Building trustworthy digital repositories : theory and implementation
著者
書誌事項
Building trustworthy digital repositories : theory and implementation
Rowman & Littlefield, [2016]
- pbk. : alk. paper
大学図書館所蔵 全1件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
内容説明・目次
内容説明
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source.
This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions:
*What is a trustworthy repository for digital records?
*Who is building these repositories, and what have been the results?
*How are institutions building or creating these repositories?
*How are institutions addressing the essential requirement related to the ingest or capture of records?
*How are institutions automatically and manually capturing essential metadata and audit trails?
*How are institutions implementing retention and disposal decisions within these systems?
*How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time?
*What is the current status of trustworthy repositories, and what will these systems look like in the future?
目次
Foreword by Gregory Hunter
Chapter 1: Evaluating and Selecting a Trustworthy Repository
Theory
Philip C. Bantin, What is a Trustworthy Repository? - Theory
Implementation
Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration
Chapter 2: Resources, Policies and Management Structures
Theory
Philip C. Bantin, Resources, Policies and Management Structures - Theory
Implementation
Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository
Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives
Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness
Chapter 3: Building a Trustworthy System: Ingest Process
Theory
Lisa Schmidt, Ingest Process-Theory
Implementation
Cynthia Ghering, Ingest Process: Michigan State University's Digital Archives Program
Jared Lyle, Ingest Process: Submission and 'Pre-Ingest' Activities
Giovanni Michetti, Submission Agreement in the eHealth Domain
Chapter 4: Creating and Capturing Metadata
Theory
Philip C. Bantin, Creating and Capturing Metadata: Theory
Implementation
Mimi Dionne, Adventures in Metadata: A Satellite Office's File Share Clean-Up Project
Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study
Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata
Chapter 5: Capturing Audit Trail Data
Theory
Daniel Noonan, Authenticity and Audit Trails - Theory
Implementation
Mimi Dionne, Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project
Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System
Chapter 6: Assigning Retention and Disposal Data
Theory
Donald Force, Assigning Retention and Disposal Data - Theory
Implementation
Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives
Chapter 7: Creating an Access Strategy
Theory
Kris Stenson, Creating an Access Strategy-Theory
Implementation
Debbie Bahn, Access Partnerships: Washington State Archives' Shared Responsibility Models
Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS)
Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository
Chapter 8: Creating a Secure System
Theory
Lois Evans, Creating a Secure System - Theory
Implementation
Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion
Chapter 9: Creating a Preservation Strategy
Theory
Lori J. Ashley, Creating a Preservation Strategy -Theory
Implementation
Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica
Chapter 10: Trustworthy Systems: Current Status and Future Directions
Luciana Duranti, What will Trustworthy Systems Look Like in the Future?
Nancy McGovern, Current Status of Trustworthy Systems
「Nielsen BookData」 より