SlideShare a Scribd company logo
1 of 7
Download to read offline
GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3
Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving
Semantics [Digital Preservation]
Simon Waddington (King’s College London)
IDCC, Amsterdam, 25 February 2016
Appraisal
 Problem
 Terminology
 Appraisal tool requirements
 Appraisal process
 Given a collection of archival content comprising
complex digital objects
 Can we preserve the objects?
◦ Technical versus content-based appraisal
 Which objects will be reusable after 1,2,3,5.. years?
◦ Risks and their proximity?
◦ Impact/cost?
 Manual data gathering and risk analysis are time-
consuming and subjective
 Three main dimensions
◦ Risk – probability of an entity being non-usable
◦ Proximity – time frame in which we consider risk/impact
◦ Impact – potential loss of functionality and cost of mitigating
actions
 Mitigation (or preservation action)
◦ Process to transform entities in ecosystem
E.g. Transcoding, software upgrade, hardware replacement
 Types of risk
◦ Primary risk
 to an entity arising through a stimulus that is external to the
ecosystem
◦ Secondary (or higher order) risk
 to an entity as a result of a potential change to another entity on
which it has a dependency
 Periodically review the projects, both current and
completed, and perform a risk assessment to
understand the potential impact and the costs in
maintaining the data in a reusable form
 Assist a data manager or conservator in planning
any preservation actions that are required, and
provide an overall assessment of the reusability of
the data.
 Provide assessments of risk, proximity (i.e.
timescale in which the risk is expected to occur)
and impact
 Be largely automated
◦ Manual subjective assignment of risk should be avoided
 Easy to use
◦ By e.g. supporting visualisation of risk, proximity and
impact.
 Where possible, preservation actions should be
proposed and automated
◦ Provide ongoing, not just one-off assessments
1. Assess primary risks
a. Determine changes, probability and proximity
2. Determine secondary risks
a. Determine potentially affected entities
b. Probabilities of occurrence
3. Determine mitigating actions
a. Determine potential preservation actions
b. Estimate cost/impact
c. Present options to user
4. Implement and validate potential actions

More Related Content

Viewers also liked

Viewers also liked (11)

2014 08-14 SAA Appraisal in Archivematica
2014 08-14 SAA Appraisal in Archivematica2014 08-14 SAA Appraisal in Archivematica
2014 08-14 SAA Appraisal in Archivematica
 
2015 05-07-mac
2015 05-07-mac2015 05-07-mac
2015 05-07-mac
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
 
PERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolutionPERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolution
 
PERICLES Reflexive LRM
PERICLES Reflexive LRMPERICLES Reflexive LRM
PERICLES Reflexive LRM
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDP
 
PERICLES Preserving space data
PERICLES Preserving space dataPERICLES Preserving space data
PERICLES Preserving space data
 
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
 
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
 
Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
 

Similar to PERICLES workshop (IDCC 2016) - Appraisal

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
ejlp12
 
Southern Hemisphere Adaptation Collaboratory
Southern Hemisphere Adaptation CollaboratorySouthern Hemisphere Adaptation Collaboratory
Southern Hemisphere Adaptation Collaboratory
FAO
 

Similar to PERICLES workshop (IDCC 2016) - Appraisal (20)

Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
Environmental Management_LEC04.pptx
Environmental Management_LEC04.pptxEnvironmental Management_LEC04.pptx
Environmental Management_LEC04.pptx
 
IV Seminario Regional de Agricultura y Cambio Climático - Francisco Meza
IV Seminario Regional de Agricultura y Cambio Climático - Francisco Meza IV Seminario Regional de Agricultura y Cambio Climático - Francisco Meza
IV Seminario Regional de Agricultura y Cambio Climático - Francisco Meza
 
Suedel Sess5 102309[1]
Suedel Sess5 102309[1]Suedel Sess5 102309[1]
Suedel Sess5 102309[1]
 
DSD-INT 2023 Dynamic Adaptive Policy Pathways (DAPP) - Theory & Showcase - Wa...
DSD-INT 2023 Dynamic Adaptive Policy Pathways (DAPP) - Theory & Showcase - Wa...DSD-INT 2023 Dynamic Adaptive Policy Pathways (DAPP) - Theory & Showcase - Wa...
DSD-INT 2023 Dynamic Adaptive Policy Pathways (DAPP) - Theory & Showcase - Wa...
 
Eia methodogies
Eia methodogiesEia methodogies
Eia methodogies
 
Green Building and Technology Unit 3
Green Building and Technology Unit 3Green Building and Technology Unit 3
Green Building and Technology Unit 3
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
 
Access Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk AreasAccess Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk Areas
 
EIA Methods
EIA MethodsEIA Methods
EIA Methods
 
EIA
EIAEIA
EIA
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
Southern Hemisphere Adaptation Collaboratory
Southern Hemisphere Adaptation CollaboratorySouthern Hemisphere Adaptation Collaboratory
Southern Hemisphere Adaptation Collaboratory
 
Igor Linkov
Igor LinkovIgor Linkov
Igor Linkov
 
Risk strategies presentation
Risk strategies presentationRisk strategies presentation
Risk strategies presentation
 
Impact prediction, evaluation and mitigation in eia
Impact prediction, evaluation and mitigation in eiaImpact prediction, evaluation and mitigation in eia
Impact prediction, evaluation and mitigation in eia
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Assessing Climate Vulnerabilities in Data-Poor Environments
Assessing Climate Vulnerabilities in Data-Poor EnvironmentsAssessing Climate Vulnerabilities in Data-Poor Environments
Assessing Climate Vulnerabilities in Data-Poor Environments
 

More from PERICLES_FP7

Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on Change
PERICLES_FP7
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
PERICLES_FP7
 

More from PERICLES_FP7 (20)

Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17
 
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
 
Technical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopTechnical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshop
 
ForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information Model
 
Data quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectiveData quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspective
 
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
 
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
 
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
 
Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on Change
 
Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
 
Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016
 
Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...
 
PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016
 
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
 
Semi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termSemi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-term
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT Framework
 
PERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) Technique
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

PERICLES workshop (IDCC 2016) - Appraisal

  • 1. GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3 Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital Preservation] Simon Waddington (King’s College London) IDCC, Amsterdam, 25 February 2016 Appraisal
  • 2.  Problem  Terminology  Appraisal tool requirements  Appraisal process
  • 3.  Given a collection of archival content comprising complex digital objects  Can we preserve the objects? ◦ Technical versus content-based appraisal  Which objects will be reusable after 1,2,3,5.. years? ◦ Risks and their proximity? ◦ Impact/cost?  Manual data gathering and risk analysis are time- consuming and subjective
  • 4.  Three main dimensions ◦ Risk – probability of an entity being non-usable ◦ Proximity – time frame in which we consider risk/impact ◦ Impact – potential loss of functionality and cost of mitigating actions  Mitigation (or preservation action) ◦ Process to transform entities in ecosystem E.g. Transcoding, software upgrade, hardware replacement  Types of risk ◦ Primary risk  to an entity arising through a stimulus that is external to the ecosystem ◦ Secondary (or higher order) risk  to an entity as a result of a potential change to another entity on which it has a dependency
  • 5.  Periodically review the projects, both current and completed, and perform a risk assessment to understand the potential impact and the costs in maintaining the data in a reusable form  Assist a data manager or conservator in planning any preservation actions that are required, and provide an overall assessment of the reusability of the data.
  • 6.  Provide assessments of risk, proximity (i.e. timescale in which the risk is expected to occur) and impact  Be largely automated ◦ Manual subjective assignment of risk should be avoided  Easy to use ◦ By e.g. supporting visualisation of risk, proximity and impact.  Where possible, preservation actions should be proposed and automated ◦ Provide ongoing, not just one-off assessments
  • 7. 1. Assess primary risks a. Determine changes, probability and proximity 2. Determine secondary risks a. Determine potentially affected entities b. Probabilities of occurrence 3. Determine mitigating actions a. Determine potential preservation actions b. Estimate cost/impact c. Present options to user 4. Implement and validate potential actions