 22, 1, 155--199.
[44]
Albin Petit, Thomas Cerqueus, Antoine Boutet, Sonia Ben Mokhtar, David Coquil, Lionel Brunie, and Harald Kosch. 2016. SimAttack: Private Web Search Under Fire. Technical Report. Institut National des Sciences Appliquées de Lyon ; Universität Passau. https://hal.inria.fr/hal-01289861
[45]
Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, and Harald Kosch. 2015. PEAS: Private, efficient and accurate Web search. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA Conference, Vol. 1. IEEE, Los Alamitos, CA, 571--580.
[46]
K. J. Reiche, I. Schieferdecker, and E. Höfig. 2014. Assessment and visualization of metadata quality for open government data. In Proceedings of the International Conference for E-Democracy and Open Government.
[47]
B. J. Rhodes. 2000. Just-In-Time Information Retrieval. Ph.D. Dissertation. Massachusetts Institute of Technology, Cambridge, MA.
[48]
B. J. Rhodes and P. Maes. 2000. Just-in-time information retrieval agents. IBM Systems Journal 39, 3--4, 685--704.
[49]
Francesco Ricci, Lior Rokach, and Bracha Shapira. 2011. Introduction to Recommender Systems Handbook. Springer.
[50]
Stuart Rose, Dave Engel, Nick Cramer, and Wendy Cowley. 2010. Automatic Keyword Extraction from Individual Documents. John Wiley 8 Sons.
[51]
Raoul Rubien, Hermann Ziak, and Roman Kern. 2015. Efficient search result diversification via query expansion using knowledge bases. In Proceedings of 12th International Workshop on Text-Based Information Retrieval (TIR’15).
[52]
Jörg Schlötterer. 2015. From context to query. In Proceedings of the ACM Symposium on Applied Computing (SAC’15). ACM, New York, NY, 1108--1109.
[53]
Jörg Schlötterer, Christin Seifert, and Michael Granitzer. 2016. Supporting Web surfers in finding related material in digital library repositories. In Proceedings of the International Conference on Theory and Practice of Digital Libraries (TPDL’16).
[54]
H. A. Seid and A. L. Lespagnol. 1998. Virtual private network. US Patent 5,768,271.
[55]
C. Seifert, J. Jurgovsky, and M. Granitzer. 2014. FacetScape: A visualization for exploring the search space. In Proceedings of the 2014 18th International Conference on Information Visualization (IV’14). 94--101.
[56]
Christin Seifert, Nils Witt, Sebastian Bayerl, and Michael Granitzer. 2015. Digital library content in the social Web: Resource usage and content injection. IEEE STCN Newsletter 3, 1. https://sites.google.com/a/ieee.net/stc-social-networking/e-letter/stcsn- e-letter-vol-3-no-1/.
[57]
Marc Shapiro. 1986. Structure and encapsulation in distributed systems: The proxy principle. In Proceedings of the 2013 IEEE 6th International Conference on Distributed Computing Systems (ICDCS’86). 198--204.
[58]
Milad Shokouhi and Qi Guo. 2015. From queries to cards: Re-ranking proactive card recommendations based on reactive search history. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’15). ACM, New York, NY, 695--704.
[59]
Milad Shokouhi and Luo Si. 2011. Federated search. Foundations and Trends in Information Retrieval 5, 1, 1--102.
[60]
B. Stvilia, L. Gasser, and M. Twidale. 2007. A framework for information quality assessment. Journal of the American Society for Information Science and Technology 58, 12, 1720--1733.
[61]
Vincent Toubiana, Lakshminarayanan Subramanian, and Helen Nissenbaum. 2011. Trackmenot: Enhancing the privacy of Web search. arXiv:1109.4677.
[62]
T. Trippel, D. Broeder, M. Durco, and O. Ohren. 2014. Towards automatic quality assessment of component metadata. In Proceedings of the 9th International Conference on Language Resources and Evaluation.
[63]
Gerwald Tschinkel, Cecialia di Sciascio, Belgin Mutlu, and Vedran Sabol. 2015. The recommendation dashboard: A system to visualise and organise recommendations. In Proceedings of the International Conference on Information Visualisation (IV’15). 241--244.
[64]
Hermann Ziak and Roman Kern. 2015. Evaluation of pseudo relevance feedback techniques for cross vertical aggregated search. In Experimental IR Meets Multilinguality, Multimodality, and Interaction. Lecture Notes in Computer Science, Vol. 9283. Springer, 91--102.
[65]
Stefan Zwicklbauer, Christin Seifert, and Michael Granitzer. 2016a. Robust and collective entity disambiguation through semantic embeddings. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’16).
[66]
Stefan Zwicklbauer, Christin Seifert, and Michael Granitzer. 2016b. DoSeR—a knowledge-base-agnostic framework for disambiguating entities using semantic embeddings. In Proceedings of the European Semantic Web Conference (ESWC’16).

Cited By

View all
  • (2024)How to Arrange Texts and Pictures for Online Visitors — Comparing Basic Ceramic Display Forms with Eye TrackingJournal on Computing and Cultural Heritage 10.1145/363993817:2(1-23)Online publication date: 26-Mar-2024
  • (2024)Cultural Heritage Information Retrieval: Past, Present, and Future TrendsIEEE Access10.1109/ACCESS.2024.337476912(42992-43026)Online publication date: 2024
  • (2023)System Architecture Design of a Multimedia Platform to Increase Awareness of Cultural Heritage: A Case Study of Sustainable Cultural HeritageSustainability10.3390/su1503250415:3(2504)Online publication date: 30-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal on Computing and Cultural Heritage
Journal on Computing and Cultural Heritage   Volume 10, Issue 1
Special Issue on Digital Infrastructure for Cultural Heritage, Part 1
April 2017
131 pages
ISSN:1556-4673
EISSN:1556-4711
DOI:10.1145/3034773
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2017
Accepted: 01 October 2016
Revised: 01 August 2016
Received: 01 April 2016
Published in JOCCH Volume 10, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Search aggregation
  2. metadata harmonization
  3. user context detection

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • European Union Seventh Framework Programme FP7/2007-2013

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)59
  • Downloads (Last 6 weeks)4
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)How to Arrange Texts and Pictures for Online Visitors — Comparing Basic Ceramic Display Forms with Eye TrackingJournal on Computing and Cultural Heritage 10.1145/363993817:2(1-23)Online publication date: 26-Mar-2024
  • (2024)Cultural Heritage Information Retrieval: Past, Present, and Future TrendsIEEE Access10.1109/ACCESS.2024.337476912(42992-43026)Online publication date: 2024
  • (2023)System Architecture Design of a Multimedia Platform to Increase Awareness of Cultural Heritage: A Case Study of Sustainable Cultural HeritageSustainability10.3390/su1503250415:3(2504)Online publication date: 30-Jan-2023
  • (2023)Digital Cultural Items in Space: The Impact of Contextual Information on Presenting Digital Cultural ItemsJournal on Computing and Cultural Heritage 10.1145/359472516:4(1-15)Online publication date: 5-Oct-2023
  • (2023)Integrated Information System for 3D Interactive Reconstruction of an Archaeological SiteJournal on Computing and Cultural Heritage 10.1145/358607716:3(1-23)Online publication date: 9-Aug-2023
  • (2023)Towards Critical Heritage in the wild: Analysing Discomfort through Collaborative AutoethnographyProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581274(1-19)Online publication date: 19-Apr-2023
  • (2022)Cultural heritage preservation by using blockchain technologiesHeritage Science10.1186/s40494-021-00643-910:1Online publication date: 10-Jan-2022
  • (2022)Access Beyond Borders: Linked Open Data Applications on Cultural HeritageNew Review of Information Networking10.1080/13614576.2022.214533427:2(71-90)Online publication date: 17-Nov-2022
  • (2022)Museums and digital technology: a literature review on organizational issuesEuropean Planning Studies10.1080/09654313.2021.202311030:9(1676-1694)Online publication date: 5-Jan-2022
  • (2022)Narrating the Story of a Digitized Old Historical MapHCI International 2022 Posters10.1007/978-3-031-06391-6_39(296-303)Online publication date: 16-Jun-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media