Disaster planning for digital repositories
dc.contributor.author | Frank, Rebecca D. | en_US |
dc.contributor.author | Yakel, Elizabeth | en_US |
dc.date.accessioned | 2014-05-23T15:59:04Z | |
dc.date.available | 2014-05-23T15:59:04Z | |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | Frank, Rebecca D.; Yakel, Elizabeth (2013). "Disaster planning for digital repositories." Proceedings of the American Society for Information Science and Technology 50(1): 1-10. <http://hdl.handle.net/2027.42/106841> | en_US |
dc.identifier.issn | 0044-7870 | en_US |
dc.identifier.issn | 1550-8390 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/106841 | |
dc.description.abstract | This study examines how digital repositories with a preservation mandate are engaging in disaster planning, particularly in relation to their pursuit of trusted digital repository status. For those that are engaging in disaster planning, the study examines the creation of formal disaster response and recovery plans. Findings indicate that the process of going through an audit for certification as a trusted repository provides the incentive needed for the creation of formalized disaster planning documentation, and that repositories struggle with making their documentation available. This study also finds several significant obstacles with regard to the creation of formal disaster planning documentation, including the efforts required to get buy‐in from different functional areas within the organization, difficulty collaborating with the IT department, and the amount of time required for completion of the documentation. | en_US |
dc.publisher | Wiley Subscription Services, Inc., A Wiley Company | en_US |
dc.title | Disaster planning for digital repositories | en_US |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | en_US |
dc.subject.hlbsecondlevel | Information and Library Science | en_US |
dc.subject.hlbtoplevel | Social Sciences | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | University of Michigan School of Information, 105 S. State St., Ann Arbor, MI 48109‐1285 | en_US |
dc.contributor.affiliationum | University of Michigan School of Information, 105 S. State St., Ann Arbor, MI 48109‐1285 | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/106841/1/14505001058_ftp.pdf | |
dc.identifier.doi | 10.1002/meet.14505001058 | en_US |
dc.identifier.source | Proceedings of the American Society for Information Science and Technology | en_US |
dc.identifier.citedreference | Nestor Working Group Trusted Repositories ‐ Certification.( 2009 ). nestor Criteria: Catalogue of Criteria for Trusted Digital Repositories, Version 2. Frankfurt am Main: Deutsche Nationalbibliothek. | en_US |
dc.identifier.citedreference | Holsti, O. R. ( 1969 ). Content Analysis for the Social Sciences and Humanities. Reading, MA: Addison‐Wesley Pub. Co. | en_US |
dc.identifier.citedreference | Innocenti, P.,& Vullo, G. ( 2009 ). Assessing the Preservation of Institutional Repositories with DRAMBORA: Case Studies from the University of Glasgow. Bollettino AIB, 49 ( 2 ), 139 – 158. | en_US |
dc.identifier.citedreference | Inter‐University Consortium for Political and Social Research (ICPSR).( 2013 ). Disaster Planning. ICPSR Data Management: Disaster Planning.Retrieved April 1, 2013, from http://www.icpsr.umich.edu/icpsrweb/content/data management/disaster/ | en_US |
dc.identifier.citedreference | Maniatis, P., Roussopoulos, M., Giuli, T. J., Rosenthal, D. S. H.,& Baker, M. ( 2005 ). The LOCKSS Peer‐to‐Peer Digital Preservation System. ACM Transactions on Computing Systems, 23 ( 1 ), 2 – 50.doi:10.1145/1047915.1047917 | en_US |
dc.identifier.citedreference | McDonald, R. H.,& Walters, T. O. ( 2010 ). Restoring Trust Relationships within the Framework of Collaborative Digital Preservation Federations. Journal of Digital Information, 11,( 1 ). | en_US |
dc.identifier.citedreference | McHugh, A., Ross, S., Innocenti, P., Ruusalepp, R.,& Hoffman, H. ( 2008 ). Bringng Self‐Assessment Home: Repository Profiling and Key Lines of Enquiry within DRAMBORA. The International Journal of Digital Curation, 3 ( 2 ), 130 – 142.doi:doi:10.2218/ijdc.v3i2.64 | en_US |
dc.identifier.citedreference | Muir, A.,& Shenton, S. ( 2002 ). If the Worst Happens: The Use and Effectiveness of Disaster Plans in Libraries and Archives. Library Management, 23 ( 3 ), 115 – 123. | en_US |
dc.identifier.citedreference | Myles, B. ( 2000 ). The Impact of a Library Flood on Computer Operations. Computers in Libraries, 20 ( 1 ), 44 – 44 ‐46. | en_US |
dc.identifier.citedreference | Patel, M. C. ( 2007 ). A Study of Curation and Preservation Issues in the eCrystals Data Reository and Proposed Federation (Final Version (Revised) No. eBank‐UK Phase 3: WP4) (pp. 1 – 34 ). Bath: UKOLN, DCC; National Crystallography Centre. | en_US |
dc.identifier.citedreference | Rajasekar, A., Moore, R., Hou, C.‐Y., Lee, C. A., Marciano, R., de Torcy, A.,… Zhu, B. ( 2010 ). iRODS Primer: Integrated Rule‐Oriented Data System. Synthesis Lectures on Information Concepts, Retrieval, and Services, 2,( 1 ), 1 – 143.doi:10.2200/S00233ED V01Y200912ICR012 | en_US |
dc.identifier.citedreference | Robson, C. ( 1993 ). Real World Research: A Resource for Social Scientists and Practitioner‐Researchers. Oxford, UK; Cambridge, Mass., USA: Blackwell. | en_US |
dc.identifier.citedreference | Ross, S.,& McHugh, A. ( 2006 ). Preservation Pressure Points: Evaluating Diverse Evidence for Risk Management.Presented at the iPRES 2006, New York, NY: Digital Curation Centre. | en_US |
dc.identifier.citedreference | Schmidt, G. ( 2010 ). Web 2.0 for Disaster Response and Recovery. Journal of Web Librarianship, 4,( 4 ), 413 – 126.doi:10.1080/19322909.2010.511038 | en_US |
dc.identifier.citedreference | Skinner, R. E. ( 2006 ). “Nor Any Drop to Drink”: New Orleans Libraries in the Aftermath of Hurricane Katrina. Public Library Quarterly, 25,( 3‐4 ), 179 – 187.doi:10.1300/J118v25n03_15 | en_US |
dc.identifier.citedreference | Wildemuth, B. M. ( 2009 ). Applications of Social Research Methods to Questions in Information and Library Science. Westport, Conn.: Libraries Unlimited. | en_US |
dc.identifier.citedreference | Wong, Y. L.,& Green, R. ( 2006 ). Disaster Planning in Libraries. Journal of Access Services, 4,( 3/4 ), 71 – 82. | en_US |
dc.identifier.citedreference | Aikin, J. ( 2007 ). Preparing for a National Emergency: The Committee on Conservation of Cultural Resources, 1939‐1944. The Library Quarterly, 77 ( 3 ), 257. | en_US |
dc.identifier.citedreference | Altman, M., Adams, M., Crabtree, J., Donakowski, D., Maynard, M., Pienta, A.,& Young, C. ( 2009 ). Digital Preservation Through Archival Collaboration: The Data Preservation Alliance for the Social Sciences. The American Archivist, 72 ( 1 ), 170 – 184. | en_US |
dc.identifier.citedreference | Anderson, C. ( 2005 ). Digital Preservation: Will Your Files Stand the Test of Time? Library Hi Tech News, 22 ( 6 ), 9 – 10. | en_US |
dc.identifier.citedreference | Babbie, E. R. ( 2010 ). The Practice of Social Research. Belmont, Calif: Wadsworth Cengage. | en_US |
dc.identifier.citedreference | Ball, A. ( 2010 ). Review of the State of the Art of the Digital Curation of Research Data (ERIM Project Document erim1rep091103ab11 No. version 1.1) (p. 56 ). Bath, UK: University of Bath.Retrieved from http://opus.bath.ac.uk/18774/2/erim1rep091103ab11.pdf | en_US |
dc.identifier.citedreference | Beagrie, N., Chruszcz, J.,& Lavoie, B. ( 2008 ). Keeping Research Data Safe. JISC.Retrieved from http://www.jisc.ac.uk/publications/reports/2008/keepingresearchdatasafe.aspx | en_US |
dc.identifier.citedreference | Berman, F. ( 2008 ). Got Data?: A Guide to Data Preservation in the Information Age. Communications of the ACM, 51 ( 12 ), 50 – 56.doi:10.1145/1409360.1409376 | en_US |
dc.identifier.citedreference | Center for Research Libraries.( 2007 ). Ten Principles. Center for Research Libraries Global Resources Network.Retrieved October 9, 2012, from http://www.crl.edu/archiving‐preservation/digital‐archives/metrics‐assessing‐and‐certifying/core‐re | en_US |
dc.identifier.citedreference | Cervone, H. F. ( 2006 ). Disaster Recovery and Continuity Planning for Digital Library Systems. OCLC Systems & Services: International Digital Library Perspectives, 22,( 3 ), 173. | en_US |
dc.identifier.citedreference | Consultative Committee for Space Data Systems.( 2012 ). Space Data and Information Transfer Systems — Audit and Certification of Trustworthy Digital Repositories (Standard No. ISO 16363:2012 (CCSDS 652‐R‐1)). Washington, D.C.: Consultative Committee for Space Data Systems. | en_US |
dc.identifier.citedreference | Consultative Committee for Space Data Systems.( 2012 ). Reference Model for and Open Archival Information System (OAIS) (Magenta Book No. CCSDS 650.0‐M‐2). Washington, D.C.: Consultative Committee for Space Data Systems. | en_US |
dc.identifier.citedreference | Data Archiving and Networked Services (DANS).( 2010 ). Data Seal of Approval: Quality Guidelines for Digital Research Data. The Hague.Retrieved from http://www.datasealofapproval.org/?q=about | en_US |
dc.identifier.citedreference | Data Intensive Cyber Environments Group.( 2008 ). iRODS: Integrated Rule Oriented Data System (White Paper). Chapel Hill, NC: University of North Carolina at Chapel Hill, University of California at San Diego. | en_US |
dc.identifier.citedreference | Dobratz, S., Schoger, A.,& Strathmann, S. ( 2007 ). The nestor Catalogue of Criteria for Trusted Digital Repository Evaluation and Certification. The Journal of Digital Information, 8 ( 2 ).Retrieved from | en_US |
dc.identifier.citedreference | Garrett, J.,& Waters, D. J. ( 1996 ). Preserving Digital Information: Report of the Task Force on Archiving of Digital Information (No. 9781887334501 1887334505) (p. 68 ). Washington, D.C.: The Commission on Preservation and Access & Research Libraries Group. | en_US |
dc.identifier.citedreference | Gracy, K. F.,& Kahn, M. B. ( 2012 ). Preservation in the Digital Age. Library Resources & Technical Services, 56 ( 1 ), 25 – 43. | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.