Show simple item record

Disaster planning for digital repositories

dc.contributor.authorFrank, Rebecca D.en_US
dc.contributor.authorYakel, Elizabethen_US
dc.date.accessioned2014-05-23T15:59:04Z
dc.date.available2014-05-23T15:59:04Z
dc.date.issued2013en_US
dc.identifier.citationFrank, Rebecca D.; Yakel, Elizabeth (2013). "Disaster planning for digital repositories." Proceedings of the American Society for Information Science and Technology 50(1): 1-10. <http://hdl.handle.net/2027.42/106841>en_US
dc.identifier.issn0044-7870en_US
dc.identifier.issn1550-8390en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/106841
dc.description.abstractThis study examines how digital repositories with a preservation mandate are engaging in disaster planning, particularly in relation to their pursuit of trusted digital repository status. For those that are engaging in disaster planning, the study examines the creation of formal disaster response and recovery plans. Findings indicate that the process of going through an audit for certification as a trusted repository provides the incentive needed for the creation of formalized disaster planning documentation, and that repositories struggle with making their documentation available. This study also finds several significant obstacles with regard to the creation of formal disaster planning documentation, including the efforts required to get buy‐in from different functional areas within the organization, difficulty collaborating with the IT department, and the amount of time required for completion of the documentation.en_US
dc.publisherWiley Subscription Services, Inc., A Wiley Companyen_US
dc.titleDisaster planning for digital repositoriesen_US
dc.typeArticleen_US
dc.rights.robotsIndexNoFollowen_US
dc.subject.hlbsecondlevelInformation and Library Scienceen_US
dc.subject.hlbtoplevelSocial Sciencesen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumUniversity of Michigan School of Information, 105 S. State St., Ann Arbor, MI 48109‐1285en_US
dc.contributor.affiliationumUniversity of Michigan School of Information, 105 S. State St., Ann Arbor, MI 48109‐1285en_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/106841/1/14505001058_ftp.pdf
dc.identifier.doi10.1002/meet.14505001058en_US
dc.identifier.sourceProceedings of the American Society for Information Science and Technologyen_US
dc.identifier.citedreferenceNestor Working Group Trusted Repositories ‐ Certification.( 2009 ). nestor Criteria: Catalogue of Criteria for Trusted Digital Repositories, Version 2. Frankfurt am Main: Deutsche Nationalbibliothek.en_US
dc.identifier.citedreferenceHolsti, O. R. ( 1969 ). Content Analysis for the Social Sciences and Humanities. Reading, MA: Addison‐Wesley Pub. Co.en_US
dc.identifier.citedreferenceInnocenti, P.,& Vullo, G. ( 2009 ). Assessing the Preservation of Institutional Repositories with DRAMBORA: Case Studies from the University of Glasgow. Bollettino AIB, 49 ( 2 ), 139 – 158.en_US
dc.identifier.citedreferenceInter‐University Consortium for Political and Social Research (ICPSR).( 2013 ). Disaster Planning. ICPSR Data Management: Disaster Planning.Retrieved April 1, 2013, from http://www.icpsr.umich.edu/icpsrweb/content/data management/disaster/en_US
dc.identifier.citedreferenceManiatis, P., Roussopoulos, M., Giuli, T. J., Rosenthal, D. S. H.,& Baker, M. ( 2005 ). The LOCKSS Peer‐to‐Peer Digital Preservation System. ACM Transactions on Computing Systems, 23 ( 1 ), 2 – 50.doi:10.1145/1047915.1047917en_US
dc.identifier.citedreferenceMcDonald, R. H.,& Walters, T. O. ( 2010 ). Restoring Trust Relationships within the Framework of Collaborative Digital Preservation Federations. Journal of Digital Information, 11,( 1 ).en_US
dc.identifier.citedreferenceMcHugh, A., Ross, S., Innocenti, P., Ruusalepp, R.,& Hoffman, H. ( 2008 ). Bringng Self‐Assessment Home: Repository Profiling and Key Lines of Enquiry within DRAMBORA. The International Journal of Digital Curation, 3 ( 2 ), 130 – 142.doi:doi:10.2218/ijdc.v3i2.64en_US
dc.identifier.citedreferenceMuir, A.,& Shenton, S. ( 2002 ). If the Worst Happens: The Use and Effectiveness of Disaster Plans in Libraries and Archives. Library Management, 23 ( 3 ), 115 – 123.en_US
dc.identifier.citedreferenceMyles, B. ( 2000 ). The Impact of a Library Flood on Computer Operations. Computers in Libraries, 20 ( 1 ), 44 – 44 ‐46.en_US
dc.identifier.citedreferencePatel, M. C. ( 2007 ). A Study of Curation and Preservation Issues in the eCrystals Data Reository and Proposed Federation (Final Version (Revised) No. eBank‐UK Phase 3: WP4) (pp. 1 – 34 ). Bath: UKOLN, DCC; National Crystallography Centre.en_US
dc.identifier.citedreferenceRajasekar, A., Moore, R., Hou, C.‐Y., Lee, C. A., Marciano, R., de Torcy, A.,… Zhu, B. ( 2010 ). iRODS Primer: Integrated Rule‐Oriented Data System. Synthesis Lectures on Information Concepts, Retrieval, and Services, 2,( 1 ), 1 – 143.doi:10.2200/S00233ED V01Y200912ICR012en_US
dc.identifier.citedreferenceRobson, C. ( 1993 ). Real World Research: A Resource for Social Scientists and Practitioner‐Researchers. Oxford, UK; Cambridge, Mass., USA: Blackwell.en_US
dc.identifier.citedreferenceRoss, S.,& McHugh, A. ( 2006 ). Preservation Pressure Points: Evaluating Diverse Evidence for Risk Management.Presented at the iPRES 2006, New York, NY: Digital Curation Centre.en_US
dc.identifier.citedreferenceSchmidt, G. ( 2010 ). Web 2.0 for Disaster Response and Recovery. Journal of Web Librarianship, 4,( 4 ), 413 – 126.doi:10.1080/19322909.2010.511038en_US
dc.identifier.citedreferenceSkinner, R. E. ( 2006 ). “Nor Any Drop to Drink”: New Orleans Libraries in the Aftermath of Hurricane Katrina. Public Library Quarterly, 25,( 3‐4 ), 179 – 187.doi:10.1300/J118v25n03_15en_US
dc.identifier.citedreferenceWildemuth, B. M. ( 2009 ). Applications of Social Research Methods to Questions in Information and Library Science. Westport, Conn.: Libraries Unlimited.en_US
dc.identifier.citedreferenceWong, Y. L.,& Green, R. ( 2006 ). Disaster Planning in Libraries. Journal of Access Services, 4,( 3/4 ), 71 – 82.en_US
dc.identifier.citedreferenceAikin, J. ( 2007 ). Preparing for a National Emergency: The Committee on Conservation of Cultural Resources, 1939‐1944. The Library Quarterly, 77 ( 3 ), 257.en_US
dc.identifier.citedreferenceAltman, M., Adams, M., Crabtree, J., Donakowski, D., Maynard, M., Pienta, A.,& Young, C. ( 2009 ). Digital Preservation Through Archival Collaboration: The Data Preservation Alliance for the Social Sciences. The American Archivist, 72 ( 1 ), 170 – 184.en_US
dc.identifier.citedreferenceAnderson, C. ( 2005 ). Digital Preservation: Will Your Files Stand the Test of Time? Library Hi Tech News, 22 ( 6 ), 9 – 10.en_US
dc.identifier.citedreferenceBabbie, E. R. ( 2010 ). The Practice of Social Research. Belmont, Calif: Wadsworth Cengage.en_US
dc.identifier.citedreferenceBall, A. ( 2010 ). Review of the State of the Art of the Digital Curation of Research Data (ERIM Project Document erim1rep091103ab11 No. version 1.1) (p. 56 ). Bath, UK: University of Bath.Retrieved from http://opus.bath.ac.uk/18774/2/erim1rep091103ab11.pdfen_US
dc.identifier.citedreferenceBeagrie, N., Chruszcz, J.,& Lavoie, B. ( 2008 ). Keeping Research Data Safe. JISC.Retrieved from http://www.jisc.ac.uk/publications/reports/2008/keepingresearchdatasafe.aspxen_US
dc.identifier.citedreferenceBerman, F. ( 2008 ). Got Data?: A Guide to Data Preservation in the Information Age. Communications of the ACM, 51 ( 12 ), 50 – 56.doi:10.1145/1409360.1409376en_US
dc.identifier.citedreferenceCenter for Research Libraries.( 2007 ). Ten Principles. Center for Research Libraries Global Resources Network.Retrieved October 9, 2012, from http://www.crl.edu/archiving‐preservation/digital‐archives/metrics‐assessing‐and‐certifying/core‐reen_US
dc.identifier.citedreferenceCervone, H. F. ( 2006 ). Disaster Recovery and Continuity Planning for Digital Library Systems. OCLC Systems & Services: International Digital Library Perspectives, 22,( 3 ), 173.en_US
dc.identifier.citedreferenceConsultative Committee for Space Data Systems.( 2012 ). Space Data and Information Transfer Systems — Audit and Certification of Trustworthy Digital Repositories (Standard No. ISO 16363:2012 (CCSDS 652‐R‐1)). Washington, D.C.: Consultative Committee for Space Data Systems.en_US
dc.identifier.citedreferenceConsultative Committee for Space Data Systems.( 2012 ). Reference Model for and Open Archival Information System (OAIS) (Magenta Book No. CCSDS 650.0‐M‐2). Washington, D.C.: Consultative Committee for Space Data Systems.en_US
dc.identifier.citedreferenceData Archiving and Networked Services (DANS).( 2010 ). Data Seal of Approval: Quality Guidelines for Digital Research Data. The Hague.Retrieved from http://www.datasealofapproval.org/?q=abouten_US
dc.identifier.citedreferenceData Intensive Cyber Environments Group.( 2008 ). iRODS: Integrated Rule Oriented Data System (White Paper). Chapel Hill, NC: University of North Carolina at Chapel Hill, University of California at San Diego.en_US
dc.identifier.citedreferenceDobratz, S., Schoger, A.,& Strathmann, S. ( 2007 ). The nestor Catalogue of Criteria for Trusted Digital Repository Evaluation and Certification. The Journal of Digital Information, 8 ( 2 ).Retrieved fromen_US
dc.identifier.citedreferenceGarrett, J.,& Waters, D. J. ( 1996 ). Preserving Digital Information: Report of the Task Force on Archiving of Digital Information (No. 9781887334501 1887334505) (p. 68 ). Washington, D.C.: The Commission on Preservation and Access & Research Libraries Group.en_US
dc.identifier.citedreferenceGracy, K. F.,& Kahn, M. B. ( 2012 ). Preservation in the Digital Age. Library Resources & Technical Services, 56 ( 1 ), 25 – 43.en_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.