Project Prism Virtual Remote Control: Preservation Risk Management for Web Resources Nancy Y. McGovern, ECURE 2002.

Slides:



Advertisements
Similar presentations
Curating Research: problems and policy Dale Peters Scientific Technical Manager DRIVER II.
Advertisements

Digital Preservation A Matter of Trust. Context * As of March 5, 2011.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
Software Quality Assurance Plan
Knowledge Strategy & Leadership Intellectual Capital Management Organizational Culture and Communicaiton Collaboration and Community Building Knowledge.
Planning for Flexible Integration via Service-Oriented Architecture (SOA) APSR Forum – The Well-Integrated Repository Sydney, Australia February 2006 Sandy.
VRC: Preservation Risk Management for Web Resources Nancy Y. McGovern, ECURE 2004.
InterPARES Project Joanne Evans, School of Information Management and Systems, Monash University Description Cross-domain Description Cross Domain - Metadata.
Preservation Metadata Presentation to the CUL Metadata Working Group 15 February 2002 Nancy McGovern, Digital Preservation Officer, IRIS Bill Kehoe, Digital.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Robust Tools for Archiving and Preserving Digital Data Joseph JaJa, Mike Smorul, and Mike McGann Institute for Advanced Computer Studies Department of.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CASE Tools CIS 376 Bruce R. Maxim UM-Dearborn. Prerequisites to Software Tool Use Collection of useful tools that help in every step of building a product.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
IACT 901 Module 9 Establishing Technology Strategy - Scope & Purpose.
Lecture 15 Chapter 8 Organizing and Leading the IT Function.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Digital Preservation. The Past is Prologue Developing Preservation Approaches.
1 Web Development Life Cycle  Ensures project consistency and completeness –Planning –Analysis –Design and Development –Testing –Implementation and Maintenance.
HTML Comprehensive Concepts and Techniques Intro Project Introduction to HTML.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Web Development Process Description
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Preserving Digital Collections for Future Scholarship Oya Y. Rieger Cornell University
Master Thesis Defense Jan Fiedler 04/17/98
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Testing and Improving Interoperability The Z39.50 Interoperability Testbed William E. Moen School of Library and Information Sciences Texas Center for.
Auditing Information Systems (AIS)
CS 3610: Software Engineering – Fall 2009 Dr. Hisham Haddad – CSIS Dept. Chapter 2 The Software Process Discussion of the Software Process: Process Framework,
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
1 Strategic Plan for Digital Archives Programme DAP PROJECT SCOPE OVERVIEW STATUS.
Extending Access To Information Resource Discovery Service William E. Moen, Ph.D. Kathleen R. Murray, Ph.D. School of Library and Information Sciences.
Question Four: Project Risk Management PMBOK definition of Project Risk Project risk management is the art and science of identifying, analyzing, and responding.
HARRIET Hazard, Assessment, Risk Review Identification and Evaluation Tool.
Technical Communication A Practical Approach Chapter 14: Web Pages and Writing for the Web William Sanborn Pfeiffer Kaye Adkins.
NDSR Boston webinar: Digital Preservation Introduction Presenter: Nancy Y McGovern October 2015.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
TSS Database Inventory. CIRA has… Received and imported the 2002 and 2018 modeling data Decided to initially store only IMPROVE site-specific data Decided.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
A Resource Discovery Service for the Library of Texas Requirements, Architecture, and Interoperability Testing William E. Moen, Ph.D. Principal Investigator.
State of Georgia Release Management Training
Aligning Digital Preservation Policies with Community Standards Nancy McGovern Digital Preservation Officer.
SSE3 Knowledge mangement concepts 1. Agenda What is knowledge management Classification of knowledge Knowledge management process Common/shared information.
GROUP PresentsPresents. WEB CRAWLER A visualization of links in the World Wide Web Software Engineering C Semester Two Massey University - Palmerston.
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
Configuration Control (Aliases: change control, change management )
Cornell’s Electronic Student Records Systems (ESRS) Project By Nancy Y. McGovern Coordinator, Digital Imaging and Preservation Research Cornell University.
OAIS (archive) OAIS (archive) Producer Management Consumer.
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
3/24/051 Value-Added Surrogates for Distributed Content Establishing a Virtual Control Zone By: Sandra Payette & Carl Lagoze Presented By: Mohamed Elmiligui.
Data mining in web applications
CIS 375 Bruce R. Maxim UM-Dearborn
Chapter 1 Introduction to HTML
OAIS Producer (archive) Consumer Management
CAPE Internal Assessment
Overview: Fedora Architecture and Software Features
Implementation and Maintenance
NSDL Data Repository (NDR)
Nancy Y. McGovern Digital Preservation Officer, ICPSR IASSIST 2007
Presentation transcript:

Project Prism Virtual Remote Control: Preservation Risk Management for Web Resources Nancy Y. McGovern, ECURE 2002

The Project Part of a 4-year NSF-funded project –supported by the Digital Libraries Initiative, Phase 2 (Grant No. IIS , the Prism Project) An umbrella project that includes –Digital Libraries research team (Computer Science) –Human Computer Interface (HCI) –Cornell University Library (CUL) For updates: – Project Prism

The Team Anne R. Kenney Nancy Y. McGovern Peter Botticelli Richard Entlich William R. Kehoe Carl Lagoze Sandra Payette Project Prism

Preservation Risk Management Increased reliance by research libraries on Web resources not owned or controlled Need to monitor and evaluate resources Identify risks to resources and appropriate responses Technology introduces new threats, enables new solutions Project Prism

The Research Agenda see, "Preservation Risk Management for Web Resources: Virtual Remote Control in Cornell's Project Prism," by Anne R. Kenney, Nancy Y. McGovern, Peter Botticelli, Richard Entlich, Carl Lagoze, and Sandra Payette in DLib Magazine, January Project Prism

The Approach 1.Process 2.Identification 3.Analysis 4.Appraisal 5.Strategy 6.Detection 7.Response Project Prism

Process Adapt the Risk Management Model stages: Project Prism

Identification Establish boundary; Characterize content: example: parse the URL Project Prism

Analysis Define risks associated with: A Web page: –as a stand-alone object, ignoring its hyperlinks –in local context, considering the internal and external links A Web site: –as a semantically coherent set of linked Web pages –as an entity in a broader technical and organizational context Project Prism

Contextual Layers Project Prism

Page-level Monitoring Formatting: TIDY Standards compliance Document structure Metadata: –HTTP headers –HTML headers Changes –Content –Location Links –Out-link structure –In-link structure –Intra-site –Hub –Volatility Page provenance –URL parsing Log analysis Project Prism

Site-level Monitoring Graph analysis Static site analysis and Longitudinal study Aggregate page analyses Site maintenance indicators –Backup and archiving policies and procedures –Hardware and software environment –Network configuration and maintenance Project Prism

Appraisal Enable portfolio management: Hypothetical appraisal of a Web resource: Scope: highly relevant Value: high value, not essential; numerous links to page Relationship: secondary archives; informal agreement Maintenance: key indicators of good management Redundancy: captured by more than one archive Risk response: very responsive to risk notifications Capture: complex structure; cyclical updates; formats Size: medium-sized; 3-level crawl Project Prism

Portfolio Management Project Prism

Strategy Develop an organization-specific program: Project Prism

Detection Monitor change; initiate response: Track indicators of management practices: - markup language: version, formatting, compliance - HTTP: status codes, header content - changes: content, location - links: internal, external, volatility - server: security, version, upgrades, responsiveness Project Prism

Detection (cont.) Monitor change; initiate response: Identify potential risks - probable occurrence - frequency of occurrence - degree of impact Correlate to program-define response levels Identify appropriate risk/response scenario(s) Project Prism

Response Develop a toolkit: Inventory and evaluate existing tools Assess functionality for Prism stages Adopt/adapt existing tools Develop new tools Apply to appropriate contextual layers Integrate tools into customizable toolkit Project Prism

Types of Tools link analyzers log analyzers Web crawlers Web visualization programs Web site management utilities Project Prism

Future Directions Preservation Risk Management Program: –Develop program using Prism framework –Provide organizational scenarios Toolkit: –Complete inventory of tools –Build toolkit demonstrator Applications: –Develop presentation techniques for stored resources –Enable risk/response scenario development Project Prism