SlideShare une entreprise Scribd logo
1  sur  22
Digital Preservation Tools for
             Repository Managers
                 A practical course in five parts
                presented by the KeepIt project
                      in association with



Module 4, Putting storage, format management and preservation planning in the repository
                      University of Southampton, 18-19 March 2010
               Twitter hashtag #dprc(digital preservation repository course)
Course structure
• Module 1. Organisational issues
  Scoping, selection, assessment, institutional parameters (19
  January)
• Module 2. CostsLifecycle costs for managing digital objects, based
  on the LIFE approach, and institutional costs (5 February)
• Module 3. Description Describing content for preservation:
  provenance, significant properties and preservation metadata (2
  March)
• Module 4. Preservation workflow tools available in
  EPrints for format management, risk assessment
  and storage, and linked to the Plato planning tool
  from Planets (TODAY)
• Module 5. Trust (by others) of the repository’s approach to
  preservation; trust (by the repository) of the tools and services it
  chooses (30th March)
Tools this module

• Eprints preservation apps, including the
  storage controller, Dave Tarrant and
  Adam Field, University of Southampton

• Plato, preservation planning tool from the
  Planets project, Andreas Rauber and
  HannesKulovits, TU Wien
Steve Jobs launches Apple iPad




   Picture by curiouslee http://www.flickr.com/photos/curiouslee/4320074421/
Steve Jobs launches Apple iPad



“75 million people
already own iPod
Touches and
iPhones. That's all
people who
already know how
to use the iPad.”


     Picture by curiouslee http://www.flickr.com/photos/curiouslee/4320074421/
Some revision from KeepIt Module 3
• Preservation workflow
Preservation workflow
             Check                     Analyse                  Action




                •Format    Preservation planning            •Migration
identification, version    Characterisation:                • Emulation
                     ing   Significant properties and       • Storage selection
       • File validation   technical
          • Virus check    characteristics, provenance, for
    • Bit checking and     mat, risk factors
 checksum calculation
                           Risk analysis
                  Tools
                           Tools
            e.g. DROID
                           Plato (Planets)
                 JHOVE
                           PRONOM (TNA)
                   FITS
                           P2 risk registry (KeepIt)
                           INFORM (U Illinois)
Format risks
1000 Ubiquity: degree of adoption of the format
1001 Support: number of tools available which can access the format
1002 Disclosure: extent to which the format documentation is publicly
disclosed
1003 Document Quality: completeness of the available documentation
1004 Stability: speed and backwards-compatibility of version change
1005 Ease of identification: ease with which the format can be identified
1006 Ease of validation: ease with which the format can be validated
1007Lossiness: does the format use lossy compression
1008 Intellectual property rights: whether or not the format is
encumbered by IPR
1009 Complexity: degree of content or behavioural complexity supported

              From PRONOM documentation (The National Archives), July 2008
Format risks
                          Word vs PDF    TIFF vs JPEG     XML vs PDF
1000 Ubiquity                        1                1              1
1001 Support                         1                     1
1002 Disclosure
1003 Document Quality
1004 Stability                             1               1
1005 Ease of
identification
1006 Ease of validation              1                     1
1007Lossiness                              1               1
1008 Intellectual                                          1
property rights
1009 Complexity            1               1               1
The WINNER is                  PDF             TIFF            XML
A group task on format risks
1.   Choose two formats to compare (e.g. Word vs PDF,
     Word vs ODF, PDF vs XML, TIFF vs JPEG)
2.   By working through the (surviving) list of format risks
     select a winner (or a draw) between your chosen
     formats for each risk category (1 point for win)
3.   Total the scores to find an overall winning format
4. Suggest one reason why the winning
   format using this method may not be
   the one you would choose for your
   repository
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
• Significant properties
InSPECT SP Assessment
     Framework
     •Builds on Gero’sFunction-Behaviour-Structure framework
     •FBS developed to assist engineers/designers to create &
     redesign artefacts
     Three categories:
        • Function: The design intention or purpose that is
          performed.
        • Behaviour: The epistemological outcome derived from the
          function & structure obtained by the stakeholder
        • Structure: The structural elements of the Object that
          enables stakeholder to perform behaviour.
     •Artefact construction is product of designated function.
     •Behaviour is result of interaction between Function & Structure
13
Exercise overview
      • Analyse the content of an email
        • Analyse structure of email message
        • Determine purpose that each technical
          property performs


      • Consider how email will be used by
        stakeholders
        • Identify set of expected behaviours
        • Classify set of behaviours into functions for
          recording
14


 Select object type                        Identify purpose of   Determine expected   Classify behaviours   Associate structure
                      Analyse structure                                                                                            Review & finalise
    for analysis                          technical properties       behaviours          into functions     with each function


                                                                                         Behaviour                                    Structure
                                                                                                                                         subject

           Determine expected behaviours                                                                                             Message text

                  • What activities would a user – any type of                                                                         Line break
                    stakeholder – perform when using an
                    email?                                                                                                             Paragraph


                  • Draw upon list of property descriptions                                                                            underline

                    performed in the previous step, formal                                                                           strikethrough

                    standards and specifications, or other                                                                         Body background
                    information sources.
                                                                                                                                    Body text colour

                                                                                                                                       In-reply-to


           Task 2:                                                                                                                     references

                                                                                                                                      Message-id

           Identify the type of actions that a user                                                                                   Trace-route

           would be able to perform using the                                                                                     Sender display-name

           email (Groups. 15 mins).                                                                                                Sender local-part

                                                                                                                                  Sender domain-part


                  • E.g. Establish name of person who sent                                                                          Recipient display-
                    email                                                                                                                 name

                  • E.g. May want to confirm that email                                                                            Recipient local-part
                                                                                                                                   Recipient domain-
                    originated from stated source.                                                                                        part




15
1.3 cont. Categories of
     properties
     Five high-level categories
     •Content e.g. character count
     •Context e.g. date of creation
     •Rendering e.g. bit depth
     •Structure e.g. e-mail attachments
     •Behaviour e.g. hyperlinks
16

                           Select object type(s)   Determine actual   Classify behaviours into                           Assign acceptable
 Identify stakeholder                                                                            Cross-match functions                       Review & finalise
                               for analysis          behaviours           set of functions                               value boundaries




             •Identify Stakeholders
             •Creator – view, annotate
                        • Researcher corresponds during research with
                          colleagues, peers, administrators etc.
             •Recipient – reuses content
                        • Student wants to understand research lifecycles by
                          studying real-world practice
             •Custodian – evidential chain
                        • Maintains permanent email record for externally-
                          funded projects, alongside data and eprint outputs

17
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
• Significant properties
   – We considered which characteristics might be significant using the function-
     behaviour-structure (FBS) framework, and classifying the functions of
     formatted emails
   – We recognised that assessment of behaviour, and so of significance, can vary
     according to the viewpoint of the stakeholder – e.g. creator, user, archivist
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
• Significant properties
   – We considered which characteristics might be significant using the function-
     behaviour-structure (FBS) framework, and classifying the functions of
     formatted emails
   – We recognised that assessment of behaviour, and so of significance, can vary
     according to the viewpoint of the stakeholder – e.g. creator, user, archivist
• Documentation
   – We looked at two means to document these characteristics, and the changes
      over time
   1. Broad and established (PREMIS)
   2. Focussed, and work-in-progress (Open Provenance Model)
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
• Significant properties
   – We considered which characteristics might be significant using the function-
     behaviour-structure (FBS) framework, and classifying the functions of
     formatted emails
   – We recognised that assessment of behaviour, and so of significance, can vary
     according to the viewpoint of the stakeholder – e.g. creator, user, archivist
• Documentation
   – We looked at two means to document these characteristics, and the changes
      over time
   1. Broad and established (PREMIS)
   2. Focussed, and work-in-progress (Open Provenance Model)
• Provenance in action: transmission and recording
Provenance: a numbers game




• Transmission: recording vs word-of-mouth
• Identifying what is significant about the information to be transmitted
• Can be self-correcting!
Some revision from KeepIt Module 3
• Preservation workflow
   – Recognised we have digital objects with formats and other characteristics we
     need to identify and record. These can change over time, or may need to be
     changed pre-emptively depending on a risk assessment, using a preservation
     action. Risk is subjective.
• Significant properties
   – We considered which characteristics might be significant using the function-
     behaviour-structure (FBS) framework, and classifying the functions of
     formatted emails
   – We recognised that assessment of behaviour, and so of significance, can vary
     according to the viewpoint of the stakeholder – e.g. creator, user, archivist
• Documentation
   – We looked at two means to document these characteristics, and the changes
      over time
   1. Broad and established (PREMIS)
   2. Focussed, and work-in-progress (Open Provenance Model)
• Provenance in action: transmission and recording
    – Through a simple game we learned that if we don’t recognise the necessary
      properties at the outset, and maintain a record through all stages of
      transmission, the information at the end of the chain will likely not be the
      same as you started with

Contenu connexe

En vedette

KeepIt Course 2: preservation costs
KeepIt Course 2: preservation costsKeepIt Course 2: preservation costs
KeepIt Course 2: preservation costsJISC KeepIt project
 
Keepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseKeepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseJISC KeepIt project
 
Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...JISC KeepIt project
 
Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...JISC KeepIt project
 
EPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningEPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningJISC KeepIt project
 
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010JISC KeepIt project
 
Preserving our Past: Saving and Sharing Tri Sigma's History
Preserving our Past: Saving and Sharing Tri Sigma's HistoryPreserving our Past: Saving and Sharing Tri Sigma's History
Preserving our Past: Saving and Sharing Tri Sigma's HistoryElizabeth Johns
 
المستودعات الرقمية للرفع
المستودعات الرقمية للرفعالمستودعات الرقمية للرفع
المستودعات الرقمية للرفعGhadah Mosaed
 
Smithsonian Trustworthy Digital Repository Roundtable
Smithsonian Trustworthy Digital Repository RoundtableSmithsonian Trustworthy Digital Repository Roundtable
Smithsonian Trustworthy Digital Repository RoundtableKara Van Malssen
 
Archivematica integration handshaking towards comprehensive digital preserva...
Archivematica integration  handshaking towards comprehensive digital preserva...Archivematica integration  handshaking towards comprehensive digital preserva...
Archivematica integration handshaking towards comprehensive digital preserva...Artefactual Systems - Archivematica
 
Binary Trees? Automatically identifying the links between born-digital records
Binary Trees? Automatically identifying the links between born-digital recordsBinary Trees? Automatically identifying the links between born-digital records
Binary Trees? Automatically identifying the links between born-digital recordsRoss Spencer
 
Planning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive ProjectsPlanning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive Projectsac2182
 
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...Lucas Jellema
 

En vedette (18)

KeepIt Course 2: preservation costs
KeepIt Course 2: preservation costsKeepIt Course 2: preservation costs
KeepIt Course 2: preservation costs
 
Keepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseKeepit Course 5: Concluding the course
Keepit Course 5: Concluding the course
 
Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...
 
Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...
 
EPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningEPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation Planning
 
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
 
Preserving our Past: Saving and Sharing Tri Sigma's History
Preserving our Past: Saving and Sharing Tri Sigma's HistoryPreserving our Past: Saving and Sharing Tri Sigma's History
Preserving our Past: Saving and Sharing Tri Sigma's History
 
المستودعات الرقمية للرفع
المستودعات الرقمية للرفعالمستودعات الرقمية للرفع
المستودعات الرقمية للرفع
 
KeepIt
KeepItKeepIt
KeepIt
 
Smithsonian Trustworthy Digital Repository Roundtable
Smithsonian Trustworthy Digital Repository RoundtableSmithsonian Trustworthy Digital Repository Roundtable
Smithsonian Trustworthy Digital Repository Roundtable
 
Archivematica integration handshaking towards comprehensive digital preserva...
Archivematica integration  handshaking towards comprehensive digital preserva...Archivematica integration  handshaking towards comprehensive digital preserva...
Archivematica integration handshaking towards comprehensive digital preserva...
 
Towards a Common Approach for Access to Digital Archival Records in Europe. A...
Towards a Common Approach for Access to Digital Archival Records in Europe. A...Towards a Common Approach for Access to Digital Archival Records in Europe. A...
Towards a Common Approach for Access to Digital Archival Records in Europe. A...
 
Jussi Nuorteva - Power of Open Data in Archives
Jussi Nuorteva - Power of Open Data in Archives Jussi Nuorteva - Power of Open Data in Archives
Jussi Nuorteva - Power of Open Data in Archives
 
Binary Trees? Automatically identifying the links between born-digital records
Binary Trees? Automatically identifying the links between born-digital recordsBinary Trees? Automatically identifying the links between born-digital records
Binary Trees? Automatically identifying the links between born-digital records
 
Digital Preservation with Archivematica
Digital Preservation with ArchivematicaDigital Preservation with Archivematica
Digital Preservation with Archivematica
 
Planning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive ProjectsPlanning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive Projects
 
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...
Oracle OpenWorld 2016 Review - High Level Overview of major themes and grand ...
 
Strategic directions in electronic records management and electronic archivin...
Strategic directions in electronic records management and electronic archivin...Strategic directions in electronic records management and electronic archivin...
Strategic directions in electronic records management and electronic archivin...
 

Similaire à Digital Preservation Tools for Repository Managers

Preservation Planning: Choosing a suitable digital preservation strategy
Preservation Planning: Choosing a suitable digital preservation strategyPreservation Planning: Choosing a suitable digital preservation strategy
Preservation Planning: Choosing a suitable digital preservation strategyGarethKnight
 
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...JISC KeepIt project
 
Establishing the significant properties of digital research
Establishing the significant properties of digital researchEstablishing the significant properties of digital research
Establishing the significant properties of digital researchGarethKnight
 
Business requirement analysis session 5
Business requirement analysis   session 5Business requirement analysis   session 5
Business requirement analysis session 5sampad_senapati
 
Machine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search EngineMachine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search EngineSalford Systems
 
Spectrum Scale - Cognitive
Spectrum Scale - CognitiveSpectrum Scale - Cognitive
Spectrum Scale - CognitiveSmita Raut
 
Agile comparison with requriement approaches
Agile comparison with requriement approachesAgile comparison with requriement approaches
Agile comparison with requriement approachesfungfung Chen
 
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...Stuart Wrigley
 
Same as it ever was? Significant Properties and the preservation of meaning o...
Same as it ever was? Significant Properties and the preservation of meaning o...Same as it ever was? Significant Properties and the preservation of meaning o...
Same as it ever was? Significant Properties and the preservation of meaning o...GarethKnight
 
Automatic Term Recognition with Apache Solr
Automatic Term Recognition with Apache SolrAutomatic Term Recognition with Apache Solr
Automatic Term Recognition with Apache SolrJIE GAO
 
Application scenarios in streaming oriented embedded-system design
Application scenarios in streaming oriented embedded-system designApplication scenarios in streaming oriented embedded-system design
Application scenarios in streaming oriented embedded-system designMr. Chanuwan
 
Reengineering PDF-Based Documents Targeting Complex Software Specifications
Reengineering PDF-Based Documents Targeting Complex Software SpecificationsReengineering PDF-Based Documents Targeting Complex Software Specifications
Reengineering PDF-Based Documents Targeting Complex Software SpecificationsMoutasm Tamimi
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysisasimnawaz54
 

Similaire à Digital Preservation Tools for Repository Managers (20)

Preservation Planning: Choosing a suitable digital preservation strategy
Preservation Planning: Choosing a suitable digital preservation strategyPreservation Planning: Choosing a suitable digital preservation strategy
Preservation Planning: Choosing a suitable digital preservation strategy
 
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
 
Establishing the significant properties of digital research
Establishing the significant properties of digital researchEstablishing the significant properties of digital research
Establishing the significant properties of digital research
 
Ims and qti assessment
Ims and qti assessmentIms and qti assessment
Ims and qti assessment
 
Business requirement analysis session 5
Business requirement analysis   session 5Business requirement analysis   session 5
Business requirement analysis session 5
 
Machine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search EngineMachine Learned Relevance at A Large Scale Search Engine
Machine Learned Relevance at A Large Scale Search Engine
 
Spectrum Scale - Cognitive
Spectrum Scale - CognitiveSpectrum Scale - Cognitive
Spectrum Scale - Cognitive
 
Keepit Course 5: Revision
Keepit Course 5: RevisionKeepit Course 5: Revision
Keepit Course 5: Revision
 
Memory models in c#
Memory models in c#Memory models in c#
Memory models in c#
 
Agile comparison with requriement approaches
Agile comparison with requriement approachesAgile comparison with requriement approaches
Agile comparison with requriement approaches
 
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...
Infrastructure and Workflow for the Formal Evaluation of Semantic Search Tech...
 
Integrated Multimedia Indexing and Retrieval
Integrated Multimedia Indexing and RetrievalIntegrated Multimedia Indexing and Retrieval
Integrated Multimedia Indexing and Retrieval
 
Same as it ever was? Significant Properties and the preservation of meaning o...
Same as it ever was? Significant Properties and the preservation of meaning o...Same as it ever was? Significant Properties and the preservation of meaning o...
Same as it ever was? Significant Properties and the preservation of meaning o...
 
Automatic Term Recognition with Apache Solr
Automatic Term Recognition with Apache SolrAutomatic Term Recognition with Apache Solr
Automatic Term Recognition with Apache Solr
 
653 656
653 656653 656
653 656
 
Question bank unit i
Question bank unit iQuestion bank unit i
Question bank unit i
 
Application scenarios in streaming oriented embedded-system design
Application scenarios in streaming oriented embedded-system designApplication scenarios in streaming oriented embedded-system design
Application scenarios in streaming oriented embedded-system design
 
Reengineering PDF-Based Documents Targeting Complex Software Specifications
Reengineering PDF-Based Documents Targeting Complex Software SpecificationsReengineering PDF-Based Documents Targeting Complex Software Specifications
Reengineering PDF-Based Documents Targeting Complex Software Specifications
 
Metadata For Preservation Delos
Metadata For Preservation DelosMetadata For Preservation Delos
Metadata For Preservation Delos
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 

Plus de JISC KeepIt project

KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...JISC KeepIt project
 
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberPreservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberJISC KeepIt project
 
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...JISC KeepIt project
 
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...JISC KeepIt project
 
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauKeepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauJISC KeepIt project
 
KeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesKeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesJISC KeepIt project
 
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...JISC KeepIt project
 
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...JISC KeepIt project
 
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...JISC KeepIt project
 
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...JISC KeepIt project
 
KeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowKeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowJISC KeepIt project
 
KeepIt Course 3: primer on preservation workflow, formats and characterisation
KeepIt Course 3: primer on preservation workflow, formats and characterisationKeepIt Course 3: primer on preservation workflow, formats and characterisation
KeepIt Course 3: primer on preservation workflow, formats and characterisationJISC KeepIt project
 
LIFE3: Predicting Long Term Preservation Costs, by Brian Hole
LIFE3: Predicting Long Term Preservation Costs, by Brian HoleLIFE3: Predicting Long Term Preservation Costs, by Brian Hole
LIFE3: Predicting Long Term Preservation Costs, by Brian HoleJISC KeepIt project
 
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil Beagrie
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil BeagrieCosts, Policy, and Benefits in Long-term Digital Preservation, by Neil Beagrie
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil BeagrieJISC KeepIt project
 
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentThe AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentJISC KeepIt project
 
DAF group exercise: scoping data and curation requirements, by Sarah Jones
DAF group exercise: scoping data and curation requirements, by Sarah JonesDAF group exercise: scoping data and curation requirements, by Sarah Jones
DAF group exercise: scoping data and curation requirements, by Sarah JonesJISC KeepIt project
 
The DAF at Southampton, by Harry Gibbs
The DAF at Southampton, by Harry GibbsThe DAF at Southampton, by Harry Gibbs
The DAF at Southampton, by Harry GibbsJISC KeepIt project
 
Using DAF as a Data Scoping Tool, by Sarah Jones
Using DAF as a Data Scoping Tool, by Sarah JonesUsing DAF as a Data Scoping Tool, by Sarah Jones
Using DAF as a Data Scoping Tool, by Sarah JonesJISC KeepIt project
 
KeepIt Course 1: Digital Preservation Tools for Repository Managers
KeepIt Course 1: Digital Preservation Tools for Repository ManagersKeepIt Course 1: Digital Preservation Tools for Repository Managers
KeepIt Course 1: Digital Preservation Tools for Repository ManagersJISC KeepIt project
 

Plus de JISC KeepIt project (20)

KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...
 
Keepit Course 5: Trust
Keepit Course 5: TrustKeepit Course 5: Trust
Keepit Course 5: Trust
 
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberPreservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
 
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
 
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
 
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauKeepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
 
KeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesKeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to Repositories
 
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
 
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
 
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
 
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
 
KeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowKeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflow
 
KeepIt Course 3: primer on preservation workflow, formats and characterisation
KeepIt Course 3: primer on preservation workflow, formats and characterisationKeepIt Course 3: primer on preservation workflow, formats and characterisation
KeepIt Course 3: primer on preservation workflow, formats and characterisation
 
LIFE3: Predicting Long Term Preservation Costs, by Brian Hole
LIFE3: Predicting Long Term Preservation Costs, by Brian HoleLIFE3: Predicting Long Term Preservation Costs, by Brian Hole
LIFE3: Predicting Long Term Preservation Costs, by Brian Hole
 
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil Beagrie
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil BeagrieCosts, Policy, and Benefits in Long-term Digital Preservation, by Neil Beagrie
Costs, Policy, and Benefits in Long-term Digital Preservation, by Neil Beagrie
 
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentThe AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
 
DAF group exercise: scoping data and curation requirements, by Sarah Jones
DAF group exercise: scoping data and curation requirements, by Sarah JonesDAF group exercise: scoping data and curation requirements, by Sarah Jones
DAF group exercise: scoping data and curation requirements, by Sarah Jones
 
The DAF at Southampton, by Harry Gibbs
The DAF at Southampton, by Harry GibbsThe DAF at Southampton, by Harry Gibbs
The DAF at Southampton, by Harry Gibbs
 
Using DAF as a Data Scoping Tool, by Sarah Jones
Using DAF as a Data Scoping Tool, by Sarah JonesUsing DAF as a Data Scoping Tool, by Sarah Jones
Using DAF as a Data Scoping Tool, by Sarah Jones
 
KeepIt Course 1: Digital Preservation Tools for Repository Managers
KeepIt Course 1: Digital Preservation Tools for Repository ManagersKeepIt Course 1: Digital Preservation Tools for Repository Managers
KeepIt Course 1: Digital Preservation Tools for Repository Managers
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Digital Preservation Tools for Repository Managers

  • 1. Digital Preservation Tools for Repository Managers A practical course in five parts presented by the KeepIt project in association with Module 4, Putting storage, format management and preservation planning in the repository University of Southampton, 18-19 March 2010 Twitter hashtag #dprc(digital preservation repository course)
  • 2. Course structure • Module 1. Organisational issues Scoping, selection, assessment, institutional parameters (19 January) • Module 2. CostsLifecycle costs for managing digital objects, based on the LIFE approach, and institutional costs (5 February) • Module 3. Description Describing content for preservation: provenance, significant properties and preservation metadata (2 March) • Module 4. Preservation workflow tools available in EPrints for format management, risk assessment and storage, and linked to the Plato planning tool from Planets (TODAY) • Module 5. Trust (by others) of the repository’s approach to preservation; trust (by the repository) of the tools and services it chooses (30th March)
  • 3. Tools this module • Eprints preservation apps, including the storage controller, Dave Tarrant and Adam Field, University of Southampton • Plato, preservation planning tool from the Planets project, Andreas Rauber and HannesKulovits, TU Wien
  • 4. Steve Jobs launches Apple iPad Picture by curiouslee http://www.flickr.com/photos/curiouslee/4320074421/
  • 5. Steve Jobs launches Apple iPad “75 million people already own iPod Touches and iPhones. That's all people who already know how to use the iPad.” Picture by curiouslee http://www.flickr.com/photos/curiouslee/4320074421/
  • 6. Some revision from KeepIt Module 3 • Preservation workflow
  • 7. Preservation workflow Check Analyse Action •Format Preservation planning •Migration identification, version Characterisation: • Emulation ing Significant properties and • Storage selection • File validation technical • Virus check characteristics, provenance, for • Bit checking and mat, risk factors checksum calculation Risk analysis Tools Tools e.g. DROID Plato (Planets) JHOVE PRONOM (TNA) FITS P2 risk registry (KeepIt) INFORM (U Illinois)
  • 8. Format risks 1000 Ubiquity: degree of adoption of the format 1001 Support: number of tools available which can access the format 1002 Disclosure: extent to which the format documentation is publicly disclosed 1003 Document Quality: completeness of the available documentation 1004 Stability: speed and backwards-compatibility of version change 1005 Ease of identification: ease with which the format can be identified 1006 Ease of validation: ease with which the format can be validated 1007Lossiness: does the format use lossy compression 1008 Intellectual property rights: whether or not the format is encumbered by IPR 1009 Complexity: degree of content or behavioural complexity supported From PRONOM documentation (The National Archives), July 2008
  • 9. Format risks Word vs PDF TIFF vs JPEG XML vs PDF 1000 Ubiquity 1 1 1 1001 Support 1 1 1002 Disclosure 1003 Document Quality 1004 Stability 1 1 1005 Ease of identification 1006 Ease of validation 1 1 1007Lossiness 1 1 1008 Intellectual 1 property rights 1009 Complexity 1 1 1 The WINNER is PDF TIFF XML
  • 10. A group task on format risks 1. Choose two formats to compare (e.g. Word vs PDF, Word vs ODF, PDF vs XML, TIFF vs JPEG) 2. By working through the (surviving) list of format risks select a winner (or a draw) between your chosen formats for each risk category (1 point for win) 3. Total the scores to find an overall winning format 4. Suggest one reason why the winning format using this method may not be the one you would choose for your repository
  • 11. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective.
  • 12. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective. • Significant properties
  • 13. InSPECT SP Assessment Framework •Builds on Gero’sFunction-Behaviour-Structure framework •FBS developed to assist engineers/designers to create & redesign artefacts Three categories: • Function: The design intention or purpose that is performed. • Behaviour: The epistemological outcome derived from the function & structure obtained by the stakeholder • Structure: The structural elements of the Object that enables stakeholder to perform behaviour. •Artefact construction is product of designated function. •Behaviour is result of interaction between Function & Structure 13
  • 14. Exercise overview • Analyse the content of an email • Analyse structure of email message • Determine purpose that each technical property performs • Consider how email will be used by stakeholders • Identify set of expected behaviours • Classify set of behaviours into functions for recording 14
  • 15.  Select object type Identify purpose of Determine expected Classify behaviours Associate structure Analyse structure Review & finalise for analysis technical properties behaviours into functions with each function Behaviour Structure subject Determine expected behaviours Message text • What activities would a user – any type of Line break stakeholder – perform when using an email? Paragraph • Draw upon list of property descriptions underline performed in the previous step, formal strikethrough standards and specifications, or other Body background information sources. Body text colour In-reply-to Task 2: references Message-id Identify the type of actions that a user Trace-route would be able to perform using the Sender display-name email (Groups. 15 mins). Sender local-part Sender domain-part • E.g. Establish name of person who sent Recipient display- email name • E.g. May want to confirm that email Recipient local-part Recipient domain- originated from stated source. part 15
  • 16. 1.3 cont. Categories of properties Five high-level categories •Content e.g. character count •Context e.g. date of creation •Rendering e.g. bit depth •Structure e.g. e-mail attachments •Behaviour e.g. hyperlinks 16
  • 17. Select object type(s) Determine actual Classify behaviours into Assign acceptable Identify stakeholder Cross-match functions Review & finalise for analysis behaviours set of functions value boundaries •Identify Stakeholders •Creator – view, annotate • Researcher corresponds during research with colleagues, peers, administrators etc. •Recipient – reuses content • Student wants to understand research lifecycles by studying real-world practice •Custodian – evidential chain • Maintains permanent email record for externally- funded projects, alongside data and eprint outputs 17
  • 18. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective. • Significant properties – We considered which characteristics might be significant using the function- behaviour-structure (FBS) framework, and classifying the functions of formatted emails – We recognised that assessment of behaviour, and so of significance, can vary according to the viewpoint of the stakeholder – e.g. creator, user, archivist
  • 19. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective. • Significant properties – We considered which characteristics might be significant using the function- behaviour-structure (FBS) framework, and classifying the functions of formatted emails – We recognised that assessment of behaviour, and so of significance, can vary according to the viewpoint of the stakeholder – e.g. creator, user, archivist • Documentation – We looked at two means to document these characteristics, and the changes over time 1. Broad and established (PREMIS) 2. Focussed, and work-in-progress (Open Provenance Model)
  • 20. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective. • Significant properties – We considered which characteristics might be significant using the function- behaviour-structure (FBS) framework, and classifying the functions of formatted emails – We recognised that assessment of behaviour, and so of significance, can vary according to the viewpoint of the stakeholder – e.g. creator, user, archivist • Documentation – We looked at two means to document these characteristics, and the changes over time 1. Broad and established (PREMIS) 2. Focussed, and work-in-progress (Open Provenance Model) • Provenance in action: transmission and recording
  • 21. Provenance: a numbers game • Transmission: recording vs word-of-mouth • Identifying what is significant about the information to be transmitted • Can be self-correcting!
  • 22. Some revision from KeepIt Module 3 • Preservation workflow – Recognised we have digital objects with formats and other characteristics we need to identify and record. These can change over time, or may need to be changed pre-emptively depending on a risk assessment, using a preservation action. Risk is subjective. • Significant properties – We considered which characteristics might be significant using the function- behaviour-structure (FBS) framework, and classifying the functions of formatted emails – We recognised that assessment of behaviour, and so of significance, can vary according to the viewpoint of the stakeholder – e.g. creator, user, archivist • Documentation – We looked at two means to document these characteristics, and the changes over time 1. Broad and established (PREMIS) 2. Focussed, and work-in-progress (Open Provenance Model) • Provenance in action: transmission and recording – Through a simple game we learned that if we don’t recognise the necessary properties at the outset, and maintain a record through all stages of transmission, the information at the end of the chain will likely not be the same as you started with