- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Andere Kunden interessierten sich auch für
- Developing Librarian Competencies for the Digital Age52,99 €
- Ben RawlinsMobile Technologies in Libraries56,99 €
- Joe J. MarquezLibrary Service Design57,99 €
- Carli SpinaCreating Inclusive Libraries by Applying Universal Design54,99 €
- Margaret E. HendersonData Management86,99 €
- Sarah K. C. MauldinData Visualizations and Infographics61,99 €
- Sara Russell Gonzalez3D Printing85,99 €
-
-
-
Building Trustworthy Digital Repositories: Theory and Implementation combines information on both theory and practice related to creating trustworthy repositories for records into one up-to-date source. This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Produktdetails
- Produktdetails
- Verlag: Rowman & Littlefield Publishers
- Seitenzahl: 390
- Erscheinungstermin: 1. Juli 2016
- Englisch
- Abmessung: 229mm x 152mm x 23mm
- Gewicht: 631g
- ISBN-13: 9781442263789
- ISBN-10: 1442263784
- Artikelnr.: 44733358
- Verlag: Rowman & Littlefield Publishers
- Seitenzahl: 390
- Erscheinungstermin: 1. Juli 2016
- Englisch
- Abmessung: 229mm x 152mm x 23mm
- Gewicht: 631g
- ISBN-13: 9781442263789
- ISBN-10: 1442263784
- Artikelnr.: 44733358
Philip Bantin has been a professional archivist since 1977 and has worked for the last 21 years as university archivist and records manager at Indiana University, Bloomington. Since 1995 Bantin has been actively involved in developing strategies for managing electronic records
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin, What is a Trustworthy Repository?
Theory Implementation Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources, Policies and Management Structures Theory Philip C. Bantin, Resources, Policies and Management Structures
Theory Implementation Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt, Ingest Process
Theory Implementation Cynthia Ghering, Ingest Process: Michigan State University
s Digital Archives Program Jared Lyle, Ingest Process: Submission and `Pre-Ingest
Activities Giovanni Michetti, Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin, Creating and Capturing Metadata: Theory Implementation Mimi Dionne, Adventures in Metadata: A Satellite Office
s File Share Clean-Up Project Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan, Authenticity and Audit Trails - Theory Implementation Mimi Dionne, Adventures in Audit Trails: A Satellite Office
s File Share Clean-Up Project Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force, Assigning Retention and Disposal Data
Theory Implementation Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson, Creating an Access Strategy-Theory Implementation Debbie Bahn, Access Partnerships: Washington State Archives
Shared Responsibility Models Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans, Creating a Secure System
Theory Implementation Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley, Creating a Preservation Strategy
Theory Implementation Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti, What will Trustworthy Systems Look Like in the Future? Nancy McGovern, Current Status of Trustworthy Systems
Theory Implementation Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources, Policies and Management Structures Theory Philip C. Bantin, Resources, Policies and Management Structures
Theory Implementation Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt, Ingest Process
Theory Implementation Cynthia Ghering, Ingest Process: Michigan State University
s Digital Archives Program Jared Lyle, Ingest Process: Submission and `Pre-Ingest
Activities Giovanni Michetti, Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin, Creating and Capturing Metadata: Theory Implementation Mimi Dionne, Adventures in Metadata: A Satellite Office
s File Share Clean-Up Project Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan, Authenticity and Audit Trails - Theory Implementation Mimi Dionne, Adventures in Audit Trails: A Satellite Office
s File Share Clean-Up Project Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force, Assigning Retention and Disposal Data
Theory Implementation Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson, Creating an Access Strategy-Theory Implementation Debbie Bahn, Access Partnerships: Washington State Archives
Shared Responsibility Models Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans, Creating a Secure System
Theory Implementation Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley, Creating a Preservation Strategy
Theory Implementation Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti, What will Trustworthy Systems Look Like in the Future? Nancy McGovern, Current Status of Trustworthy Systems
Foreword by Gregory Hunter Chapter 1: Evaluating and Selecting a Trustworthy Repository Theory Philip C. Bantin, What is a Trustworthy Repository?
Theory Implementation Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources, Policies and Management Structures Theory Philip C. Bantin, Resources, Policies and Management Structures
Theory Implementation Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt, Ingest Process
Theory Implementation Cynthia Ghering, Ingest Process: Michigan State University
s Digital Archives Program Jared Lyle, Ingest Process: Submission and `Pre-Ingest
Activities Giovanni Michetti, Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin, Creating and Capturing Metadata: Theory Implementation Mimi Dionne, Adventures in Metadata: A Satellite Office
s File Share Clean-Up Project Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan, Authenticity and Audit Trails - Theory Implementation Mimi Dionne, Adventures in Audit Trails: A Satellite Office
s File Share Clean-Up Project Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force, Assigning Retention and Disposal Data
Theory Implementation Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson, Creating an Access Strategy-Theory Implementation Debbie Bahn, Access Partnerships: Washington State Archives
Shared Responsibility Models Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans, Creating a Secure System
Theory Implementation Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley, Creating a Preservation Strategy
Theory Implementation Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti, What will Trustworthy Systems Look Like in the Future? Nancy McGovern, Current Status of Trustworthy Systems
Theory Implementation Jim Corridan and Tibaut Houzanme, Selecting an Integrated Records and Preservation Management System for the Indiana Archives and Records Administration Chapter 2: Resources, Policies and Management Structures Theory Philip C. Bantin, Resources, Policies and Management Structures
Theory Implementation Joanne Kaczmarek, Ten Years and Counting: What is Missing from Our Institutional Repository Glen McAninch, Resources, Policies, and Management Structures at the Kentucky Department for Libraries and Archives Erik A. Moore, Resources, Policies, and Management Structures - Understanding Our Trustworthiness Chapter 3: Building a Trustworthy System: Ingest Process Theory Lisa Schmidt, Ingest Process
Theory Implementation Cynthia Ghering, Ingest Process: Michigan State University
s Digital Archives Program Jared Lyle, Ingest Process: Submission and `Pre-Ingest
Activities Giovanni Michetti, Submission Agreement in the eHealth Domain Chapter 4: Creating and Capturing Metadata Theory Philip C. Bantin, Creating and Capturing Metadata: Theory Implementation Mimi Dionne, Adventures in Metadata: A Satellite Office
s File Share Clean-Up Project Cassie Findlay, Creating and Capturing Metadata: An Australian Digital Archives Case Study Jane Gorjevsky and Dina Sokolova, Finding a Black Cat in a Dark Room: Capture and Creation of Usable Metadata Chapter 5: Capturing Audit Trail Data Theory Daniel Noonan, Authenticity and Audit Trails - Theory Implementation Mimi Dionne, Adventures in Audit Trails: A Satellite Office
s File Share Clean-Up Project Sibyl Schaefer Michael Smorul, Michael Ritter, & David Minor, Auditing through Infrastructure Migrations: The Use of the Audit Control Environment (ACE) in the Chronopolis Digital Preservation System Chapter 6: Assigning Retention and Disposal Data Theory Donald Force, Assigning Retention and Disposal Data
Theory Implementation Glen McAninch and Jim Cundy, Records and Archival Management Strategies for Electronic Records Used by the Kentucky Department for Libraries and Archives Chapter 7: Creating an Access Strategy Theory Kris Stenson, Creating an Access Strategy-Theory Implementation Debbie Bahn, Access Partnerships: Washington State Archives
Shared Responsibility Models Mary Beth Herkert, Creating an Access Strategy: The Oregon Records Management Solution (ORMS) Lorraine L. Richards, Determining Access Requirements for a Federal Government Scientific Data Repository Chapter 8: Creating a Secure System Theory Lois Evans, Creating a Secure System
Theory Implementation Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, Mary Whitton, Creating a Secure System - VISR: The Virtual Institute for Social Research Lois Evans, Creating a Secure System: A Roundtable Discussion Chapter 9: Creating a Preservation Strategy Theory Lori J. Ashley, Creating a Preservation Strategy
Theory Implementation Bronwen Sprout and Sarah Romkey, Building a Preservation Strategy Around Archivematica Chapter 10: Trustworthy Systems: Current Status and Future Directions Luciana Duranti, What will Trustworthy Systems Look Like in the Future? Nancy McGovern, Current Status of Trustworthy Systems