SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Case Study:Re-Accessioning at Yale Mark A. Matienzo Yale University
Overview Collaborative capacity building across two repositories Manuscripts and Archives Beinecke Rare Book and Manuscript Library Addressing previously received accessions of containing electronic records on media Still in testing phase, but working towards implementing in production
Types of Records and Media Wide variety of records creators Literary authors University faculty University offices Architectural firms Common types of media Floppy disks: 5.25” and 3.5” Optical media: CDROM, CD-R, DVD-R, etc. Zip disks USB flash drives
Goals of Re-Accessioning Identify, document, and register media Mitigate risk of media deterioration and obsolescence Extract basic metadata from filesystems on media and files contained on filesystems
Re-Accessioning Workflow
Disk Imaging Using “forensic” (bit-level) imaging process Ensure data on media is not manipulated using write-protection Uses software to acquire images Includes hash-based verification process
Media Log Using SharePoint list Contains unique identifier of media Records physical/logical characteristics of media Documents success, failure, or status of various processes and additional notes
Media Log
Media Log
Metadata Extraction Can be repurposed for descriptive, administrative, and technical metadata Uses command-line tools (Sleuthkit, fiwalk) Outputs XML document
Packaging and Transfer Using BagIt packages/Bagger application Packages contain disk images, extracted metadata, imaging logs, and high-level accession information Transfer to storage is verified by comparison against manifest
AIMS Workshop Case Study 2: Re-accessioning at Yale

Weitere ähnliche Inhalte

Ähnlich wie AIMS Workshop Case Study 2: Re-accessioning at Yale

Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 
Smith T Bio Hdf Bosc2008
Smith T Bio Hdf Bosc2008Smith T Bio Hdf Bosc2008
Smith T Bio Hdf Bosc2008bosc_2008
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data ManagementSoushilove
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data managementSoushilove
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data ManagementSoushilove
 
Lessons learned from the Digital Trenches: the experiences of two archivists ...
Lessons learned from the Digital Trenches: the experiences of two archivists ...Lessons learned from the Digital Trenches: the experiences of two archivists ...
Lessons learned from the Digital Trenches: the experiences of two archivists ...samalanmeister
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
 
Best Practices for Managing Born Digital Content
Best Practices for Managing Born Digital ContentBest Practices for Managing Born Digital Content
Best Practices for Managing Born Digital ContentRecollection Wisconsin
 
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 YearsJesse Wilkins
 
Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010iarthur
 
Rbms 2011 edwards
Rbms 2011 edwardsRbms 2011 edwards
Rbms 2011 edwardsglynnedw
 
RBMS 2011 edwards
RBMS 2011 edwardsRBMS 2011 edwards
RBMS 2011 edwardsglynnedw
 
RBMS 2011_Edwards
RBMS 2011_EdwardsRBMS 2011_Edwards
RBMS 2011_Edwardsglynnedw
 
operating system structure
operating system structureoperating system structure
operating system structureHAMZA AHMED
 

Ähnlich wie AIMS Workshop Case Study 2: Re-accessioning at Yale (20)

Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
Completepresentation
CompletepresentationCompletepresentation
Completepresentation
 
Smith T Bio Hdf Bosc2008
Smith T Bio Hdf Bosc2008Smith T Bio Hdf Bosc2008
Smith T Bio Hdf Bosc2008
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data management
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
Introduction to RDM for trainee physicians
Introduction to RDM for trainee physiciansIntroduction to RDM for trainee physicians
Introduction to RDM for trainee physicians
 
Electronic Records
Electronic RecordsElectronic Records
Electronic Records
 
Lessons learned from the Digital Trenches: the experiences of two archivists ...
Lessons learned from the Digital Trenches: the experiences of two archivists ...Lessons learned from the Digital Trenches: the experiences of two archivists ...
Lessons learned from the Digital Trenches: the experiences of two archivists ...
 
Digital Destiny
Digital DestinyDigital Destiny
Digital Destiny
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
 
Preservation and Access: Achieving the Best of Both Worlds
Preservation and Access: Achieving the Best of Both WorldsPreservation and Access: Achieving the Best of Both Worlds
Preservation and Access: Achieving the Best of Both Worlds
 
Best Practices for Managing Born Digital Content
Best Practices for Managing Born Digital ContentBest Practices for Managing Born Digital Content
Best Practices for Managing Born Digital Content
 
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years
20110428 ARMA Amarillo Managing Your Records in 5, 50, 500 Years
 
Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010
 
Rbms 2011 edwards
Rbms 2011 edwardsRbms 2011 edwards
Rbms 2011 edwards
 
RBMS 2011 edwards
RBMS 2011 edwardsRBMS 2011 edwards
RBMS 2011 edwards
 
RBMS 2011_Edwards
RBMS 2011_EdwardsRBMS 2011_Edwards
RBMS 2011_Edwards
 
operating system structure
operating system structureoperating system structure
operating system structure
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

AIMS Workshop Case Study 2: Re-accessioning at Yale

  • 1. Case Study:Re-Accessioning at Yale Mark A. Matienzo Yale University
  • 2. Overview Collaborative capacity building across two repositories Manuscripts and Archives Beinecke Rare Book and Manuscript Library Addressing previously received accessions of containing electronic records on media Still in testing phase, but working towards implementing in production
  • 3. Types of Records and Media Wide variety of records creators Literary authors University faculty University offices Architectural firms Common types of media Floppy disks: 5.25” and 3.5” Optical media: CDROM, CD-R, DVD-R, etc. Zip disks USB flash drives
  • 4. Goals of Re-Accessioning Identify, document, and register media Mitigate risk of media deterioration and obsolescence Extract basic metadata from filesystems on media and files contained on filesystems
  • 6. Disk Imaging Using “forensic” (bit-level) imaging process Ensure data on media is not manipulated using write-protection Uses software to acquire images Includes hash-based verification process
  • 7.
  • 8. Media Log Using SharePoint list Contains unique identifier of media Records physical/logical characteristics of media Documents success, failure, or status of various processes and additional notes
  • 11. Metadata Extraction Can be repurposed for descriptive, administrative, and technical metadata Uses command-line tools (Sleuthkit, fiwalk) Outputs XML document
  • 12. Packaging and Transfer Using BagIt packages/Bagger application Packages contain disk images, extracted metadata, imaging logs, and high-level accession information Transfer to storage is verified by comparison against manifest

Hinweis der Redaktion

  1. At Yale University, we have worked on a reaccessioning project that has allowed us to develop our thinking of how this accessioning of electronic records could best be realized for us going forward. Two repositories, Manuscripts and Archives and the Beinecke Rare Book and Manuscript Library, have worked in collaboration to implement software, hardware, and procedures that can be shared to support accessioning. In our reaccessioning project, we are working to establish better control over previously transferred accessions that contain electronic records on media such as floppy disks and CD-ROMs. These pieces of media were often received as part of a hybrid accession that also contained paper records, but in some cases we have received accessions of boxes containing only media.
  2. The goals of our reaccessioning project are fairly straightforward and relate to the three types of control discussed previously. First, we seek to establish administrative control of the media by identifying what it is and documenting its physical and logical characteristics and by assigning a unique identifier to each piece. Secondly, we are working towards gaining physical control of the media, which will allow us to mitigate the risks of media deterioration and obsolescence. Finally, we are trying to establish a basic level of intellectual control by extracting metadata about the filesystems and files contained on the media, such as file names, directory structures, and creation, access, and modification dates.
  3. Our reaccessioning workflow roughly looks like the following. We begin by retrieving the media and bringing it to the electronic records workstation, documenting its change in location within the Archivists’ Toolkit. We then assign unique identifiers to each of the media. We establish the best means by which to write-protect the media for imaging and record its identifying characteristics in a media log. We then put the media in the appropriate drive and create a forensic bit-level disk image, which includes all the files, the filesystem metadata, unused space – in other words, the entirety of the data on the media. We verify the image against the raw contents of the media and extract metadata from the disk image. Finally, we package the images and metadata and transfer the package into storage and complete the rest of the documentation.
  4. To acquire the data off media, we are using a forensic imaging process that extracts the entirety of the data off the media at the lowest level possible. To ensure that we do not intentionally or accidentally manipulate any of the data on the original media, we write-protect the media or reader. For floppy disks, we can use physical write protect tabs. For USB flash media, hard drives, and the like, we connect the drive or reader to a write-blocker, which is a piece of hardware connected to the computer that blocks low-level write signals from a computer. We use a variety of software to acquire the images, such as FTK Imager. The imaging software extracts the data from the media and calculates a cryptographic hash of the data on the media and the data within the image file. If the checksums match, the imaging is viewed as successful. [ADD FTK Imager SCREENSHOT? WRITEBLOCKER PHOTO?]
  5. This is a screenshot of FTK Imager, which we use to image media and to inspect disk images. You can see that the file listing includes regular files, slack or unused space on the disk, and deleted files, as denoted by the red X on the file icons.
  6. Our media log is a SharePoint list that contains identifying characteristics and physical and logical information about the media, such as the type of media, when it was imaged, the text of a label or writing on the media, and the type of filesystem or filesystems it contains. We assign each piece of media a unique identifier, which is a combination of theaccession number and incremental number. The media log also contains the workflow status of the accessioning process for each piece of media and whether processes succeeded or failed.
  7. The first screenshot is an overview for several pieces of media. You can see the unique media identifiers, the media format, and the workflow status.
  8. This expanded view shows all the fields, including further documentation about the disk image, the filesystem contained, and additional notes.
  9. If imaging is successful, we then extract metadata from the filesystem and files within the image. This is a software-based process that provides metadata such as file names, directory structures, creation and modification times, and approximate categorization of the types of files. This metadata can be repurposed in a variety of ways and provides a basic level of intellectual control that is comparable to a box list or other type of inventory for paper records. We are using open source software such as Sleuthkit and fiwalk to perform this extraction, but occasionally we need to rely on other tools for older or less common types of file systems.
  10. Finally, we create a transfer package using the BagIt specification as developed by the Library of Congress and the California Digital Library. To create the packages, we are using the Library of Congress-developed Bagger application. These packages contain the disk images, extracted metadata, and logs generated by the disk imaging software during the acquisition process. The BagIt packages also contain high-level information about the accession. For the time being, we are making a rough connection of one bag per accession, but we realize we may need to modify depending on the size of the accessions.
  11. This an overview of a sample bag, showing the structure and high-level metadata. Once packaged, we transfer the package to storage and verify the success of the transfer using procedures for the BagIt specification which compare the contents of the package against its manifest. If successful, we complete the rest of the documentation and record the success in the media log. We also record the storage location of the transferred package within the Archivists’ Toolkit and add the date of completion.