Preserving repository content practical tools for repository managers…

Preserving repository content: practical tools for repository managers :

“The stated aim of many repositories is to provide permanent open access to their content. However, relatively few repositories have implemented practical action plans towards permanence. Repository managers often lack time and confidence to tackle the important but scary problem of preservation.
Written by, and aimed at, repository managers, this paper describes how the JISC-funded KeepIt project has been bringing together existing preservation tools and services with appropriate training and advice to enable repository managers to formulate practical and achievable preservation plans.
Three elements of the KeepIt project are described:
1. The initial, exploratory phase in which repository managers and a preservation specialist established the current status of each repository and its preservation objectives;
2. The repository-specific KeepIt preservation training course which covered the organisational and financial framework of repository preservation; metadata; the new preservation tools; and issues of trust between repository, users and services;
3. The application of tools and lessons learned from the training course to four exemplar repositories and the impact that this has made.
The paper concludes by recommending practical steps that all repository managers may take to ensure their repositories are preservation-ready.”

URL : http://journals.tdl.org/jodi/article/view/1767

Characterising and Preserving Digital Repositories: File Format Profiles

Steve Hitchcock and David Tarrant show how file format profiles, the starting point for preservation plans and actions, can also be used to reveal the fingerprints of emerging types of institutional repositories.

URL : http://www.ariadne.ac.uk/issue66/hitchcock-tarrant/

The Dataverse Network®: An Open-Source A…

The Dataverse Network®: An Open-Source Application for Sharing, Discovering and Preserving Data :

“The Dataverse Network is an open-source application for publishing, referencing, extracting and analyzing research data. The main goal of the Dataverse Network is to solve the problems of data sharing through building technologies that enable institutions to reduce the burden for researchers and data publishers, and incentivize them to share their data. By installing Dataverse Network software, an institution is able to host multiple individual virtual archives, called “dataverses” for scholars, research groups, or journals, providing a data publication framework that supports author recognition, persistent citation, data discovery and preservation. Dataverses require no hardware or software costs, nor maintenance or backups by the data owner, but still enable all web visibility and credit to devolve to the data owner.”

URL : http://www.dlib.org/dlib/january11/crosas/01crosas.html

IISH Guidelines for preserving research …

IISH Guidelines for preserving research data: a framework for preserving collaborative data collections for future research :

“Our guidelines highlight the iterative process of data collection, data processing, data analysis and publication of (interim) research results. The iterative process is best analyzed and illustrated by following the dynamics of data collection in online collaboratories. The production of data sets in such large scale data collection projects, typically takes a lot of time, whilst in the meantime research may already be performed on data sub-sets. If this leads to a publication a proper citation is required. Publishers and readers need to know exactly in what stage of the data collection process specific conclusions on these data were drawn. During this iterative process, research data need to be maintained, managed and disseminated in different forms and versions during the successive stages of the work carried out, in order to validate the outcomes and research results. These practices drive the requirements for data archiving and show that data archiving is not a once off data transfer transaction or even a linear process. Therefore from the perspective of the research process, we recommend the interconnection and interfacing between data collection and data archiving, in order to ensure the most effective and loss-less preservation of the research data.”

URL : http://www.surffoundation.nl/nl/themas/openonderzoek/cris/Documents/SURFshare_Collectioneren_Guidelines_IISH_DEF.pdf

Designing and Implementing Second Generation Digital Preservation Services: A Scalable Model for the Stanford Digital Repository

This paper describes the Stanford Digital Repository (SDR), a large scale, digital preservation system for scholarly materials. It examines the lessons-learned through over five years of development and operational experience.

Building on the knowledge gained, the paper goes on to outline a new repository design and service framework, SDR 2.0, that will address some of the challenges that have emerged. Changes in the environment such as staffing levels and collaborative opportunities are also described.

Finally, the paper includes observations on the general state of the preservation and repository communities, and the emergence of a new generation of systems and strategies in this space.

URL : http://www.dlib.org/dlib/september10/cramer/09cramer.html

Designing Digital Preservation Solutions: A Risk Management-Based Approach

Digital preservation aims to keep digital objects accessible over long periods of time, ensuring the authenticity and integrity of these digital objects. In such complex environments, Risk Management is a key factor in assuring the normal behaviour of systems over time.

Currently, the digital preservation arena commonly uses Risk Management concepts to assess repositories.

In this paper, we intend to go further and propose a perspective where Risk Management can be used not only to assess existing solutions, but also to conceive digital preservation environments.

Thus, we propose a Risk Management-based approach to design and assess digital preservation environments, including:
• the definition of context and identification of strategic objectives to determine specific requirements and characterize which consequences are acceptable within the identified context;
• the identification, analysis and evaluation of threats and vulnerabilities that may affect the normal behaviour of a specific business or the achievement of the goals and conformance to the requirements identified in the context characterization; and,
• definition of actions to deal with the risks associated with the identified threats and vulnerabilities.

We generalize and survey the main requirements, threats, vulnerabilities and techniques that can be applied in the scope of digital preservation.

URL : http://www.ijdc.net/index.php/ijdc/article/view/143