1 Authenticity Capture Prototype Matt Dunckley, STFC.

Slides:



Advertisements
Similar presentations
1 Authenticity Capture Prototype Matt Dunckley, STFC.
Advertisements

Proposed Revised Mission of the Conformance Sig Current Mission Statement –The SIG Conformance will provide mechanisms for : 1. Specification of conformance.
Organising and Documenting Data Stuart Macdonald EDINA & Data Library DIY Research Data Management Training Kit for Librarians.
Fedora Users’ Conference Rutgers University May 14, 2005 Researching Fedora's Ability to Serve as a Preservation System for Electronic University Records.
HATHI TRUST A Shared Digital Repository Digital Repositories for Preservation and Access Digital Directions 2013 Jeremy York July 22, 2013 Unless otherwise.
PREMIS Conformance. Agenda 1.NLNZ and NLB conformance exercise 2.History of PREMIS Conformance 3.Current status 4.Mapping to functionality.
Institutional Repositories It’s not Just the Technology New England Archivists Boston College March 11, 2006 Eliot Wilczek University Records Manager Tufts.
An introduction to MEDIN Data Guidelines. What MEDIN data guidelines are not… Protocols for collection methods Prescriptive of how you have to collect.
Authentication of the Federal Register Charley Barth Director, Office of the Federal Register United States Government.
Digital Preservation - Its all about the metadata right? “Metadata and Digital Preservation: How Much Do We Really Need?” SAA 2014 Panel Saturday, August.
PREMIS in Thought: Data Center for LC Digital Holdings Ardys Kozbial, Arwen Hutt, David Minor February 11, 2008.
ISO & OAI-PMH By Neal Harmeyer, Amy Hatfield, and Brandon Beatty PURDUE UNIVERSITY RESEARCH REPOSITORY.
Mark Evans, Tessella Digital Preservation Boot Camp – PASIG meeting, Washington DC, 22 nd May 2013 PREMIS Practical Strategies For Preservation Metadata.
PREMIS What is PREMIS? – Preservation Metadata Implementation Strategies When is PREMIS use? – PREMIS is used for “repository design, evaluation, and archived.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation Mike Smorul, Joseph JaJa, Yang Wang, and Fritz McCall.
Archival Prototypes and Lessons Learned Mike Smorul UMIACS.
LRI Validation Suite Meeting November 1st, Agenda Review of LIS Test Plan Template CLIA Testing EHR testing (Juror Document)—Inspection Testing.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Electronic Archive Services in Lithuania Dr. Arūnas Stočkus Vilnius University Faculty of Mathematics and Informatics Lithuania EBNA,
Who is doing a good job in digital preservation? Audit and Certification of Digital Repositories: ISO and the European Framework.
Chapter 7 Database Auditing Models
Catherine Jones Science and Technology Facilities Council SCAPE Training Statsbiblioteket, Aarhus, November 2013 Control Policy formulation The why.
S/W Project Management
An introduction to MEDIN Data Guidelines. What MEDIN data guidelines are not… Protocols for collection methods Prescriptive of how you have to collect.
Access Across Time: How the NAA Preserves Digital Records Andrew Wilson Assistant Director, Preservation.
Conformance Mark Skall Lynne S. Rosenthal National Institute of Standards and Technology
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Archival Information Packages for NASA HDF-EOS Data R. Duerr, Kent Yang, Azhar Sikander.
Creating documentation and metadata: Recording provenance and context Jeff Arnfield National Climatic Data Center Version a1.0 Review Date.
BUILDING ON COMMON GROUND: EXPLORING THE INTERSECTION OF ARCHIVES AND DATA CURATION Lizzy Rolando & Wendy Hagenmaier 6/3/2015IASSIST 2015.
Digital Preservation: Current Thinking Anne Gilliland-Swetland Department of Information Studies.
Audit in electronic records management - Filip Boudrez - - Antwerp City Archives - ErpaWorkshop Antwerpen 16 april 2004.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
WGISS /09/2015 DATA PRESERVATION – CNES APPROACH B. Chausserie-Laprée.
PREMIS Implementation Fair, San Francisco, CA October 7, Stanford Digital Repository PREMIS & Geospatial Resources Nancy J. Hoebelheinrich Knowledge.
Evolving Issues in Electronic Data Collection Workshop Interoperability Russ Savage Electronic Transactions Liaison Arizona Secretary of State Office.
OAIS Rathachai Chawuthai Information Management CSIM / AIT Issued document 1.0.
Introducing Assessment Tools. What is an assessment tool? The instrument/s and procedures used to gather and interpret evidence of competence: –Instrument.
Hussein Suleman University of Cape Town Department of Computer Science Digital Libraries Laboratory February 2008 Data Curation Repositories:
CCSDS Meeting data Archive Ingest - June 2006 CNES 1 CCSDS - MOIMS Area Data Archive Ingest WG CNES Report Rome meeting – June 2006 Claude Huc.
Requirements engineering The process of establishing the services that the customer requires from a system and the constraints under which it operates.
Lifecycle Metadata for Digital Objects November 15, 2004 Preservation Metadata.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
Institutional Repositories July 2007 DIGITAL CURATION creating, managing and preserving digital objects Dr D Peters DISA Digital Innovation South.
@ulccwww.ulcc.ac.uk IRMS Cymru October 2015 From EDRMS to digital archive: a wish-list for ways to preserve digital records.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Data Management and Digital Preservation Carly Dearborn, MSIS Digital Preservation & Electronic Records Archivist
EUDAT Data Policy Manager Mark van de Sanden (SURFsara) Maria Francesca Iozzi (SIGMA/University of Oslo) Claudio Cacciari (CINECA) RDA 3 rd Plenary meeting.
R2R ↔ NODC Steve Rutz NODC Observing Systems Team Leader May 12, 2011 Presented by L. Pikula, IODE OceanTeacher Course Data Management for Information.
ISO/IEC
Chapter 11 Designing Inputs, Outputs, and Controls.
ECA 2010, Geneva, Switzerland Creating a synergy between BPM
An introduction to MEDIN Data Guidelines September 2016
OAIS Producer (archive) Consumer Management
8.3 Control Quality The process of monitoring and recording results of executing quality activities to assess performance and recommend necessary change.
D33.1B PEER REVIEW OF DIGITAL REPOSITORIES
Data Flows in ACTRIS: Considerations for Planning the Future
Exercise: understanding authenticity evidence
An Introduction to Tessella and The Safety Deposit Box Platform
An introduction to MEDIN Data Guidelines.
Registry Repository of Representation Information
Sophia Lafferty-hess | research data manager
Designing Assessment Things to be considered:
(acknowledgements to Mary Mowat, BGS)
Assessment Methods.
Robin Dale RLG OAIS Functionality Robin Dale RLG
Presentation transcript:

1 Authenticity Capture Prototype Matt Dunckley, STFC

2 Why we need tools Demonstrable Authenticity Trustworthiness (Implies Quality) Need to capture all information deemed necessary to make an informed judgement as to the authenticity Provide a customisable and flexible mechanism to define what is the important PDI that needs capturing Design is based on the Authenticity Model, which provides a standard process and framework

3 Authenticity Model Framework to record pertinent information using standard terminology Events – Capture information about an Event of importance Protocols – Executed in response to an event occurring Steps – Details information to capture for the event AuthProtocolExecutionReport – Result of execution used by community member to make a judgement

4 Nature of the Tool Keeping it simple to start with GUI tool Capture mainly textual information (Evidence) when events occur Consistent and Standard user experience to perform capture Where possible allow automated capture through plug-ins & external tools

5 User Roles – Use Cases Project Creator/Administrator –Sets up an Authenticity project - providing detailed project information - reasons, objectives, ie. the business case –Imports the projects Authenticity model, an XML ‘protocol’ document based on Authenticity Model Authenticity Information Capturer –Registers to Project –Edit/Add User Profile Information i.e credentials, details of their role, qualifications, affiliations, accreditations. –Creates and instance of a project, i.e for a particular digital object –Follows authenticity protocols / steps a procedure to capturing the specified information for each step –Sign off Capture as complete Researcher/Consumer / All users –Can search for authenticity information by project –Can browse the holdings –Export Captured information in various formats

6 Digests At each information capture point a digest of the information is recorded At the point of sign-off a digest of all captured information is recorded Example of information captured for Ionosonde station Location <capture capturer="us01" confidence="85" dateTime=" :09:36" hashAlorithum="md5“ hashValue="7a1e512cef9cfd93af cc2“ pdiID="Ionosonde-01_step1_pdi2" pdiValue="BUDAPEST - HUNGARY Geographic Latitude (WGS-84) 47.00°N Geographic Longitude (WGS-84) 19.00°E Magnetic Latitude (IGRF-10(2005) 45.93°N Magnetic Longitude (IGRF-10(2005)) °E“ projectID="Ionosonde" stepID="Ionosonde-01_step1" timestamp=" "/>

7 XML Protocol Document Defined by XML Schema – Based on Authenticity Model

8 User Experience / Flow diagram

9 Case Study Applied Auth Model - Ionosonde WDC, STFC To allow us to design of the Auth Protocols 1 st Statement of policy (Authenticity Recommendation) by which we can measure if we have captured enough evidence “Record all PDI necessary to verify the authenticity and quality of received data files for long term archival within the WDC” 2 nd Identify Events –Ingestion of raw data files in varying formats –Transformation of received data files into IIWG format –Final validation and archival of IIWG file within WDC 3 rd Design Protocols and steps

10 Ingestion Protocol Ingestion of raw data files in varying formats Recommendation (Policy) “In order for this digital data to be accepted as Ionosonde data of sufficient quality the reliability of its source must be verified and recorded by a WDC accredited archivist” Steps will capture –Source of dataset Evidence that this is indeed the source –Archivist name and details Ideally some form of credentials would be attached

11 Transformation Protocol Transformation of received data files into IIWG format Recommendation (Policy) “For the received data file to be deemed as sufficient quality to support data analysis it must have been successfully transformed into standard IIWG data format, the use of processing software must be recorded” Steps will capture –Details of transformation used Software details including name, version, source Time/date of process System details Details of person responsible Reason for believing this software is reliable –Details of Transformational Information Properties checked Information Property descriptions Values checked Details of how checked Details of who was responsible for the check

12 Archival Protocol Final validation and archival of IIWG file within WDC Recommendation (Criteria) “Successful validation of the IIWG structure and syntax must be achieved and recorded before long term archival can take place” Steps will capture –Details of validation process Details of checks performed Details of person responsible –Details of transfer to storage Details of person responsible Checks performed on transfer e.g. Fixity checks Details of archive and storage system Date/time of transfer