- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Andere Kunden interessierten sich auch für
- Nikos KoutrasBuilding Equitable Access to Knowledge Through Open Access Repositories207,99 €
- Shantashree SenguptaE-thesis repositories in the world52,95 €
- Developing Librarian Competencies for the Digital Age128,99 €
- Managing Knowledge and Scholarly Assets in Academic Libraries185,99 €
- Innovative Solutions for Building Community in Academic Libraries207,99 €
- Sara Russell Gonzalez3D Printing156,99 €
- Ben RawlinsMobile Technologies in Libraries113,99 €
-
-
-
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- Seitenzahl: 390
- Erscheinungstermin: 15. Juli 2016
- Englisch
- Abmessung: 235mm x 157mm x 27mm
- Gewicht: 784g
- ISBN-13: 9781442263772
- ISBN-10: 1442263776
- Artikelnr.: 44735024
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- Seitenzahl: 390
- Erscheinungstermin: 15. Juli 2016
- Englisch
- Abmessung: 235mm x 157mm x 27mm
- Gewicht: 784g
- ISBN-13: 9781442263772
- ISBN-10: 1442263776
- Artikelnr.: 44735024
By Philip C. Bantin
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin
What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme
Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources
Policies and Management Structures Theory Philip C. Bantin
Resources
Policies and Management Structures - Theory Implementation Joanne Kaczmarek
Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch
Resources
Policies
and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore
Resources
Policies
and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt
Ingest Process-Theory Implementation Cynthia Ghering
Ingest Process: Michigan State University's Digital Archives Program Jared Lyle
Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti
Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin
Creating and Capturing Metadata: Theory Implementation Mimi Dionne
Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay
Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova
Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan
Authenticity and Audit Trails - Theory Implementation Mimi Dionne
Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul
Michael Ritter
& David Minor
Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force
Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy
Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson
Creating an Access Strategy-Theory Implementation Debbie Bahn
Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert
Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards
Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans
Creating a Secure System - Theory Implementation Stan Ahalt
Jay Aikat
Dan Bedard
Margaret Burchinal
Thomas Carsey
Thu-Mai Christian
Jonathan Crabtree
Nancy Dole
Howard Lander
Latanya Sweeney
Mary Whitton
Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans
Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley
Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey
Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti
What will Trustworthy Systems Look Like in the Future? Nancy McGovern
Current Status of Trustworthy Systems
What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme
Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources
Policies and Management Structures Theory Philip C. Bantin
Resources
Policies and Management Structures - Theory Implementation Joanne Kaczmarek
Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch
Resources
Policies
and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore
Resources
Policies
and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt
Ingest Process-Theory Implementation Cynthia Ghering
Ingest Process: Michigan State University's Digital Archives Program Jared Lyle
Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti
Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin
Creating and Capturing Metadata: Theory Implementation Mimi Dionne
Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay
Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova
Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan
Authenticity and Audit Trails - Theory Implementation Mimi Dionne
Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul
Michael Ritter
& David Minor
Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force
Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy
Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson
Creating an Access Strategy-Theory Implementation Debbie Bahn
Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert
Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards
Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans
Creating a Secure System - Theory Implementation Stan Ahalt
Jay Aikat
Dan Bedard
Margaret Burchinal
Thomas Carsey
Thu-Mai Christian
Jonathan Crabtree
Nancy Dole
Howard Lander
Latanya Sweeney
Mary Whitton
Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans
Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley
Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey
Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti
What will Trustworthy Systems Look Like in the Future? Nancy McGovern
Current Status of Trustworthy Systems
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin
What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme
Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources
Policies and Management Structures Theory Philip C. Bantin
Resources
Policies and Management Structures - Theory Implementation Joanne Kaczmarek
Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch
Resources
Policies
and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore
Resources
Policies
and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt
Ingest Process-Theory Implementation Cynthia Ghering
Ingest Process: Michigan State University's Digital Archives Program Jared Lyle
Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti
Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin
Creating and Capturing Metadata: Theory Implementation Mimi Dionne
Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay
Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova
Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan
Authenticity and Audit Trails - Theory Implementation Mimi Dionne
Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul
Michael Ritter
& David Minor
Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force
Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy
Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson
Creating an Access Strategy-Theory Implementation Debbie Bahn
Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert
Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards
Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans
Creating a Secure System - Theory Implementation Stan Ahalt
Jay Aikat
Dan Bedard
Margaret Burchinal
Thomas Carsey
Thu-Mai Christian
Jonathan Crabtree
Nancy Dole
Howard Lander
Latanya Sweeney
Mary Whitton
Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans
Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley
Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey
Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti
What will Trustworthy Systems Look Like in the Future? Nancy McGovern
Current Status of Trustworthy Systems
What is a Trustworthy Repository? - Theory Implementation Jim Corridan and Tibaut Houzanme
Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources
Policies and Management Structures Theory Philip C. Bantin
Resources
Policies and Management Structures - Theory Implementation Joanne Kaczmarek
Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch
Resources
Policies
and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore
Resources
Policies
and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt
Ingest Process-Theory Implementation Cynthia Ghering
Ingest Process: Michigan State University's Digital Archives Program Jared Lyle
Ingest Process: Submission and 'Pre-Ingest' Activities Giovanni Michetti
Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin
Creating and Capturing Metadata: Theory Implementation Mimi Dionne
Adventures in Metadata: A Satellite Office's File Share Clean-Up Project Cassie Findlay
Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova
Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan
Authenticity and Audit Trails - Theory Implementation Mimi Dionne
Adventures in Audit Trails: A Satellite Office's File Share Clean-Up Project Sibyl Schaefer Michael Smorul
Michael Ritter
& David Minor
Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force
Assigning Retention and Disposal Data - Theory Implementation Glen McAninch and Jim Cundy
Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson
Creating an Access Strategy-Theory Implementation Debbie Bahn
Access Partnerships: Washington State Archives' Shared Responsibility Models Mary Beth Herkert
Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards
Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans
Creating a Secure System - Theory Implementation Stan Ahalt
Jay Aikat
Dan Bedard
Margaret Burchinal
Thomas Carsey
Thu-Mai Christian
Jonathan Crabtree
Nancy Dole
Howard Lander
Latanya Sweeney
Mary Whitton
Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans
Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley
Creating a Preservation Strategy -Theory Implementation Bronwen Sprout and Sarah Romkey
Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti
What will Trustworthy Systems Look Like in the Future? Nancy McGovern
Current Status of Trustworthy Systems