Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe. Until about five years ago, there were very few implementation projects in this area. This book brings together…mehr
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe. Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions: ·What is a trustworthy repository for digital records? ·Who is building these repositories, and what have been the results? ·How are institutions building or creating these repositories? ·How are institutions addressing the essential requirement related to the ingest or capture of records? ·How are institutions automatically and manually capturing essential metadata and audit trails? ·How are institutions implementing retention and disposal decisions within these systems? ·How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time? ·What is the current status of trustworthy repositories, and what will these systems look like in the future?Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources Policies and Management Structures Theory Philip C. Bantin Resources Policies and Management Structures - Theory Implementation Joanne Kaczmarek Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch Resources Policies and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore Resources Policies and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt Ingest Process-Theory Implementation Cynthia Ghering Ingest Process: Michigan State University's Digital Archives Program Jared Lyle Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin Creating and Capturing Metadata: Theory Implementation Mimi Dionne Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan Authenticity and Audit Trails - Theory Implementation Mimi Dionne Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul Michael Ritter & David Minor Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson Creating an Access Strategy-Theory Implementation Debbie Bahn Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans Creating a Secure System - Theory Implementation Stan Ahalt Jay Aikat Dan Bedard Margaret Burchinal Thomas Carsey Thu-Mai Christian Jonathan Crabtree Nancy Dole Howard Lander Latanya Sweeney Mary Whitton Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti What will Trustworthy Systems Look Like in the Future? Nancy McGovern Current Status of Trustworthy Systems
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources Policies and Management Structures Theory Philip C. Bantin Resources Policies and Management Structures - Theory Implementation Joanne Kaczmarek Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch Resources Policies and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore Resources Policies and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt Ingest Process-Theory Implementation Cynthia Ghering Ingest Process: Michigan State University's Digital Archives Program Jared Lyle Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin Creating and Capturing Metadata: Theory Implementation Mimi Dionne Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan Authenticity and Audit Trails - Theory Implementation Mimi Dionne Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul Michael Ritter & David Minor Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson Creating an Access Strategy-Theory Implementation Debbie Bahn Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans Creating a Secure System - Theory Implementation Stan Ahalt Jay Aikat Dan Bedard Margaret Burchinal Thomas Carsey Thu-Mai Christian Jonathan Crabtree Nancy Dole Howard Lander Latanya Sweeney Mary Whitton Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti What will Trustworthy Systems Look Like in the Future? Nancy McGovern Current Status of Trustworthy Systems
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826