Building trustworthy digital repositories : theory and implementation
著者
書誌事項
Building trustworthy digital repositories : theory and implementation
Rowman & Littlefield, [2016]
- pbk. : alk. paper
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
内容説明・目次
内容説明
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source.
This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions:
*What is a trustworthy repository for digital records?
*Who is building these repositories, and what have been the results?
*How are institutions building or creating these repositories?
*How are institutions addressing the essential requirement related to the ingest or capture of records?
*How are institutions automatically and manually capturing essential metadata and audit trails?
*How are institutions implementing retention and disposal decisions within these systems?
*How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time?
*What is the current status of trustworthy repositories, and what will these systems look like in the future?
目次
Foreword by Gregory Hunter
Chapter 1: Evaluating and Selecting a Trustworthy Repository
Theory
Philip C. Bantin, What is a Trustworthy Repository? - Theory
Implementation
Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration
Chapter 2: Resources, Policies and Management Structures
Theory
Philip C. Bantin, Resources, Policies and Management Structures - Theory
Implementation
Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository
Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives
Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness
Chapter 3: Building a Trustworthy System: Ingest Process
Theory
Lisa Schmidt, Ingest Process-Theory
Implementation
Cynthia Ghering, Ingest Process: Michigan State University's Digital Archives Program
Jared Lyle, Ingest Process: Submission and 'Pre-Ingest' Activities
Giovanni Michetti, Submission Agreement in the eHealth Domain
Chapter 4: Creating and Capturing Metadata
Theory
Philip C. Bantin, Creating and Capturing Metadata: Theory
Implementation
Mimi Dionne, Adventures in Metadata: A Satellite Office's File Share Clean-Up Project
Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study
Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata
Chapter 5: Capturing Audit Trail Data
Theory
Daniel Noonan, Authenticity and Audit Trails - Theory
Implementation
Mimi Dionne, Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project
Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System
Chapter 6: Assigning Retention and Disposal Data
Theory
Donald Force, Assigning Retention and Disposal Data - Theory
Implementation
Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives
Chapter 7: Creating an Access Strategy
Theory
Kris Stenson, Creating an Access Strategy-Theory
Implementation
Debbie Bahn, Access Partnerships: Washington State Archives' Shared Responsibility Models
Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS)
Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository
Chapter 8: Creating a Secure System
Theory
Lois Evans, Creating a Secure System - Theory
Implementation
Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion
Chapter 9: Creating a Preservation Strategy
Theory
Lori J. Ashley, Creating a Preservation Strategy -Theory
Implementation
Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica
Chapter 10: Trustworthy Systems: Current Status and Future Directions
Luciana Duranti, What will Trustworthy Systems Look Like in the Future?
Nancy McGovern, Current Status of Trustworthy Systems
「Nielsen BookData」 より