What is an ETD?
An electronic thesis or dissertation (ETD) is digital version of a dissertation that is available to the public via the internet. Universities and colleges in the United States and abroad have been moving toward this type of publication for the past decade. Johns Hopkins started its own ETD program beginning in the fall semester of 2013.
Who is affected?
- All PhD Students
- Masters students with a required thesis may submit; contact your program office for information
- Other graduate degrees: Consult with your graduate office
How and when do I submit my ETD?
- Submit after you have defended your thesis or dissertation and made all edits required by your committee
- Login with your JHED ID to the JHU ETD submission system, fill in the required metadata, and upload a PDF/a file of your thesis or dissertation
- The required PDF/a file format is different from a standard PDF. Please see the formatting page for further instructions
The ETD submission fee is $60 and may be paid by credit card or by funds transfer from your department. The fee is due at the time of submission; payment verification is required for approval.
Pay by Credit Card – $60
IMPORTANT: If the card you are using is not your own (e.g., spouse or parent’s card), proceed with the payment at the site, but then email your name, your JHED ID, and the name of the credit card owner to email@example.com so we can link your submission with the payment.
Pay by Department Funds Transfer
NOTE: This option is available at departmental discretion. Request that the department administrator fill out the PDF form and submit it to the ETD Coordinator.
- In-Person or Mail: Digitization Unit, A-level, Milton S. Eisenhower Library (M-F, 9 am to 5 pm)
- Email: firstname.lastname@example.org
We will be offering a series of one-hour ETD workshops throughout the semester. Please join us to learn more about the submission process, how to format your ETD, and copyright concerns. Keep watching this space for more times and locations. We will broadcast each workshop via Adobe Connect.
We currently have no live workshops scheduled, but a recorded version is available. Future workshops will be posted to the Library Trainings & Workshops page.
Required Submission Information
There are several descriptive fields that you must fill out during the submission process. Some of these fields will help other researchers find your ETD and others will control when your ETD will be made visible to the public. Each of the required fields is denoted with an asterisk (*), and you will not be able to continue further in the process without filling them in. Please see the Formatting Guidelines and Checklist for more information. Please contact us at email@example.com if you have any questions.
Database Security Dissertation Topics
Projects require documentations on how it was conducted until decisions made at the conclusion. This database has to be kept in a secure location away from unauthorized access. There is need of ensuring that the database is safe since some contain privately identifiable information. Therefore, to certify that this dissertation database is secure one may decide to try the following considerations.
Educating the database management team
This is the best method to ensure database integrity among a team. Training of the team about the procedures of database security keeps an extra eye on how and who accesses the data. The team approves approachability of the database individuals.
Monitoring the access of data in a database is essential to avoid loss. The close controlling of the database accessibility ensures that it is not abused or used in a way not intended. Equipping members of the database team members’ identification ensure no sneaking for database.
Regular database backup
Database backup provides a temporarily data when the original copy is accidentally disseminated. Database backup is done at interval time period and not after end of project. In an occasion where the original database is lost, the up to date back up is used as primary database for the dissertation.
Different levels of database access
Accessibility of database requires one to pass through different levels of database access such as passwords and pin which are not easily formulated by others. The database is retrieved after completing all the levels of security. Most database security organizations consider at least 3 levels of security of the database.
Encryption of database for transfer
Unencrypted database is vulnerable to be intercepted by malicious targets who intent to use it for their benefit. An individual at the destination of the transfer must have the encryption key to access the encrypted database. Database is secure from annexing to the public
Protection of database from burglary
Employing database security personnel to keep watch of whoever gets in to access the database shows accountability of the database use. In most places such as library, the installation of CCTV reduces the prospect of interfering or getting away with the database without the consent of the management.
Setting up strong passwords
Strong password is a basis for database encryption. The password must encompass both numbers and characters but must not relate in anyway with procession of the database user.
Installation of firewall and updated versions
Updated versions of software protect the database from virus infection that might result to the failure of the database.