Building Trustworthy Digital Repositories
Autor Philip C. Bantinen Limba Engleză Paperback – 30 iun 2016
Preț: 516.82 lei
Preț vechi: 671.20 lei
-23% Nou
Puncte Express: 775
Preț estimativ în valută:
98.91€ • 102.74$ • 82.16£
98.91€ • 102.74$ • 82.16£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781442263789
ISBN-10: 1442263784
Pagini: 300
Dimensiuni: 152 x 229 x 27 mm
Greutate: 0.54 kg
Editura: Rowman & Littlefield
ISBN-10: 1442263784
Pagini: 300
Dimensiuni: 152 x 229 x 27 mm
Greutate: 0.54 kg
Editura: Rowman & Littlefield
Notă biografică
Cuprins
Foreword by Gregory Hunter
Chapter 1: Evaluating and Selecting a Trustworthy Repository
Theory
Philip C. Bantin, What is a Trustworthy Repository? ¿ Theory
Implementation
Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration
Chapter 2: Resources, Policies and Management Structures
Theory
Philip C. Bantin, Resources, Policies and Management Structures ¿ Theory
Implementation
Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository
Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives
Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness
Chapter 3: Building a Trustworthy System: Ingest Process
Theory
Lisa Schmidt, Ingest Process¿Theory
Implementation
Cynthia Ghering, Ingest Process: Michigan State University¿s Digital Archives Program
Jared Lyle, Ingest Process: Submission and `Pre-Ingest¿ Activities
Giovanni Michetti, Submission Agreement in the eHealth Domain
Chapter 4: Creating and Capturing Metadata
Theory
Philip C. Bantin, Creating and Capturing Metadata: Theory
Implementation
Mimi Dionne, Adventures in Metadata: A Satellite Office¿s File Share Clean-Up Project
Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study
Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata
Chapter 5: Capturing Audit Trail Data
Theory
Daniel Noonan, Authenticity and Audit Trails - Theory
Implementation
Mimi Dionne, Adventures in Audit Trails: A Satellite Office¿s File Share Clean-Up Project
Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System
Chapter 6: Assigning Retention and Disposal Data
Theory
Donald Force, Assigning Retention and Disposal Data ¿ Theory
Implementation
Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives
Chapter 7: Creating an Access Strategy
Theory
Kris Stenson, Creating an Access Strategy-Theory
Implementation
Debbie Bahn, Access Partnerships: Washington State Archives¿ Shared Responsibility Models
Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS)
Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository
Chapter 8: Creating a Secure System
Theory
Lois Evans, Creating a Secure System ¿ Theory
Implementation
Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion
Chapter 9: Creating a Preservation Strategy
Theory
Lori J. Ashley, Creating a Preservation Strategy ¿Theory
Implementation
Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica
Chapter 10: Trustworthy Systems: Current Status and Future Directions
Luciana Duranti, What will Trustworthy Systems Look Like in the Future?
Nancy McGovern, Current Status of Trustworthy Systems