The Locator -- [(subject = "Digital preservation")]

186 records matched your query       


Record 37 | Previous Record | Long Display | Next Record
05139aam a2200397 i 4500
001 0B6F3D14621111E7BC2B04C5DAD10320
003 SILO
005 20170706010219
008 160627s2016    mdua     b    001 0 eng  
010    $a 2016009890
020    $a 1442263784
020    $a 9781442263789
020    $a 1442263776
020    $a 9781442263772
035    $a (OCoLC)945028640
040    $a DLC $b eng $e rda $c DLC $d YDX $d YDXCP $d BTCTA $d BDX $d MNE $d OCLCQ $d YUS $d CHVBK $d OCLCO $d SILO
042    $a pcc
050 00 $a ZA4080 B855 2016
245 00 $a Building trustworthy digital repositories : $b theory and implementation / $c edited by Philip C. Bantin.
264  1 $a Lanham : $b Rowman & Littlefield, $c [2016]
300    $a xv, 371 pages : $b illustrations ; $c 23 cm
504    $a Includes bibliographical references and index.
505 00 $g 10. $t What will trustworthy systems look like in the future? / $g Theory: $t Evaluating and selecting a trustworthy repository / $r Luciana Duranti. $g Implementation: $t Selecting an integrated records and preservation management system for the Indiana Archives and Records Administration / $r Jim Corridan and Tibaut Houzanme -- $g 2. $t Resources, policies and management structures. $g Theory: $t Resources, policies, and management structures / $r Philip C. Bantin -- $g Implementation: $t Ten years and counting : what is missing from our institutional repository / $r Joanne Kaczmarek -- $g Implementation: $t Resources, policies, and management structures at the Kentucky Department for Libraries and Archives / $r Glen McAninch -- $g Implementation: $t Building a trustworthy system : resources, policies, and management structures : understanding our trustworthiness / $r Erik A. Moore -- $g 3. $t Building a trustworthy system : ingest process. $g Theory: $t Ingest process / $r Lisa Schmidt -- $t Implementation: $t Ingest process : Michigan State University's digital archives program / $r Cynthia Ghering -- $g Implementation: $t Ingest process : submission and "pre-ingest" activities / $r Jared Lyle -- $g Implementation: $t Submission agreement in the e-health domain / $r Giovanni Michetti -- $g 4. $t Creating and capturing metadata. $g Theory: $t Creating and capturing metadata / $r Philip C. Bantin -- $g Implementation: $t Adventures in metadata : a satellite office's file share cleanup project -- $g Implementation: $t Creating and capturing metadata : an Australian digital archives case study -- $g Implementation: $t Finding a black cat in a dark room : capture and creation of usable metadata / $r Jane Gorjevsky and Dina Sokolova -- $g 5. $t Capturing audit trail data. $g Theory: $t Authenticity and audit trails / $r Daniel Noonan -- $g Implementation: $t Adventures in audit trails : a satellite office's file share cleanup project / $r Mimi Dionne -- $g Implementation: $t Auditing through infrastructure migrations : the use of the audit control environment (ACE) in the Chronopolis digital preservation system / $r Sibyl Schaefer, Michael Smorul, Michael Ritter, and David Minor -- $g 6. $t Assigning retention and disposal data. $g Theory: $t Assigning retention and disposal data / $r Donald Force -- $g Implementation: $t Records and archival management strategies for electronic records used by the Kentucky Department for Libraries and Archives / $r Glen McAninch and Jim Cundy -- $g 7. $t Creating an access strategy. $g Theory: $t Creating an access strategy / $r Kris Stenson -- $g Implementation: $t Access partnerships : Washington State Archives' shared responsibility models / $r Debbie Bahn -- $g Implementation: $t Creating an access strategy : the Oregon Records Management Solution (ORMS) / $r Mary Beth Herkert -- $g Implementation: $t Determining access requirements for a federal government scientific data repository / $r Lorraine L. Richards -- $g 8. $t Creating a secure system. $g Theory: $t Creating a secure system / $r Lois Evans -- $g Implementation: $t Creating a secure system : a discussion / $r Lois Evans -- $g Implementation: $t VISR : the Virtual Institute for Social Research / $r Stan Ahalt, Jay Aikat, Dan Bedard, Margaret Burchinal, Thomas Carsey, Thu-Mai Christian, Jonathan Crabtree, Nancy Dole, Howard Lander, Latanya Sweeney, and Mary Whitton -- $g 9. $t Creating a preservation strategy. $g Theory: $t Creating a preservation strategy / $r Lori J. Ashley -- $g Implementation: $t Building a preservation strategy around Archivematica / $r Bronwen Sprout and Sarah Romkey -- $g 10. $t Trustworthy systems : current status and future directions. $t Current status of trustworthy systems / $r Nancy McGovern -- $t What will trustworthy systems look like in the future? / $r Luciana Duranti.
650  0 $a Digital libraries $x Standards.
650  0 $a Digital libraries $v Case studies.
650  0 $a Electronic records $x Standards. $x Standards.
650  0 $a Electronic records $x Standards.
650  0 $a Digital preservation.
650  0 $a Quality assurance.
700 1  $a Bantin, Philip C., $e editor.
776 08 $i Online version: $t Building trustworthy digital repositories $d Lanham : Rowman & Littlefield, [2016] $z 9781442263796
941    $a 2
952    $l TDPH826 $d 20190614011123.0
952    $l USUX851 $d 20190103014755.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=0B6F3D14621111E7BC2B04C5DAD10320
994    $a C0 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.