Advanced digital preservation
Titel: | Advanced digital preservation / David Giaretta |
---|---|
Verfasser: | |
Veröffentlicht: | Berlin : Springer, 2011 |
Umfang: | XXII, 510 Seiten : Illustrationen, Diagramme ; 25 cm |
Format: | Buch |
Sprache: | Englisch |
RVK-Notation: |
·
·
|
ISBN: | 9783642168086 ; 3642168086 |
Hinweise zum Inhalt: |
Inhaltstext
Inhaltsverzeichnis |
- 1
- Introduction
- p. 1
- 1.1
- What's So Special About Digital Things?
- p. 2
- 1.2
- Terminology
- p. 5
- 1.3
- Summary
- p. 5
- 2
- The Really Foolproof Solution for Digital Preservation
- p. 7
- Part I
- Theory - The Concepts and Techniques Which Are Essential for Preserving Digitally Encoded Information
- 3
- Introduction to OAIS Concepts and Terminology
- p. 13
- 3.1
- Preserve What, for How Long and for Whom?
- p. 13
- 3.2
- What "Metadata", How Much "Metadata"?
- p. 16
- 3.3
- Recursion - A Pervasive Concept
- p. 26
- 3.4
- Disincentives Against Digital Preservation
- p. 28
- 3.5
- Summary
- p. 30
- 4
- Types of Digital Objects
- p. 31
- 4.1
- Simple vs. Composite
- p. 31
- 4.2
- Rendered vs. Non-rendered
- p. 33
- 4.3
- Static vs. Dynamic
- p. 38
- 4.4
- Active vs. Passive
- p. 38
- 4.5
- Multiple-Classifications
- p. 39
- 4.6
- Summary
- p. 39
- 5
- Threats to Digital Preservation and Possible Solutions
- p. 41
- 5.1
- What Can Be Relied on in the Long-Term?
- p. 43
- 5.2
- What Others Think About Major Threats to Digital Preservation
- p. 44
- 5.3
- Summary
- p. 45
- 6
- OAIS in More Depth
- p. 47
- 6.1
- OAIS Conformance
- p. 49
- 6.2
- OAIS Mandatory Responsibilities
- p. 50
- 6.3
- OAIS Information Model
- p. 53
- 6.4
- OAIS Functional Model
- p. 63
- 6.5
- Information Flows and Layering
- p. 65
- 6.6
- Issues Not Covered in Detail by OAIS
- p. 65
- 6.7
- Summary
- p. 67
- 7
- Understanding a Digital Object: Basic Representation Information
- p. 69
- Co-author Stephen Rankin
- 7.1
- Levels of Application of Representation Information Concept
- p. 69
- 7.2
- Overview of Techniques for Describing Digital Objects
- p. 71
- 7.3
- Structure Representation Information
- p. 75
- 7.4
- Format Identification
- p. 96
- 7.5
- Semantic Representation Information
- p. 97
- 7.6
- Other Representation Information
- p. 101
- 7.7
- Application to Types of Digital Objects
- p. 102
- 7.8
- Virtualisation
- p. 112
- 7.9
- Emulation
- p. 123
- 7.10
- Summary
- p. 137
- 8
- Preservation of Intelligibility of Digital Objects
- p. 139
- Co-authors Yannis Tzitzikas, Yannis Marketakis, and Vassilis Christophides
- 8.1
- On Digital Objects and Dependencies
- p. 139
- 8.2
- A Formal Model for the Intelligibility of Digital Objects
- p. 142
- 8.3
- Modelling and Implementation Frameworks
- p. 163
- 8.4
- Summary
- p. 166
- 9
- Understandability and Usability of Data
- p. 167
- 9.1
- Re-Use of Digital Objects - Interoperability and Preservation
- p. 168
- 9.2
- Use of Existing Software
- p. 171
- 9.3
- Creation of New Software
- p. 173
- 9.4
- Without Software
- p. 173
- 9.5
- Software as the Digital Object Being Preserved
- p. 174
- 9.6
- Digital Archaeology, Digital Forensics and Re-Use
- p. 174
- 9.7
- Multiple Objects
- p. 175
- 9.8
- Summary
- p. 175
- 10
- In Addition to Understanding It - What Is It?: Preservation Description Information
- p. 177
- 10.1
- Introduction
- p. 177
- 10.2
- Fixity Information
- p. 177
- 10.3
- Reference Information
- p. 178
- 10.4
- Context Information
- p. 184
- l0.5
- Provenance Information
- p. 184
- 10.6
- Access Rights Management
- p. 185
- 10.7
- Summary
- p. 190
- 11
- Linking Data and "Metadata": Packaging
- p. 191
- 11.1
- Information Packaging Overview
- p. 191
- 11.2
- Archival Information Packaging
- p. 192
- 11.3
- XFDU
- p. 193
- 11.4
- Summary
- p. 196
- 12
- Basic Preservation Strategies
- p. 197
- 12.1
- Description - Adding Representation Information
- p. 198
- 12.2
- Maintaining Access
- p. 198
- 12.3
- Migration/Transformation
- p. 200
- 12.4
- Summary
- p. 202
- 13
- Authenticity
- p. 203
- 13.1
- Background to Authenticity
- p. 204
- 13.2
- OAIS Definition of Authenticity
- p. 205
- 13.3
- Elements of the Authenticity Conceptual Model
- p. 208
- 13.4
- Overall Authenticity Model
- p. 212
- 13.5
- Authenticity Evidence
- p. 214
- 13.6
- Significant Properties
- p. 214
- 13.7
- Prototype Authenticity Evidence Capture Tool
- p. 221
- 13.8
- Summary
- p. 232
- 14
- Advanced Preservation Analysis
- p. 233
- Co-author Esther Conway
- 14.1
- Preliminary Investigation of Data Holdings
- p. 234
- 14.2
- Stakeholder and Archive Analysis
- p. 235
- 14.3
- Defining a Preservation Objective
- p. 237
- 14.4
- Defining a Designated User Community
- p. 238
- 14.5
- Preservation Information Flows
- p. 240
- 14.6
- Preservation Strategy Topics
- p. 243
- 14.7
- Preservation Plans
- p. 245
- 14.8
- Cost/Benefit/Risk Analysis
- p. 245
- 14.9
- Preservation Analysis Summary
- p. 246
- 14.10
- Preservation Analysis and Representation Information in More Detail
- p. 246
- 14.11
- Network Modelling Approach
- p. 247
- 14.12
- Summary
- p. 264
- Part II
- Practice - Use and Validation of the Tools and Techniques that Can Be Used for Preserving Digitally Encoded Information
- 15
- Testing Claims About Digital Preservation
- p. 267
- 15.1
- "Accelerated Lifetime" Testing of Digital Preservation Techniques
- p. 267
- 15.2
- Summary
- p. 269
- 16
- Tools for Countering the Threats to Digital Preservation
- p. 271
- 16.1
- Key Preservation Components and Infrastructure
- p. 272
- 16.2
- Discipline Independent Aspects
- p. 276
- 16.3
- Discipline Dependence: Toolboxes/Libraries
- p. 284
- 16.4
- Key Infrastructure Components
- p. 284
- 16.5
- Information Package Management
- p. 285
- 16.6
- Information Access
- p. 287
- 16.7
- Designated Community, Knowledge and Provenance Management
- p. 287
- 16.8
- Communication Management
- p. 288
- 16.9
- Security Management
- p. 289
- 17
- The CASPAR Key Components Implementation
- p. 291
- 17.1
- Design Considerations
- p. 291
- 17.2
- Registry/Repository of Representation Information Details
- p. 291
- 17.3
- Virtualizer
- p. 297
- 17.4
- Knowledge Gap Manager
- p. 301
- 17.5
- Preservation Orchestration Manager
- p. 303
- 17.6
- Preservation DataStores
- p. 305
- 17.7
- Data Access and Security
- p. 315
- 17.8
- Digital Rights Management Details
- p. 318
- 17.9
- Find-Finding Manager
- p. 321
- 17.10
- Information Packaging Details
- p. 322
- 17.11
- Authenticity Manager Toolkit
- p. 332
- 17.12
- Representation Information Toolkit
- p. 333
- 17.13
- Key Components - Summary
- p. 335
- 17.14
- Integrated tools
- p. 337
- 18
- Overview of the Testbeds
- p. 341
- 18.1
- Typical Preservation Scenarios
- p. 341
- 18.2
- Generic Criteria and Method to Organise and to Evaluate the Testbeds
- p. 342
- 18.3
- Cross References Between Scenarios and Changes
- p. 343
- 19
- ISTFC Science Testbed
- p. 345
- 19.1
- Dataset Selection
- p. 345
- 19.2
- Challenges Addressed
- p. 345
- 19.3
- Preservation Aims
- p. 347
- 19.4
- Preservation Analysis
- p. 347
- 19.5
- MST RADAR Scenarios
- p. 347
- 19.6
- Ionosonde Data and the WDC Scenarios
- p. 361
- 19.7
- Summary of Testbed Checks
- p. 366
- 20
- European Space Agency Testbed
- p. 367
- 20.1
- Dataset Selection
- p. 369
- 20.2
- Challenge Addressed
- p. 370
- 20.3
- Preservation Aim
- p. 372
- 20.4
- Preservation Analysis
- p. 372
- 20.5
- Scenario ESA1 - Operating System Change
- p. 372
- 20.6
- Additional Workflow Scenarios
- p. 384
- 20.7
- Conclusions
- p. 386
- 21
- Cultural Heritage Testbed
- p. 387
- 21.1
- Dataset Selection
- p. 388
- 21.2
- Challenges Addressed
- p. 396
- 21.3
- Preservation Aim
- p. 396
- 21.4
- Preservation Analysis
- p. 396
- 21.5
- Scenario UNESCO 1: Villa LIVIA
- p. 397
- 21.6
- Related Documentation
- p. 406
- 21.7
- Other Misc Data with a Brief Description
- p. 406
- 21.8
- Glossary
- p. 406
- 22
- Contemporary Performing Arts Testbed
- p. 407
- 22.1
- Historical Introduction to the Issue
- p. 407
- 22.2
- An Insight into Objects
- p. 409
- 22.3
- Challenges of Preservation
- p. 411
- 22.4
- Preserving the Real-Time Processes
- p. 412
- 22.5
- Interactive Multimedia Performance
- p. 419
- 22.6
- CIANTTestbed
- p. 426
- 22.7
- Summary
- p. 428
- Part III
- Is Money Well Spent? Cutting the Cost and Making Sure Money Is Not Wasted
- 23
- Sharing the Effort
- p. 431
- 23.1
- Chain of Preservation
- p. 431
- 23.2
- Mechanisms for Sharing the Burden of Preservation
- p. 431
- 24
- Infrastructure Roadmap
- p. 435
- 24.1
- Requirements for a Science Data Infrastructure
- p. 435
- 24.2
- Possible Financial Infrastructure Concepts and Components
- p. 436
- 24.3
- Possible Organisational and Social Infrastructure Concepts and Components
- p. 437
- 24.4
- Possible Policy Infrastructure Concepts and Components
- p. 446
- 24.5
- Virtualisation of Policies, Resources and Processes
- p. 448
- 24.6
- Technical Science Data Concepts and Components
- p. 449
- 24.7
- Aspects Excluded from This Roadmap
- p. 456
- 24.8
- Relationship to Other Infrastructures
- p. 457
- 24.9
- Summary
- p. 459
- 25
- Who Is Doing a Good Job? Audit and Certification
- p. 461
- 25.1
- Background
- p. 461
- 25.2
- TRAC and Related Documents
- p. 463
- 25.3
- Development of an ISO Accreditation and Certification Process
- p. 464
- 25.4
- Understanding the ISO Trusted Digital Repository Metrics
- p. 465
- 25.5
- Summary
- p. 480
- 26
- Final Thoughts
- p. 481
- References
- p. 483
- Contributors
- p. 495
- Index
- p. 505