Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Taxonomy construction

Develop a taxonomy for BHP Billiton company website (www.bhpbilliton.com). Although BHP Billiton website has provided a site map (www.bhpbilliton.com/home/info/pages/sitemap.aspx), it has not been effective for indexing and search purposes. As this is a company website for various users, there are large amounts of indexed documents in different formats. Your task is to build out a taxonomy from existing resources, including a rudimentary taxonomy from site map and the documents linked to this website. The goal is to build up a taxonomy for a company website that could be used for effective navigation in a networked environment.

Procedure

1. Think about the distinctions between subject and non-subject vocabularies as discussed in Hider's (2012, pp. 170-175) textbook.

2. Browse through the BHP Billiton website as you normally do. You could also check out the documents by site map or other search tools available from this website.

3. Check out the exiting site map. You should decide if it's better to expand the taxonomy or build a new one.

4. You should decide which types of taxonomy (e.g., subject, organisational, functional or hybrid) you plan to construct for the website.

5. Locate the documents in the website. These documents should be searchable from www.bhpbilliton.com. You will analyse these documents to develop the word stock for your taxonomy (i.e., labels/vocabularies for a taxonomy).

6. Build up hierarchical structures of the taxonomy by considering the number and complexity of indexed documents within an organisational context for intended users (e.g., general users, job seekers and investors).

7. prepare a summary report of the taxonomy development (no more than 750 words).

Additional:

1. To get an idea of what the end product would be like, you might want to consult other well-developed taxonomies for big organisations, such as ASCE (www.asce.org/sitemap.aspx), Breastcancer.org (www.breastcancer.org) and NASA (bit.ly/14B9cw7).

2. You may find it helpful to browse recent Taxonomies in Practice articles at www.asis.org/Bulletin/Dec-12/ while you construct your taxonomy.

3. You have the option of using tools for managing and oraganising the term relationships, or developing a taxonomy. A useful list can be found at American Society of Indexer's website at: bit.ly/YQcNH8

The completed thesaurus should be  a word-processed document or a web document in HTML. It should contain:

• a summary report of taxonomy development (a maximum of two pages). It should include a brief introduction of the website and its contents, the types of taxonomy adopted, analysis and labeling of vocabularies, development of hierarchical structures, and potential usefulness of this taxonomy.

• the developed taxonomy hierarchically organised.

• a list of documents you used to develop the word stock for your taxonomy.

Notes

• You should aim at analysing at least 150 indexed documents related to the website.

• Your taxonomy must be your own piece of work.

• If you use any reference sources, make sure you cite them in your reference list.

Rationale
The aim of this assignment is to assess your ability to construct a taxonomy for a large-scale website

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91660

Have any Question? 


Related Questions in Computer Network & Security

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

System reference guide - diagrammingyou have been called

System Reference Guide - Diagramming You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. As a contin ...

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Q1 the first transcontinental telephone service was

Q1. The first transcontinental telephone service was established in the 1940s. a. true b. false Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET. a. tru ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen