
At a Glance
534 Pages
22.86 x 15.88 x 3.81
Hardcover
$259.75
or 4 interest-free payments of $64.94 with
 orÂShips in 5 to 7 business days
There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages - objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific data and software itself.
David Giaretta, Director of the Alliance for Permanent Access, and his contributors explain why the tools and techniques used for preserving rendered objects are inadequate for all these other types of digital objects, and they provide the concepts, techniques and tools that are needed. The book is structured in three parts. The first part is on theory, i.e., the concepts and techniques that are essential for preserving digitally encoded information. The second part then shows practice, i.e., the use and validation of these tools and techniques. Finally, the third part concludes by addressing how to judge whether money is being well spent, in terms of effectiveness and cost sharing.
Various examples of digital objects from many sources are used to explain the tools and techniques presented. The presentation style mainly aims at practitioners in libraries, archives and industry who are either directly responsible for preservation or who need to prepare for audits of their archives. Researchers in digital preservation and developers of preservation tools and techniques will also find valuable practical information here. Researchers creating digitally encoded information of all kinds will also need to be aware of these topics so that they can help to ensure that their data is usable and can be valued by others now and in the future.
To further assist the reader, the book is supported by many hours of videos and presentations from the CASPAR project and by a set of open source software.
Industry Reviews
| Introduction | p. 1 |
| What's So Special About Digital Things? | p. 2 |
| Terminology | p. 5 |
| Summary | p. 5 |
| The Really Foolproof Solution for Digital Preservation | p. 7 |
| Theory - The Concepts and Techniques Which Are Essential for Preserving Digitally Encoded Information | |
| Introduction to OAIS Concepts and Terminology | p. 13 |
| Preserve What, for How Long and for Whom? | p. 13 |
| What "Metadata", How Much "Metadata"? | p. 16 |
| Recursion - A Pervasive Concept | p. 26 |
| Disincentives Against Digital Preservation | p. 28 |
| Summary | p. 30 |
| Types of Digital Objects | p. 31 |
| Simple vs. Composite | p. 31 |
| Rendered vs. Non-rendered | p. 33 |
| Static vs. Dynamic | p. 38 |
| Active vs. Passive | p. 38 |
| Multiple-Classifications | p. 39 |
| Summary | p. 39 |
| Threats to Digital Preservation and Possible Solutions | p. 41 |
| What Can Be Relied on in the Long-Term? | p. 43 |
| What Others Think About Major Threats to Digital Preservation | p. 44 |
| Summary | p. 45 |
| OAIS in More Depth | p. 47 |
| OAIS Conformance | p. 49 |
| OAIS Mandatory Responsibilities | p. 50 |
| OAIS Information Model | p. 53 |
| OAIS Functional Model | p. 63 |
| Information Flows and Layering | p. 65 |
| Issues Not Covered in Detail by OAIS | p. 65 |
| Summary | p. 67 |
| Understanding a Digital Object: Basic Representation Information | p. 69 |
| Co-author Stephen Rankin | |
| Levels of Application of Representation Information Concept | p. 69 |
| Overview of Techniques for Describing Digital Objects | p. 71 |
| Structure Representation Information | p. 75 |
| Format Identification | p. 96 |
| Semantic Representation Information | p. 97 |
| Other Representation Information | p. 101 |
| Application to Types of Digital Objects | p. 102 |
| Virtualisation | p. 112 |
| Emulation | p. 123 |
| Summary | p. 137 |
| Preservation of Intelligibility of Digital Objects | p. 139 |
| Co-authors Yannis Tzitzikas, Yannis Marketakis, and Vassilis Christophides | |
| On Digital Objects and Dependencies | p. 139 |
| A Formal Model for the Intelligibility of Digital Objects | p. 142 |
| Modelling and Implementation Frameworks | p. 163 |
| Summary | p. 166 |
| Understandability and Usability of Data | p. 167 |
| Re-Use of Digital Objects - Interoperability and Preservation | p. 168 |
| Use of Existing Software | p. 171 |
| Creation of New Software | p. 173 |
| Without Software | p. 173 |
| Software as the Digital Object Being Preserved | p. 174 |
| Digital Archaeology, Digital Forensics and Re-Use | p. 174 |
| Multiple Objects | p. 175 |
| Summary | p. 175 |
| In Addition to Understanding It - What Is It?: Preservation Description Information | p. 177 |
| Introduction | p. 177 |
| Fixity Information | p. 177 |
| Reference Information | p. 178 |
| Context Information | p. 184 |
| Provenance Information | p. 184 |
| Access Rights Management | p. 185 |
| Summary | p. 190 |
| Linking Data and "Metadata": Packaging | p. 191 |
| Information Packaging Overview | p. 191 |
| Archival Information Packaging | p. 192 |
| XFDU | p. 193 |
| Summary | p. 196 |
| Basic Preservation Strategies | p. 197 |
| Description - Adding Representation Information | p. 198 |
| Maintaining Access | p. 198 |
| Migration/Transformation | p. 200 |
| Summary | p. 202 |
| Authenticity | p. 203 |
| Background to Authenticity | p. 204 |
| OAIS Definition of Authenticity | p. 205 |
| Elements of the Authenticity Conceptual Model | p. 208 |
| Overall Authenticity Model | p. 212 |
| Authenticity Evidence | p. 214 |
| Significant Properties | p. 214 |
| Prototype Authenticity Evidence Capture Tool | p. 221 |
| Summary | p. 232 |
| Advanced Preservation Analysis | p. 233 |
| Co-author Esther Conway | |
| Preliminary Investigation of Data Holdings | p. 234 |
| Stakeholder and Archive Analysis | p. 235 |
| Defining a Preservation Objective | p. 237 |
| Defining a Designated User Community | p. 238 |
| Preservation Information Flows | p. 240 |
| Preservation Strategy Topics | p. 243 |
| Preservation Plans | p. 245 |
| Cost/Benefit/Risk Analysis | p. 245 |
| Preservation Analysis Summary | p. 246 |
| Preservation Analysis and Representation Information in More Detail | p. 246 |
| Network Modelling Approach | p. 247 |
| Summary | p. 264 |
| Practice - Use and Validation of the Tools and Techniques that Can Be Used for Preserving Digitally Encoded Information | |
| Testing Claims About Digital Preservation | p. 267 |
| "Accelerated Lifetime" Testing of Digital Preservation Techniques | p. 267 |
| Summary | p. 269 |
| Tools for Countering the Threats to Digital Preservation | p. 271 |
| Key Preservation Components and Infrastructure | p. 272 |
| Discipline Independent Aspects | p. 276 |
| Discipline Dependence: Toolboxes/Libraries | p. 284 |
| Key Infrastructure Components | p. 284 |
| Information Package Management | p. 285 |
| Information Access | p. 287 |
| Designated Community, Knowledge and Provenance Management | p. 287 |
| Communication Management | p. 288 |
| Security Management | p. 289 |
| The CASPAR Key Components Implementation | p. 291 |
| Design Considerations | p. 291 |
| Registry/Repository of Representation Information Details | p. 291 |
| Virtualizer | p. 297 |
| Knowledge Gap Manager | p. 301 |
| Preservation Orchestration Manager | p. 303 |
| Preservation DataStores | p. 305 |
| Data Access and Security | p. 315 |
| Digital Rights Management Details | p. 318 |
| Find-Finding Manager | p. 321 |
| Information Packaging Details | p. 322 |
| Authenticity Manager Toolkit | p. 332 |
| Representation Information Toolkit | p. 333 |
| Key Components - Summary | p. 335 |
| Integrated tools | p. 337 |
| Overview of the Testbeds | p. 341 |
| Typical Preservation Scenarios | p. 341 |
| Generic Criteria and Method to Organise and to Evaluate the Testbeds | p. 342 |
| Cross References Between Scenarios and Changes | p. 343 |
| ISTFC Science Testbed | p. 345 |
| Dataset Selection | p. 345 |
| Challenges Addressed | p. 345 |
| Preservation Aims | p. 347 |
| Preservation Analysis | p. 347 |
| MST RADAR Scenarios | p. 347 |
| Ionosonde Data and the WDC Scenarios | p. 361 |
| Summary of Testbed Checks | p. 366 |
| European Space Agency Testbed | p. 367 |
| Dataset Selection | p. 369 |
| Challenge Addressed | p. 370 |
| Preservation Aim | p. 372 |
| Preservation Analysis | p. 372 |
| Scenario ESA1 - Operating System Change | p. 372 |
| Additional Workflow Scenarios | p. 384 |
| Conclusions | p. 386 |
| Cultural Heritage Testbed | p. 387 |
| Dataset Selection | p. 388 |
| Challenges Addressed | p. 396 |
| Preservation Aim | p. 396 |
| Preservation Analysis | p. 396 |
| Scenario UNESCO 1: Villa LIVIA | p. 397 |
| Related Documentation | p. 406 |
| Other Misc Data with a Brief Description | p. 406 |
| Glossary | p. 406 |
| Contemporary Performing Arts Testbed | p. 407 |
| Historical Introduction to the Issue | p. 407 |
| An Insight into Objects | p. 409 |
| Challenges of Preservation | p. 411 |
| Preserving the Real-Time Processes | p. 412 |
| Interactive Multimedia Performance | p. 419 |
| CIANTTestbed | p. 426 |
| Summary | p. 428 |
| Is Money Well Spent? Cutting the Cost and Making Sure Money Is Not Wasted | |
| Sharing the Effort | p. 431 |
| Chain of Preservation | p. 431 |
| Mechanisms for Sharing the Burden of Preservation | p. 431 |
| Infrastructure Roadmap | p. 435 |
| Requirements for a Science Data Infrastructure | p. 435 |
| Possible Financial Infrastructure Concepts and Components | p. 436 |
| Possible Organisational and Social Infrastructure Concepts and Components | p. 437 |
| Possible Policy Infrastructure Concepts and Components | p. 446 |
| Virtualisation of Policies, Resources and Processes | p. 448 |
| Technical Science Data Concepts and Components | p. 449 |
| Aspects Excluded from This Roadmap | p. 456 |
| Relationship to Other Infrastructures | p. 457 |
| Summary | p. 459 |
| Who Is Doing a Good Job? Audit and Certification | p. 461 |
| Background | p. 461 |
| TRAC and Related Documents | p. 463 |
| Development of an ISO Accreditation and Certification Process | p. 464 |
| Understanding the ISO Trusted Digital Repository Metrics | p. 465 |
| Summary | p. 480 |
| Final Thoughts | p. 481 |
| References | p. 483 |
| Contributors | p. 495 |
| Index | p. 505 |
| Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9783642168086
ISBN-10: 3642168086
Published: 1st June 2011
Format: Hardcover
Language: English
Number of Pages: 534
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 22.86 x 15.88 x 3.81
Weight (kg): 0.89
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
This product is categorised by
- Non-FictionLibrary & Info SciencesArchiving, Preservation & Digitisation
- Non-FictionComputing & I.T.DatabasesData Warehousing
- Non-FictionComputing & I.T.Information Technology General IssueEthical & Social Aspects of IT
- Non-FictionComputing & I.T.DatabasesInformation Retrieval
- Non-FictionComputing & I.T.DatabasesData Capture & Analysis
- Non-FictionLibrary & Info SciencesLibrary & Information Services

























