Details

Building Trustworthy Digital Repositories


Building Trustworthy Digital Repositories

Theory and Implementation

von: Philip C. Bantin

74,99 €

Verlag: Rowman & Littlefield Publishers
Format: EPUB
Veröffentl.: 01.07.2016
ISBN/EAN: 9781442263796
Sprache: englisch
Anzahl Seiten: 388

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<span><span>Building Trustworthy Digital Repositories: Theory and Implementation</span><span> combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source.<br><br>This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe. <br><br>Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions:<br></span></span>
<br>
<ul>
<li><span>What is a trustworthy repository for digital records?</span></li>
<li><span>Who is building these repositories, and what have been the results?</span></li>
<li><span>How are institutions building or creating these repositories?</span></li>
<li><span>How are institutions addressing the essential requirement related to the ingest or capture of records?</span></li>
<li><span>How are institutions automatically and manually capturing essential metadata and audit trails?</span></li>
<li><span>How are institutions implementing retention and disposal decisions within these systems?</span></li>
<li><span>How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time?</span></li>
<li><span>What is the current status of trustworthy repositories, and what will these systems look like in the future?</span></li>
</ul>
<span><span>Building Trustworthy Digital Repositories: Theory and Implementation</span><span> combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe. </span></span>
<span><span>Foreword by Gregory Hunter</span></span>
<br>
<span><span><br></span><span>Chapter 1: Evaluating and Selecting a Trustworthy Repository</span><span><br></span><span>Theory</span><span><br>Philip C. Bantin, </span><span>What is a Trustworthy Repository? – Theory</span><span><br></span><span>Implementation</span><span><br>Jim Corridan and Tibaut Houzanme, </span><span>Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration</span><span><br><br></span><span>Chapter 2: Resources, Policies and Management Structures</span><span><br></span><span>Theory</span><span><br>Philip C. Bantin, Resources, </span><span>Policies and Management Structures – Theory</span><span><br></span><span>Implementation</span><span><br>Joanne Kaczmarek, </span><span>Ten Years and Counting: What is Missing from Our Institutional Repository</span><span><br>Glen McAninch, </span><span>Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives</span><span><br>Erik A. Moore, </span><span>Resources, Policies, and Management Structures - Understanding Our Trustworthiness</span><span><br><br></span><span>Chapter 3: Building a Trustworthy System: Ingest Process</span><span><br></span><span>Theory</span><span><br>Lisa Schmidt, </span><span>Ingest Process—Theory</span><span><br></span><span>Implementation</span><span><br>Cynthia Ghering, </span><span>Ingest Process: Michigan State University’s Digital Archives Program</span><span><br>Jared Lyle, </span><span>Ingest Process: Submission and ‘Pre-Ingest’ Activities</span><span><br>Giovanni Michetti, </span><span>Submission Agreement in the eHealth Domain </span><span><br><br></span><span>Chapter 4: Creating and Capturing Metadata</span><span><br></span><span>Theory</span><span><br>Philip C. Bantin, </span><span>Creating and Capturing Metadata: Theory</span><span><br></span><span>Implementation</span><span><br>Mimi Dionne, </span><span>Adventures in Metadata: A Satellite Office’s File Share Clean-Up Project</span><span><br>Cassie Findlay, </span><span>Creating and Capturing Metadata: An Australian Digital Archives Case Study</span><span><br>Jane Gorjevsky and Dina Sokolova, </span><span>Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata</span><span><br><br></span><span>Chapter 5: Capturing Audit Trail Data</span><span><br></span><span>Theory</span><span><br>Daniel Noonan, </span><span>Authenticity and Audit Trails - Theory</span><span><br></span><span>Implementation</span><span><br>Mimi Dionne, </span><span>Adventures in Audit Trails: A Satellite Office’s File Share Clean-Up Project</span></span>
<br>
<span><span>Sibyl Schaefer Michael Smorul, Michael Ritter, &amp; David Minor, </span><span>Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System</span></span>
<br>
<span><span><br></span><span>Chapter 6: Assigning Retention and Disposal Data</span><span><br></span><span>Theory</span><span><br>Donald Force, </span><span>Assigning Retention and Disposal Data – Theory</span><span><br></span><span>Implementation</span><span><br>Glen McAninch and Jim Cundy, </span><span>Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives</span><span><br><br></span><span>Chapter 7: Creating an Access Strategy</span><span><br></span><span>Theory</span><span><br>Kris Stenson, </span><span>Creating an Access Strategy-Theory</span><span><br></span><span>Implementation</span><span><br>Debbie Bahn, </span><span>Access Partnerships: Washington State Archives’ Shared Responsibility Models</span><span><br>Mary Beth Herkert, </span><span>Creating an Access Strategy: The Oregon Records Management Solution (ORMS)</span><span><br>Lorraine L. Richards, </span><span>Determining Access Requirements for a Federal Government Scientific Data Repository</span><span><br></span><span><br>Chapter 8: Creating a Secure System</span><span><br></span><span>Theory</span><span><br>Lois Evans, </span><span>Creating a Secure System – Theory</span><span><br></span><span>Implementation</span></span>
<br>
<span><span>Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, </span><span>Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion</span><span><br><br></span><span>Chapter 9: Creating a Preservation Strategy<br>Theory</span><span><br>Lori J. Ashley, </span><span>Creating a Preservation Strategy –Theory</span><span><br></span><span>Implementation</span><span><br>Bronwen Sprout and Sarah Romkey,</span><span> Building a Preservation Strategy Around Archivematica</span><span><br><br></span><span>Chapter 10: Trustworthy Systems: Current Status and Future Directions</span><span><br>Luciana Duranti, </span><span>What will Trustworthy Systems Look Like in the Future?</span><span><br>Nancy McGovern, </span><span>Current Status of Trustworthy Systems</span></span>
<span><span>Philip Bantin </span><span>has been a professional archivist since 1977 and has worked for the last 21 years as university archivist and records manager at Indiana University, Bloomington. Since 1995 Bantin has been actively involved in developing strategies for managing electronic records</span></span>

Diese Produkte könnten Sie auch interessieren:

Der Tango im Werk Julio Cortázars
Der Tango im Werk Julio Cortázars
von: Viviana Alvarez-Schüller
PDF ebook
33,00 €
Heinrich Mann: Mirror and Antagonist of his time
Heinrich Mann: Mirror and Antagonist of his time
von: Alexander von Fenner
PDF ebook
33,00 €