Foreword | 13 |
Introduction | 15 |
| |
PART I. FUNDAMENTAL MATERIALS. (BACKGROUND) |
| |
Chapter 1. Introduction | 21 |
| |
Chapter 2. UNESCO Card Project for digital heritage protection | 23 |
Corrected project of the digital heritage Card protection | 23 |
| |
Chapter 3. Organization of recommendations. | 28 |
3.1 Aim of document | 28 |
3.2 Recipients of recommendations | 28 |
3.3 Content | 29 |
3.4 Programs of limited resources | 29 |
3.4 Analysis of examples | 29 |
| |
Chapter 4. Terminological remarks | 30 |
4.1 Aim | 30 |
4.2 Terminology | 30 |
| |
Chapter 5. Summary of rules | 31 |
| |
PART II. PERSPECTIVES OF PROGRAMME MANAGEMENT. |
| |
Chapter 6. Understanding digital heritage | 37 |
6.1 Aims | 37 |
6.2 Main problems | 37 |
FROM MANAGER PERSPECTIVE | 37 |
6.3 "Heritage" and "Digital Heritage" | 37 |
6.4 Kinds of digital heritage | 39 |
6.5 Continuity of data accessibility | 40 |
PARTICULAR CASES | 41 |
6.6 Stability of internet as a particular risk scenario | 41 |
EXAMPLES | 42 |
SOURCES OF ADDITIONAL INFORMATION | 43 |
| |
Chapter 7. Understanding of digital information protection rules | 44 |
7.1 Aims | 44 |
7.2 Main problems | 44 |
FROM MANAGER PERSPECTIVE | 44 |
7.3 Digital information protection | 44 |
7.4 Attitude to data protection based on "presentation" concept | 44 |
7.5 Understanding the character of retained materials | 45 |
7.6 Strategies of digital materials protection | 46 |
SOURCES OF ADDITIONAL INFORMATION | 47 |
| |
Chapter 8. Understanding of digital information protection programmes | 48 |
8.1 Aims | 48 |
8.2 Main problems | 48 |
FROM MANAGER PERSPECTIVE | 48 |
8.3 Chosen concepts | 48 |
8.4 Tasks of comprehensive programmes | 49 |
8.5 Functions of comprehensive programmes | 50 |
8.6 Characteristic of digital heritage protection efficient programme | 52 |
SOURCES OF ADDITIONAL INFORMATION | 53 |
| |
Chapter 9. Responsibility. | 54 |
9.1 Aims | 54 |
9.2 Main problems | 54 |
FROM MANAGER PERSPECTIVE | 54 |
9.3 Choice of responsibility range for digital heritage protection | 54 |
9.4 Planning of long-term digital heritage protection | 57 |
9.5 Defining practical rules for responsibility | 58 |
9.6 Subjects capable of taking responsibility | 58 |
9.7 Declare for undertaking of obligations | 60 |
SOURCES OF ADDITIONAL INFORMATION | 60 |
| |
Chapter 10. Digital information protection programmes management. | 61 |
10.1 Aims | 61 |
10.2 Main problems | 61 |
FROM MANAGER PERSPECTIVE | 61 |
10.3 Management need | 61 |
10.4 Problems with programme management | 61 |
10.5 Tasks of programme managers | 65 |
10.6 Tools helpful in digital heritage protection programmes | 69 |
SOURCES OF ADDITIONAL INFORMATION | 71 |
| |
Chapter 11. Cooperation | 72 |
11.1 Aims | 72 |
11.2 Main problems | 72 |
FROM MANAGER PERSPECTIVE | 72 |
11.3 Need for cooperation | 72 |
11.4 Potential advantages of cooperation | 72 |
11.5 Advantages of a practical realization of cooperation | 73 |
ADDITIONAL INFORMATION SOURCES | 76 |
| |
PART III. TECHNICAL AND PRACTICAL PERSPECTIVES |
| |
Chapter 12. Choice of protection object. | 81 |
12.1 Aims | 81 |
12.2 Main problems | 81 |
12.3 Terminology | 81 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 81 |
12.4 Choice of protection object | 81 |
12.5 Use of existing concepts | 81 |
12.6 Difficulties connected with digital contents | 82 |
SOLVING PROBLEMS RULES | 82 |
12.7 Considered, consistent and responsible decisions | 82 |
12.8 Criterion selection foundations | 83 |
12.9 Identification of "worth carrier" materials | 83 |
12.10 Caution in evaluating | 83 |
TECHNICAL AND PRACTICAL ASPECTS | 83 |
12.11 Principles in scope of materials worth | 83 |
12.12 Documentation | 84 |
12.13 The role of procedures | 84 |
12.14 Selective or comprehensive choice? | 84 |
12.15 Agreements for data collection | 84 |
12.16 Whole materials collections or representative samples? | 84 |
12.17 Low issues | 85 |
12.18 Selection cycles | 85 |
12.19 Support of selection process | 85 |
PARTICULAR CASES | 85 |
12.20 Choice of important elements and features requiring maintenance | 85 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMS | 87 |
12.21 Selectivity | 87 |
12.22 Cooperation | 87 |
12.23 First of all the easiest | 87 |
ADDITIONAL INFORMATION SOURCES | 87 |
| |
Chapter 13. Cooperation with creators | 89 |
13.1 Aims | 89 |
13.2 Main problems | 89 |
13.3 Terminology | 89 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 89 |
13.4 The process of digital heritage birth | 89 |
13.5 Difficulties of relations with creators | 90 |
SOLVING PROBLEMS RULES | 90 |
13.6 Need for cooperation with creators | 90 |
13.7 Meaning of " "cooperation with creators" | 90 |
13.8 Cooperation effectiveness | 90 |
13.9 Advantages | 91 |
TECHNICAL AND PRACTICAL ASPECTS | 92 |
13.10 To see the difference | 92 |
13.11 Attitude to cooperation with creators | 92 |
13.12 Help for the creators | 93 |
PARTICULAR CASES | 93 |
13.13 Dissemination of specification and good practice | 94 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMS | 94 |
13.14 Load reducing | 94 |
13.15 Division of responsibilities | 94 |
EXAMPLES | 95 |
ADDITIONAL INFORMATION SOURCES | 95 |
| |
Chapter 14. Taking control: transfer and metadata | 98 |
14.1 Aims | 98 |
14.2 Main problems | 98 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 98 |
14.3 Data transfer in safe places | 98 |
14.4 Legal problems | 98 |
14.5 Taking control | 99 |
SOLVING PROBLEMS RULES | 99 |
14.6 Previous practices conclusions | 99 |
14.7 Two attitudes to data transfer | 99 |
14.8 Formats and standards control | 99 |
14.9 Control through the identification | 99 |
14.10 Control through the description | 100 |
14.11 Metadata as a source of information | 100 |
14.12 Attitude to metadata based on standards | 101 |
TECHNICAL AND PRACTICAL ASPECTS | 101 |
14.13 Initiating of data transfer | 101 |
14.14 Choice of data carrier and file formats | 102 |
14.15 Data transfer strategies | 102 |
14.16 Quality control | 103 |
14.17 Files identification | 103 |
14.18 Metadata protection | 104 |
14.19 Preparing archival sets for conservation | 104 |
PARTICULAR CASES | 105 |
14.20 Protective metadata | 105 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMS | 107 |
14.21 Transfer | 107 |
14.22 Metadata | 107 |
EXAMPLES | 107 |
14.23 Example 1 | 107 |
14.24 Example 2 | 108 |
ADDITIONAL INFORMATION SOURCES | 108 |
| |
Chapter 15. Legal management | 111 |
15.1 Aims | 111 |
15.2 Main problems | 111 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 111 |
15.3 Digital heritage and the law | 111 |
15.4 Diversity of law and expectations | 111 |
15.5 Basic laws, which determine the take-up of protection activities | 112 |
15.6 Problems | 112 |
SOLVING PROBLEMS RULES | 112 |
15.7 Knowledge of conditions | 112 |
15.8 Popularization of programme aims | 113 |
15.9 Finding a practical solution | 113 |
TECHNICAL AND PRACTICAL ASPECTS | 113 |
15.10 Legal solutions | 113 |
15.11 Standard activities | 114 |
15.12 Negotiation of conditions to access | 114 |
15.13 Legal management | 115 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMS | 115 |
15.14 Effectiveness of solutions | 115 |
EXAMPLES | 116 |
15.15 Example 1 | 116 |
15.17 Example 2 | 116 |
ADDITIONAL INFORMATION SOURCES | 116 |
| |
Chapter 16. Legal protection | 118 |
16.1 Aims | 118 |
16.2 Main problems | 118 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 118 |
16.3 Data preservation and protection | 118 |
16.4 Authentication | 118 |
16.5 Authentication threat | 119 |
16.6 Threat to integrity of data | 119 |
RULES FOR SOLVING PROBLEMS | 120 |
16.7 Degree of materials authentication | 120 |
16.8 Data protection role | 120 |
16.9 Documentation role | 120 |
16.10 Responsibility for authentication preservation | 120 |
16.11 Data protection strategies | 121 |
TECHNICAL AND PRACTICAL ASPECTS | 121 |
16.12 Use of external services | 121 |
16.13 Practical aspects of data protection strategies | 121 |
16.12 Risk management | 125 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMMES | 126 |
16.13 The most important responsibilities | 126 |
16.14 Set priorities | 126 |
EXAMPLES | 126 |
16.15 Example 1 | 126 |
16.16 Example 2 | 126 |
ADDITIONAL INFORMATION SOURCES | 127 |
| |
Chapter 17. Accessibility preservation | 128 |
17.1 Aims | 128 |
17.2 Main problems | 128 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | .128 |
17.3 "Access paths" planning | 128 |
17.4 Temporal horizons of protection | 128 |
17.5 Acceptable waste level definitions | 129 |
RULES FOR SOLVING PROBLEMS | | 129 |
17.6 Programme responsibility | 129 |
17.7 Choice of materials which are worth preserving | 129 |
17.8 Choice of materials which have to be preserved | 129 |
17.9 Connection between data and software | 130 |
17.10 Choice of suitable strategies | 130 |
17.11 Current attitudes and principles | 131 |
17.12 Essential support for protection strategy | 131 |
17.13 Planning of emergency data recovery | 132 |
TECHNICAL AND PRACTICAL ASPECTS | 132 |
17.14 Introduction | 132 |
17.15 "Investment" strategies | 132 |
17.16 Short-term strategies | 140 |
17.17 Medium-term and long-term strategies | 147 |
17.18 Alternative strategies | 151 |
17.19 Connected strategies | 154 |
RECOMMENDATIONS FOR LIMITED RESOURCES PROGRAMMES | 154 |
17.20 Choice of cheaper options | 154 |
EXAMPLES | 155 |
17.21 Examples of strategies choice for different data types | 155 |
ADDITIONAL INFORMATION SOURCES | 155 |
| |
Chapter 18. Proposals for initial activities | 157 |
18.1 Aims | 157 |
18.2 Main problems | 157 |
THE MOST IMPORTANT ADMINISTRATIVE PROBLEMS | 157 |
18.1 Examples of initial activities | 157 |
SCRIPTS EXAMPLES | 158 |
18.3 Script l | 158 |
18.4 Script 2 | 159 |
18.5 Script 3 | 159 |
18.6 Script 4 | 160 |
18.7 Script 5 | 160 |
18.8 Script 6 | 161 |
MINIMUM PROGRAMMES | 161 |
| |
PART IV. ADDITIONAL INFORMATION |
| |
Chapter 19. Dictionary of terms | 167 |
19.1 Aim | 167 |
19.2 Terms | 167 |
| |
Chapter 20. Bibliography and supplementary sources | 171 |
20.1 Aims | 171 |
20.2 Content | 171 |
20.3 Actual information sources | 171 |
20.4 Universal character sources | 173 |
20.5 Dissemination of digital materials protection | 175 |
20.6 Library publicized materials protection | 175 |
20.7 Protection of registers (archives) content | 179 |
20.8 Protection of audiovisual materials | 181 |
20.9 Protection of data collection | 182 |
20.10 Protection of digital works of art | 183 |
20.11 Protection of e-mail messages | 183 |
20.12 Protection of collections of electronic printouts | 184 |
20.13 Protection of physical record of digital materials | 184 |
20.14 Conservation of information on digital form | 185 |
20.15 Legislative and voluntary deposit | 186 |
20.16 Metadata | 187 |
20.17 Standards | 187 |
20.18 Interesting tools | 188 |