SlideShare ist ein Scribd-Unternehmen logo
1 von 19
What’s the problem? Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation
Digital preservation typically makes bleak reading …
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital preservation is not about ‘data’: Digital preservation is not about ‘access’:  Digital preservation is not about ‘risk’: it’s about people  and opportunity … and because people and technology continue to change it’s an ongoing process
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Risk Assessment Identify a risk ... Identify the consequences of that risk What is it’s likelihood? What is it’s impact? Risk Score: L x I How frequently does the risk occur? How often do we need to check? Who owns the risk?  How will we respond to the risk? How does our response change likelihood and impact?
Generic Digital Preservation Risks (there are more!) File format obsolesence Media degradation or failure Media obsolesence Barriers to access  (eg encryption) Insufficient resource discovery metadata Insufficient representational metadata Insufficient control (eg copyright) Authenticity and provenance is unclear Multiple copies are not synchronised Virus, trojans etc (aka malware) Disruptive technologies Poorly understood service dependencies …
Starting with risks .... RISK Likelihood Impact Score Frequency Owner Response Media will degrade 5 5 25 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Media will fail outright 3 5 15 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 5 5 25 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
Post mitigation risks .... RISK Likelihood Impact Score Frequency Owner Actions to maintain mitigation Media will degrade 3 1 3 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Sudden media failure 1 4 4 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 1 3 3 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
Two Worked Examples A whole class example live on screen Get your notebooks and ....... Write out TWELVE headings as follows: Risk, Consequence, Likelihood, Impact, Score, Proximity, Owner, Responses, New likelihood, New impact, New score, Frequency of review Do this twice, on two different pages. The first example we will do as a group,  The second one you should do on your own or with colleagues
Example 1: The Historic Parish Archive Archaeological Excavation: (closed) c. 1000 pages digitized text (TIFFS and PDFs) c. 500 photographs (TIFFS and JPEGS) c. 100 data tables (held as text) c. 25 Excel spreadsheets Architectural survey of building: (closed) c. 3000 images in JPEG format 25 CAD plans Parish newsletters and website: (ongoing) c. 500 document in variety of wp formats c. 150 web pages and images Oral History: (ongoing) c. 25 audio recordings Music performance: (ongoing) 10 hours of digital recordings Parish registers: (closed) Circa 1000 pages scanned (TIFFS) Based loosely on the Christ Church Spitalfields Archive, from ADS http://ads.ahds.ac.uk/catalogue/resources.html?spitalfields_var_2001
Example 2: The collection that worries you Existing Digital Archives: Digitized text (TIFFS and PDFs) Photographs (TIFFS and JPEGS) Data tables and  spreadsheets ... Ongoing data flows: Outputs from EDRMS Document in variety of office formats Web pages and images ... Things you know are coming:  Digital sound and vision Outputs from digitzation Corporate databases ...
So .... who’d like to start? RISK That  Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
Any examples you’d like to share? RISK That  Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
high risk low consequence high risk high consequence low risk low consequence low risk high consequence Consequences Risks low risk high consequence
 
Richard Blake,  Archives Sector Development,  The National Archives
Risk Appetite Explosive Risks Toxic risks Risk and  opportunity Project management (Prince2) Organisational risk register More Risk Management ...
Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation

Weitere ähnliche Inhalte

Ähnlich wie William Kilbride - Risk Management in Digital Preservation

2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunyaJosé Carlos Ramalho
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...Andris Soroka
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?Izar Tarandach
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Effective Software Development in the 21st Century
Effective Software Development in the 21st CenturyEffective Software Development in the 21st Century
Effective Software Development in the 21st CenturyAgileee
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan Özhan
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA SensePost
 
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfssuser4db968
 
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxssuser4db968
 

Ähnlich wie William Kilbride - Risk Management in Digital Preservation (20)

How big is your shadow?
How big is your shadow?How big is your shadow?
How big is your shadow?
 
2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
Prof m02 v2
Prof m02 v2Prof m02 v2
Prof m02 v2
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
Network security
Network securityNetwork security
Network security
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Effective Software Development in the 21st Century
Effective Software Development in the 21st CenturyEffective Software Development in the 21st Century
Effective Software Development in the 21st Century
 
Class vii
Class viiClass vii
Class vii
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA
 
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
 
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptx
 

Mehr von Scottish Library & Information Council (SLIC), CILIP in Scotland (CILIPS)

Mehr von Scottish Library & Information Council (SLIC), CILIP in Scotland (CILIPS) (20)

Unlocking Doors: recent initiatives in open and linked data at the National L...
Unlocking Doors: recent initiatives in open and linked data at the National L...Unlocking Doors: recent initiatives in open and linked data at the National L...
Unlocking Doors: recent initiatives in open and linked data at the National L...
 
Why link?
Why link?Why link?
Why link?
 
Linked Open Data
Linked Open DataLinked Open Data
Linked Open Data
 
Will's World: Walking Through Shakespeare
Will's World: Walking Through ShakespeareWill's World: Walking Through Shakespeare
Will's World: Walking Through Shakespeare
 
The Danish National Bibliography as LOD
The Danish National Bibliography as LODThe Danish National Bibliography as LOD
The Danish National Bibliography as LOD
 
Linked Open Data stuff
Linked Open Data stuffLinked Open Data stuff
Linked Open Data stuff
 
datos.bne.es: Publishing and consuming
datos.bne.es: Publishing and consumingdatos.bne.es: Publishing and consuming
datos.bne.es: Publishing and consuming
 
The University of Edinburgh's Mobile App
The University of Edinburgh's Mobile App The University of Edinburgh's Mobile App
The University of Edinburgh's Mobile App
 
Social Media and National Libraries
Social Media and National LibrariesSocial Media and National Libraries
Social Media and National Libraries
 
Growing Knowledge : Supporting the Digital Researcher
Growing Knowledge : Supporting the Digital Researcher Growing Knowledge : Supporting the Digital Researcher
Growing Knowledge : Supporting the Digital Researcher
 
Libguides in Academic Libraries
Libguides in Academic Libraries Libguides in Academic Libraries
Libguides in Academic Libraries
 
SLIC FE 2011 Karen Stevenson
SLIC FE 2011 Karen StevensonSLIC FE 2011 Karen Stevenson
SLIC FE 2011 Karen Stevenson
 
SLIC FE 2011Tom MacMaster
SLIC FE 2011Tom MacMasterSLIC FE 2011Tom MacMaster
SLIC FE 2011Tom MacMaster
 
SLICFE2011 Elaine Fulton
SLICFE2011 Elaine FultonSLICFE2011 Elaine Fulton
SLICFE2011 Elaine Fulton
 
Introducing Reader Development
Introducing Reader DevelopmentIntroducing Reader Development
Introducing Reader Development
 
SCURL Walk in Access Project
SCURL Walk in Access ProjectSCURL Walk in Access Project
SCURL Walk in Access Project
 
Innovation with reducing budgets British Library
Innovation with reducing budgets British LibraryInnovation with reducing budgets British Library
Innovation with reducing budgets British Library
 
mlibrary project Napier University
mlibrary project Napier Universitymlibrary project Napier University
mlibrary project Napier University
 
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
 
Nora Dale - Growing Knowledge: The evolution of research
Nora Dale - Growing Knowledge: The evolution of researchNora Dale - Growing Knowledge: The evolution of research
Nora Dale - Growing Knowledge: The evolution of research
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

William Kilbride - Risk Management in Digital Preservation

  • 1. What’s the problem? Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation
  • 2. Digital preservation typically makes bleak reading …
  • 3.
  • 4. Digital preservation is not about ‘data’: Digital preservation is not about ‘access’: Digital preservation is not about ‘risk’: it’s about people and opportunity … and because people and technology continue to change it’s an ongoing process
  • 5.
  • 6. Simple Risk Assessment Identify a risk ... Identify the consequences of that risk What is it’s likelihood? What is it’s impact? Risk Score: L x I How frequently does the risk occur? How often do we need to check? Who owns the risk? How will we respond to the risk? How does our response change likelihood and impact?
  • 7. Generic Digital Preservation Risks (there are more!) File format obsolesence Media degradation or failure Media obsolesence Barriers to access (eg encryption) Insufficient resource discovery metadata Insufficient representational metadata Insufficient control (eg copyright) Authenticity and provenance is unclear Multiple copies are not synchronised Virus, trojans etc (aka malware) Disruptive technologies Poorly understood service dependencies …
  • 8. Starting with risks .... RISK Likelihood Impact Score Frequency Owner Response Media will degrade 5 5 25 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Media will fail outright 3 5 15 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 5 5 25 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
  • 9. Post mitigation risks .... RISK Likelihood Impact Score Frequency Owner Actions to maintain mitigation Media will degrade 3 1 3 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Sudden media failure 1 4 4 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 1 3 3 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
  • 10. Two Worked Examples A whole class example live on screen Get your notebooks and ....... Write out TWELVE headings as follows: Risk, Consequence, Likelihood, Impact, Score, Proximity, Owner, Responses, New likelihood, New impact, New score, Frequency of review Do this twice, on two different pages. The first example we will do as a group, The second one you should do on your own or with colleagues
  • 11. Example 1: The Historic Parish Archive Archaeological Excavation: (closed) c. 1000 pages digitized text (TIFFS and PDFs) c. 500 photographs (TIFFS and JPEGS) c. 100 data tables (held as text) c. 25 Excel spreadsheets Architectural survey of building: (closed) c. 3000 images in JPEG format 25 CAD plans Parish newsletters and website: (ongoing) c. 500 document in variety of wp formats c. 150 web pages and images Oral History: (ongoing) c. 25 audio recordings Music performance: (ongoing) 10 hours of digital recordings Parish registers: (closed) Circa 1000 pages scanned (TIFFS) Based loosely on the Christ Church Spitalfields Archive, from ADS http://ads.ahds.ac.uk/catalogue/resources.html?spitalfields_var_2001
  • 12. Example 2: The collection that worries you Existing Digital Archives: Digitized text (TIFFS and PDFs) Photographs (TIFFS and JPEGS) Data tables and spreadsheets ... Ongoing data flows: Outputs from EDRMS Document in variety of office formats Web pages and images ... Things you know are coming: Digital sound and vision Outputs from digitzation Corporate databases ...
  • 13. So .... who’d like to start? RISK That Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
  • 14. Any examples you’d like to share? RISK That Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
  • 15. high risk low consequence high risk high consequence low risk low consequence low risk high consequence Consequences Risks low risk high consequence
  • 16.  
  • 17. Richard Blake, Archives Sector Development, The National Archives
  • 18. Risk Appetite Explosive Risks Toxic risks Risk and opportunity Project management (Prince2) Organisational risk register More Risk Management ...
  • 19. Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation