78,528 research outputs found
Education alignment
This essay reviews recent developments in embedding data
management and curation skills into information technology,
library and information science, and research-based
postgraduate courses in various national contexts. The essay
also investigates means of joining up formal education with
professional development training opportunities more
coherently. The potential for using professional internships as a
means of improving communication and understanding between
disciplines is also explored. A key aim of this essay is to identify
what level of complementarity is needed across various
disciplines to most effectively and efficiently support the entire
data curation lifecycle
JISC Preservation of Web Resources (PoWR) Handbook
Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008.
The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management communityâ.
The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department
Assessing digital preservation frameworks: the approach of the SHAMAN project
How can we deliver infrastructure capable of supporting the
preservation of digital objects, as well as the services that can be applied to those digital objects, in ways that future unknown systems will understand? A critical problem in developing systems is the process of validating whether the delivered solution effectively reflects the validated requirements. This is a challenge also for the EU-funded SHAMAN project, which aims to develop an integrated preservation framework using grid-technologies for distributed networks of digital preservation systems, for managing the storage, access, presentation, and manipulation of digital objects over time. Recognising this, the project team ensured that alongside the user requirements an assessment framework was developed. This paper presents the assessment of the SHAMAN demonstrators for the memory institution, industrial design and engineering and eScience domains, from the point of view of
userâs needs and fitness for purpose. An innovative synergistic use of TRAC criteria, DRAMBORA risk registry and mitigation strategies, iRODS rules and information system models requirements has been designed, with the underlying goal to define associated policies, rules and state information, and make them wherever possible machine-encodable and enforceable. The described assessment framework can be valuable not only for the implementers of this project preservation framework, but for the wider digital preservation community, because it provides a
holistic approach to assessing and validating the preservation of digital libraries, digital repositories and data centres
Modelling long term digital preservation costs: a scientific data case study
In recent years there has been increasing UK Government pressure on publicly funded researchers to plan the preservation and ensure the accessibility of their data for the long term. A critical challenge in implementing a digital preservation strategy is the estimation of such a programmeâs cost. This pa-per presents a case study based on the cost estimation of preserving scientific data produced in the ISIS facility based at The Science and Technology Facilities Council (STFC) Rutherford Appleton Laboratory UK. The model for cost estimation for long term digital preservation is presented along with an outline of the development and validation activities undertaken as part of this project. The framework and methodology from this research provide an insight into the task of costing long term digital preservation processes, and can potentially be adapted to deliver benefits to other organisa-tions
A Guide to Distributed Digital Preservation
This volume is devoted to the broad topic of distributed digital preservation, a still-emerging field of practice for the cultural memory arena. Replication and distribution hold out the promise of indefinite preservation of materials without degradation, but establishing effective organizational and technical processes to enable this form of digital preservation is daunting. Institutions need practical examples of how this task can be accomplished in manageable, low-cost ways."--P. [4] of cove
Digital curation and the cloud
Digital curation involves a wide range of activities, many of which could benefit from cloud
deployment to a greater or lesser extent. These range from infrequent, resource-intensive tasks
which benefit from the ability to rapidly provision resources to day-to-day collaborative activities
which can be facilitated by networked cloud services. Associated benefits are offset by risks
such as loss of data or service level, legal and governance incompatibilities and transfer
bottlenecks. There is considerable variability across both risks and benefits according to the
service and deployment models being adopted and the context in which activities are
performed. Some risks, such as legal liabilities, are mitigated by the use of alternative, e.g.,
private cloud models, but this is typically at the expense of benefits such as resource elasticity
and economies of scale. Infrastructure as a Service model may provide a basis on which more
specialised software services may be provided.
There is considerable work to be done in helping institutions understand the cloud and its
associated costs, risks and benefits, and how these compare to their current working methods,
in order that the most beneficial uses of cloud technologies may be identified. Specific
proposals, echoing recent work coordinated by EPSRC and JISC are the development of
advisory, costing and brokering services to facilitate appropriate cloud deployments, the
exploration of opportunities for certifying or accrediting cloud preservation providers, and
the targeted publicity of outputs from pilot studies to the full range of stakeholders within the
curation lifecycle, including data creators and owners, repositories, institutional IT support
professionals and senior manager
Heritage and Resilience: Issues and Opportunities for Reducing Disaster Risks
This paper examines the unique role of cultural heritage in disaster risk reduction. Itintroduces various approaches to protect heritage from irreplaceable loss and considers ways to draw upon heritage as an asset in building the resilience of communities and nations to disasters. The paper proposes ways forward and builds on the current momentum provided by the Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities to Disastersâ (HFA) and the advancement of a post-2015 framework for disaster risk reduction (HFA2) and the post-2015 development agenda.
Cultural heritage is often associated with grandiose monuments and iconic archaeological sites that can hold us in awe of their beauty, history and sheer scale. However, the understanding of cultural heritage has undergone a marked shift during the last few decades in terms of what it is, why it is important, why it is at risk and what can be done to protect it.
Cultural heritage today encompasses a broader array of places such as historic cities, living cultural landscapes, gardens or sacred forests and mountains, technological or industrial achievements in the recent past and even sites associated with painful memories and war. Collections of movable and immoveable items within sites, museums, historic properties and archives have also increased significantly in scope, testifying not only to the lifestyles of royalty and the achievements of great artists, but also to the everyday lives of ordinary people. At the same time intangibles such as knowledge, beliefs and value systems are fundamental aspects of heritage that have a powerful influence on peopleâs daily choices and behaviors.
Heritage is at risk due to disasters, conflict, climate change and a host of other factors.At the same time, cultural heritage is increasingly recognized as a driver of resilience that can support efforts to reduce disaster risks more broadly. Recent years have seen greater emphasis and commitment to protecting heritage and leveraging it for resilience;but initiatives, such as the few examples that are presented here, need to be encouraged and brought more fully into the mainstream of both disaster risk reduction and heritage management. These are issues that can be productively addressed in a post-2015 framework for disaster risk reduction and, likewise, in the post-2015 development agenda
BlogForever: D3.1 Preservation Strategy Report
This report describes preservation planning approaches and strategies recommended by the BlogForever project as a core component of a weblog repository design. More specifically, we start by discussing why we would want to preserve weblogs in the first place and what it is exactly that we are trying to preserve. We further present a review of past and present work and highlight why current practices in web archiving do not address the needs of weblog preservation adequately. We make three distinctive contributions in this volume: a) we propose transferable practical workflows for applying a combination of established metadata and repository standards in developing a weblog repository, b) we provide an automated approach to identifying significant properties of weblog content that uses the notion of communities and how this affects previous strategies, c) we propose a sustainability plan that draws upon community knowledge through innovative repository design
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
- âŠ