Building trustworthy digital repositories : theory and implementation

cover image

Where to find it

Information & Library Science Library

Call Number
ZA4080 .B855 2016
Status
Available

Authors, etc.

Names:

Summary

Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source.



This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.



Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions:



What is a trustworthy repository for digital records? Who is building these repositories, and what have been the results? How are institutions building or creating these repositories? How are institutions addressing the essential requirement related to the ingest or capture of records? How are institutions automatically and manually capturing essential metadata and audit trails? How are institutions implementing retention and disposal decisions within these systems? How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time? What is the current status of trustworthy repositories, and what will these systems look like in the future?

Contents

  • Foreword p. xi Gregory S. Hunter
  • Preface p. xiii
  • 1 Evaluating and Selecting a Trustworthy Repository p. 1
  • Theory: Evaluating and Selecting a Trustworthy Repository p. 1 Philip C. Bantin
  • Implementation: Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration p. 5 Jim Corridan and Tibaut Houzanme
  • 2 Resources, Policies, and Management Structures p. 33
  • Theory: Resources, Policies, and Management Structures p. 33 Philip C. Bantin
  • Implementation: Ten Yeats and Counting: What Is Missing from Our Institutional Repository p. 36 Joanne Kaczmarek
  • Implementation: Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives p. 44 Glen McAninch
  • Implementation: Building a Trustworthy System: Resources, Policies, and Management Structures-Understanding Our Trustworthiness p. 57 Erik A. Moore
  • 3 Building a Trustworthy System: Ingest Process p. 77
  • Theory: Ingest Process p. 77 Lisa Schmidt
  • Implementation: Ingest Process: Michigan State University's Digital Archives Program p. 83 Cynthia Ghering
  • Implementation: Ingest Process: Submission and "Pre-Ingest" Activities p. 94 Jared Lyle
  • Implementation: Submission Agreement in the e-Health Domain p. 102 Giovanni Michetti
  • 4 Creating and Capturing Metadata p. 119
  • Theory: Creating and Capturing Metadata p. 119 Philip C. Bantin
  • Implementation: Adventures in Metadata: A Satellite Office's File Share Cleanup Project p. 124 Mimi Dionne
  • Implementation: Creating and Capturing Metadata: An Australian Digital Archives Case Study p. 140 Cassie Findlay
  • Implementation: Finding a Black Car in a Dark Room: Capture and Creation or Usable Metadata p. 156 Jane Gorjevsky and Dina Sokolova
  • 5 Capturing Audit Trail Data p. 169
  • Theory: Authenticity and Audit Trails p. 169 Daniel Noonan
  • Implementation: Adventures in Audit Trails: A Satellite Office's File Share Cleanup Project p. 174 Mimi Dionne
  • Implementation: Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System p. 180 Sibyl Schaefer and Michael Smorul and Michael Ritter and David Minor
  • 6 Assigning Retention and Disposal Data p. 199
  • Theory: Assigning Retention and Disposal Data p. 199 Donald Force
  • Implementation: Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives p. 203 Glen McAninch and Jim Cundy
  • 7 Creating an Access Strategy p. 219
  • Theory: Creating an Access Strategy p. 219 Kris Stenson
  • Implementation: Access Partnerships: Washington State Archives' Shared Responsibility Models p. 224 Debbie Bahn
  • Implementation: Creating an Access Strategy: The Oregon Records Management Solution (ORMS) p. 237 Mary Beth Herbert
  • Implementation: Determining Access Requirements for a Federal Government Scientific Data Repository p. 252 Lorraine L. Richards
  • 8 Creating a Secure System p. 271
  • Theory: Creating a Secure System p. 271 Lois Evans
  • Implementation: Creating a Secure System: A Discussion p. 279 Lois Evans
  • Implementation: VISR: The Virtual Institute for Social Research p. 292 Stan Ahalt and Jay Aikat and Dan Bedard and Margaret Burchinal and Thomas Carsey and Thu-Mai Christian and Jonathan Crabtree and Nancy Dole and Howard Lander and Latanya Sweeney and Mary Whitton
  • 9 Creating a Preservation Strategy p. 307
  • Theory: Creating a Preservation Strategy p. 307 Lori J. Ashley
  • Implementation: Building a Preservation Strategy around Archivematica p. 313 Bronwen Sprout and Sarah Romkey
  • 10 Trustworthy Systems: Current Status and Future Directions p. 325
  • Current Status of Trustworthy Systems p. 325 Nancy McGovern
  • What Will Trustworthy Systems Look Like in the Future? p. 336 Luciana Duranti
  • Index p. 351
  • About the Editor p. 361
  • About the Contributors p. 363

Other details