Serveur d'exploration sur SGML

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

The State of the Art and Practice in Digital Preservation

Identifieur interne : 000196 ( Pmc/Corpus ); précédent : 000195; suivant : 000197

The State of the Art and Practice in Digital Preservation

Auteurs : Kyong-Ho Lee ; Oliver Slattery ; Richang Lu ; Xiao Tang ; Victor Mccrary

Source :

RBID : PMC:4865277

Abstract

The goal of digital preservation is to ensure long-term access to digitally stored information. In this paper, we present a survey of techniques used in digital preservation. We also introduce representative digital preservation projects and case studies that provide insight into the advantages and disadvantages of different preservation strategies. Finally, the pros and cons of current strategies, critical issues for digital preservation, and future directions are discussed.


Url:
DOI: 10.6028/jres.107.010
PubMed: 27446721
PubMed Central: 4865277

Links to Exploration step

PMC:4865277

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">The State of the Art and Practice in Digital Preservation</title>
<author>
<name sortKey="Lee, Kyong Ho" sort="Lee, Kyong Ho" uniqKey="Lee K" first="Kyong-Ho" last="Lee">Kyong-Ho Lee</name>
</author>
<author>
<name sortKey="Slattery, Oliver" sort="Slattery, Oliver" uniqKey="Slattery O" first="Oliver" last="Slattery">Oliver Slattery</name>
</author>
<author>
<name sortKey="Lu, Richang" sort="Lu, Richang" uniqKey="Lu R" first="Richang" last="Lu">Richang Lu</name>
</author>
<author>
<name sortKey="Tang, Xiao" sort="Tang, Xiao" uniqKey="Tang X" first="Xiao" last="Tang">Xiao Tang</name>
</author>
<author>
<name sortKey="Mccrary, Victor" sort="Mccrary, Victor" uniqKey="Mccrary V" first="Victor" last="Mccrary">Victor Mccrary</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">27446721</idno>
<idno type="pmc">4865277</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4865277</idno>
<idno type="RBID">PMC:4865277</idno>
<idno type="doi">10.6028/jres.107.010</idno>
<date when="2002">2002</date>
<idno type="wicri:Area/Pmc/Corpus">000196</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000196</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">The State of the Art and Practice in Digital Preservation</title>
<author>
<name sortKey="Lee, Kyong Ho" sort="Lee, Kyong Ho" uniqKey="Lee K" first="Kyong-Ho" last="Lee">Kyong-Ho Lee</name>
</author>
<author>
<name sortKey="Slattery, Oliver" sort="Slattery, Oliver" uniqKey="Slattery O" first="Oliver" last="Slattery">Oliver Slattery</name>
</author>
<author>
<name sortKey="Lu, Richang" sort="Lu, Richang" uniqKey="Lu R" first="Richang" last="Lu">Richang Lu</name>
</author>
<author>
<name sortKey="Tang, Xiao" sort="Tang, Xiao" uniqKey="Tang X" first="Xiao" last="Tang">Xiao Tang</name>
</author>
<author>
<name sortKey="Mccrary, Victor" sort="Mccrary, Victor" uniqKey="Mccrary V" first="Victor" last="Mccrary">Victor Mccrary</name>
</author>
</analytic>
<series>
<title level="j">Journal of Research of the National Institute of Standards and Technology</title>
<idno type="ISSN">1044-677X</idno>
<idno type="eISSN">2165-7254</idno>
<imprint>
<date when="2002">2002</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>The goal of digital preservation is to ensure long-term access to digitally stored information. In this paper, we present a survey of techniques used in digital preservation. We also introduce representative digital preservation projects and case studies that provide insight into the advantages and disadvantages of different preservation strategies. Finally, the pros and cons of current strategies, critical issues for digital preservation, and future directions are discussed.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct>
<analytic>
<author>
<name sortKey="Woodyard, D" uniqKey="Woodyard D">D Woodyard</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Levy, Dm" uniqKey="Levy D">DM Levy</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Russell, K" uniqKey="Russell K">K Russell</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Chen, S S" uniqKey="Chen S">S-S Chen</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Garrett, J" uniqKey="Garrett J">J Garrett</name>
</author>
<author>
<name sortKey="Waters, D" uniqKey="Waters D">D Waters</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hendley, T" uniqKey="Hendley T">T Hendley</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fresko, M" uniqKey="Fresko M">M Fresko</name>
</author>
<author>
<name sortKey="Tombs, K" uniqKey="Tombs K">K Tombs</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Woodyard, D" uniqKey="Woodyard D">D Woodyard</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rothenberg, J" uniqKey="Rothenberg J">J Rothenberg</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zwaneveld, Eh" uniqKey="Zwaneveld E">EH Zwaneveld</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Waugh, A" uniqKey="Waugh A">A Waugh</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bearman, D" uniqKey="Bearman D">D Bearman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Graham, Ps" uniqKey="Graham P">PS Graham</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rothenberg, J" uniqKey="Rothenberg J">J Rothenberg</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Granger, S" uniqKey="Granger S">S Granger</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gilheany, S" uniqKey="Gilheany S">S Gilheany</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rothenberg, J" uniqKey="Rothenberg J">J Rothenberg</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Werf Davelaar, T" uniqKey="Werf Davelaar T">T Werf-Davelaar</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Holdsworth, D" uniqKey="Holdsworth D">D Holdsworth</name>
</author>
<author>
<name sortKey="Wheatley, P" uniqKey="Wheatley P">P Wheatley</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Holdsworth, D" uniqKey="Holdsworth D">D Holdsworth</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eaton, Fl" uniqKey="Eaton F">FL Eaton</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bearman, D" uniqKey="Bearman D">D Bearman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wheatley, P" uniqKey="Wheatley P">P Wheatley</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bearman, D" uniqKey="Bearman D">D Bearman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lawrence, Gw" uniqKey="Lawrence G">GW Lawrence</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Harris, J" uniqKey="Harris J">J Harris</name>
</author>
<author>
<name sortKey="Ruben, I" uniqKey="Ruben I">I Ruben</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rieger, Oy" uniqKey="Rieger O">OY Rieger</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Day, M" uniqKey="Day M">M Day</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shepard, T" uniqKey="Shepard T">T Shepard</name>
</author>
<author>
<name sortKey="Maccarn, D" uniqKey="Maccarn D">D MacCarn</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Maccarn, D" uniqKey="Maccarn D">D MacCarn</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shepard, T" uniqKey="Shepard T">T Shepard</name>
</author>
<author>
<name sortKey="Maccarn, D" uniqKey="Maccarn D">D MacCarn</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Heminger, Ar" uniqKey="Heminger A">AR Heminger</name>
</author>
<author>
<name sortKey="Robertson, Sb" uniqKey="Robertson S">SB Robertson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shepard, T" uniqKey="Shepard T">T Shepard</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kranch, Da" uniqKey="Kranch D">DA Kranch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kranch, Da" uniqKey="Kranch D">DA Kranch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cloonan, Mv" uniqKey="Cloonan M">MV Cloonan</name>
</author>
<author>
<name sortKey="Sanett, S" uniqKey="Sanett S">S Sanett</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kenney, Ar" uniqKey="Kenney A">AR Kenney</name>
</author>
<author>
<name sortKey="Rieger, Oy" uniqKey="Rieger O">OY Rieger</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Phillips, Me" uniqKey="Phillips M">ME Phillips</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Webb, C" uniqKey="Webb C">C Webb</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Inouye, As" uniqKey="Inouye A">AS Inouye</name>
</author>
<author>
<name sortKey="Digital, A" uniqKey="Digital A">A Digital</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Moore, R" uniqKey="Moore R">R Moore</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Moore, R" uniqKey="Moore R">R Moore</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Duranti, L" uniqKey="Duranti L">L Duranti</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Podio, F" uniqKey="Podio F">F Podio</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bhagavatula, Vk" uniqKey="Bhagavatula V">VK Bhagavatula</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shannon, Ce" uniqKey="Shannon C">CE Shannon</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lupovici, C" uniqKey="Lupovici C">C Lupovici</name>
</author>
<author>
<name sortKey="Masanes, J" uniqKey="Masanes J">J Masanès</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cullen, Ct" uniqKey="Cullen C">CT Cullen</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dollar, C" uniqKey="Dollar C">C Dollar</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Russell, K" uniqKey="Russell K">K Russell</name>
</author>
<author>
<name sortKey="Weinberger, E" uniqKey="Weinberger E">E Weinberger</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">J Res Natl Inst Stand Technol</journal-id>
<journal-id journal-id-type="iso-abbrev">J Res Natl Inst Stand Technol</journal-id>
<journal-id journal-id-type="publisher-id">JRES</journal-id>
<journal-title-group>
<journal-title>Journal of Research of the National Institute of Standards and Technology</journal-title>
</journal-title-group>
<issn pub-type="ppub">1044-677X</issn>
<issn pub-type="epub">2165-7254</issn>
<publisher>
<publisher-name>[Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">27446721</article-id>
<article-id pub-id-type="pmc">4865277</article-id>
<article-id pub-id-type="doi">10.6028/jres.107.010</article-id>
<article-id pub-id-type="publisher-id">j71lee</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>The State of the Art and Practice in Digital Preservation</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Lee</surname>
<given-names>Kyong-Ho</given-names>
</name>
<email>kyong-ho.lee@nist.gov</email>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Slattery</surname>
<given-names>Oliver</given-names>
</name>
<email>oliver.slattery@nist.gov</email>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Lu</surname>
<given-names>Richang</given-names>
</name>
<email>richang.lu@nist.gov</email>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Tang</surname>
<given-names>Xiao</given-names>
</name>
<email>xiao.tang@nist.gov</email>
</contrib>
<contrib contrib-type="author">
<name>
<surname>McCrary</surname>
<given-names>Victor</given-names>
</name>
<email>victor.mccrary@nist.gov</email>
</contrib>
<aff id="af1-j71lee">National Institute of Standards and Technology, Gaithersburg, MD 20899-8951</aff>
</contrib-group>
<pub-date pub-type="ppub">
<season>Jan-Feb</season>
<year>2002</year>
</pub-date>
<pub-date pub-type="epub">
<day>01</day>
<month>2</month>
<year>2002</year>
</pub-date>
<volume>107</volume>
<issue>1</issue>
<fpage>93</fpage>
<lpage>106</lpage>
<history>
<date date-type="accepted">
<day>29</day>
<month>11</month>
<year>2001</year>
</date>
</history>
<permissions>
<copyright-year>2002</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/publicdomain/zero/1.0/">
<license-p>The Journal of Research of the National Institute of Standards and Technology is a publication of the U.S. Government. The papers are in the public domain and are not subject to copyright in the United States. Articles from J Res may contain photographs or illustrations copyrighted by other commercial organizations or individuals that may not be used without obtaining prior approval from the holder of the copyright.</license-p>
</license>
</permissions>
<abstract>
<p>The goal of digital preservation is to ensure long-term access to digitally stored information. In this paper, we present a survey of techniques used in digital preservation. We also introduce representative digital preservation projects and case studies that provide insight into the advantages and disadvantages of different preservation strategies. Finally, the pros and cons of current strategies, critical issues for digital preservation, and future directions are discussed.</p>
</abstract>
<kwd-group>
<kwd>digital preservation</kwd>
<kwd>emulation</kwd>
<kwd>encapsulation</kwd>
<kwd>migration</kwd>
<kwd>standardization</kwd>
<kwd>XML</kwd>
</kwd-group>
<funding-group>
<award-group>
<funding-source>National Institute of Standards and Technology</funding-source>
<award-id>9999-NIST</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec>
<title>1. Introduction</title>
<p>Information preservation is one of the most important issues in human history, culture, and economics, as well as the development of our civilization. While earliest information was recorded in carvings on stone, ceramic, bamboo, or wood, the development of civilization paved the way for new storage media and techniques for recording information, such as writing on silk or printing on paper. Eventually we were able to put photographic images on film and music on records. A revolutionary change occurred in the information storage field with the invention of electronic storage media.</p>
<p>With the advent of high-performance computing and high-speed networks, the use of digital technologies is increasing rapidly. Digital technologies enable information to be created, manipulated, disseminated, located, and stored with increasing ease. Ensuring long-term access to the digitally stored information poses a significant challenge, and is increasingly recognized as an important part of digital data management [
<xref rid="b1-j71lee" ref-type="bibr">1</xref>
,
<xref rid="b2-j71lee" ref-type="bibr">2</xref>
].</p>
<p>The evolution of data storage media and the development of the preservation technology can be described as shown in
<xref rid="f1-j71lee" ref-type="fig">Fig. 1</xref>
. This diagram lists the various media used in data storage (both digital and analog) and the techniques needed to ensure that the data on them is preserved. It also highlights the trend from analog to digital/optical storage media and indicates the transfer of data from one generation of media to the next. It is clear that while it is easier to create, amend, and distribute digital data, the media storing this data such as optical discs are not as robust as traditional analog media such as paper or film. In view of modern information preservation requirements, this paper will focus on the aspects of the technical strategies used in digital information preservation.</p>
<p>Digital preservation involves the retention of both the information object and its meaning. It is therefore necessary that preservation techniques be able to understand and re-create the original form or function of the object to ensure its authenticity and accessibility. Preservation of digital information is complex because of the dependency digital information has on its technical environment. Furthermore, as newer digital technologies rapidly appear and older ones are discontinued, information that relies on obsolete technologies soon becomes inaccessible. Therefore, digital resources present more difficult problems than conventional analog media such as paper-based books [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
].</p>
<p>Recently, several approaches for digital preservation have been identified and presented. Conventional methods are mainly technology emulation, information migration, and encapsulation [
<xref rid="b4-j71lee" ref-type="bibr">4</xref>
,
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
,
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
,
<xref rid="b7-j71lee" ref-type="bibr">7</xref>
,
<xref rid="b8-j71lee" ref-type="bibr">8</xref>
]. However, there is a lack of proven preservation methods to ensure that the information will continue to be readable.</p>
<p>To promote a solid understanding of the pros and cons of different preservation techniques, this paper tries to present a comprehensive survey of them through a review of a wide range of literature and representative projects. We suggest a preservation strategy based on XML (eXtensible Markup Language) [
<xref rid="b9-j71lee" ref-type="bibr">9</xref>
] for interoperability and interchangeability of preserved digital information. The most appropriate preservation strategy should be determined by considering various aspects including cost-effectiveness, legal restrictions, and user access requirements. However, as stated earlier, this paper particularly focuses on the technical issues of preservation.</p>
<p>This paper is organized as follows. Section 2 summarizes various techniques for digital preservation. Their advantages and disadvantages are presented through a literature survey. By introducing current projects and case studies, the application of these preservation techniques is described in detail in Sec. 3. Finally, points of discussion and a summary are given in Sec. 4.</p>
</sec>
<sec>
<title>2. Digital Preservation Techniques</title>
<p>This section introduces the current strategies for digital preservation. Techniques for the preservation of digital information include technology preservation, technology emulation, information migration, and encapsulation.</p>
<p>Digital resources can be stored on any medium that can represent their binary digits or bits, such as a CD-ROM or a DVD. Rothenberg [
<xref rid="b10-j71lee" ref-type="bibr">10</xref>
] defines a bit stream as an intended meaningful sequence of bits with no intervening spaces, punctuation, or formatting. To preserve that bit stream, the first requirement is to ensure that the bit stream is stored on a stable medium. If the digital medium deteriorates or becomes obsolete before the digital information has been copied onto another medium, the data will be lost.</p>
<p>Therefore, digital preservation involves copying the digital information onto newer media before the old media becomes so obsolete that the data cannot be accessed. This is referred to as copying or refreshing [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
,
<xref rid="b8-j71lee" ref-type="bibr">8</xref>
]. This process preserves the integrity of the digital information. Well-established techniques for preserving the integrity of the digital information exist at this level [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
].</p>
<p>For timely refreshing, the lifetime of digital storage media must be predicted. The lifetime of a medium determines the period of time in which the information recorded on the medium is stored safely without loss. The specification of the lifetime of the medium will prompt librarians or archivists to refresh their media before medium deterioration. Recently, Zwaneveld [
<xref rid="b11-j71lee" ref-type="bibr">11</xref>
] suggested that media could be rated into five classes according to certain criteria including the lifetime.</p>
<p>However, simply copying the digital information is not always sufficient as a preservation strategy [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
]. One has to ensure that the information can be retrieved and processed in the future. Retrieving a bit stream requires a hardware device such as a disk drive for reading the physical representation of the bits from the medium, as well as driver software.</p>
<p>Existing preservation strategies can be broadly classified into two main approaches as shown in
<xref rid="f2-j71lee" ref-type="fig">Fig. 2</xref>
. The first is the more conservative approach where the original technological environment is fully preserved for decoding the digital information in the future. This approach can be further divided into two preservation techniques. The first is to preserve the working replicas of all computer hardware and software platforms for future use. This is referred to as the technology preservation strategy [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
]. The other is to program the newer computer systems to emulate on demand the older obsolete platforms and operating systems. This is the so-called technology emulation strategy [
<xref rid="b10-j71lee" ref-type="bibr">10</xref>
].</p>
<p>The second approach is to overcome the technical obsolescence of file formats. It may also be classified into two techniques. The first is to transform or convert the old digital resource to a format that is independent of the particular hardware and software that were applied to create them. This is called the information migration strategy [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
]. The second technique, termed encapsulation, is where a digital object and anything else necessary to provide access to that object are grouped together and preserved [
<xref rid="b12-j71lee" ref-type="bibr">12</xref>
].</p>
<sec>
<title>2.1 Technology Preservation</title>
<p>This solution supposes that complete museums of obsolete equipment could be maintained in order to replicate any old configuration of hardware and software [
<xref rid="b13-j71lee" ref-type="bibr">13</xref>
]. This strategy involves preserving an original application program, operating system software, and hardware platform [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
].</p>
<p>The advocates of this strategy emphasize that the original environment needs to be run to really preserve the behavior as well as the look and feel of the digital object. For some digital objects, this may be the best solution at least in the short-term because it ensures that the material is accessible by preserving the access tools as well as the object itself.</p>
<p>However, various issues including space, maintenance, and costs may make this impossible in the longer term. Specifically, equipment ages and breaks, documentation disappears, vendor support vanishes, and the storage medium as well as the equipment deteriorates [
<xref rid="b14-j71lee" ref-type="bibr">14</xref>
]. This strategy also limits the portability of the resource since it will depend on hardware stored in specific locations [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
].</p>
</sec>
<sec>
<title>2.2 Technology Emulation</title>
<p>This strategy has a lot in common with the technology preservation strategy. It involves preserving the original application program. Emulator programs can be designed and run on future computer platforms. The emulator is programmed to mimic the behavior of old hardware platforms and operating system software, such as for games and executable files [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
,
<xref rid="b16-j71lee" ref-type="bibr">16</xref>
]. However, this strategy does not involve preserving ageing hardware and original operating system software.</p>
<p>The goal of emulation is to preserve the look and feel of the digital object as well as its functionality. The essence of this strategy is to copy the technical context of the resource allowing the original object or a refreshed copy of the original object to be used in the future. Rothenberg illustrates the conceptual view of the relationships among elements of the emulation process as shown in
<xref rid="f3-j71lee" ref-type="fig">Fig. 3</xref>
[
<xref rid="b15-j71lee" ref-type="bibr">15</xref>
]. This approach decouples application programs from the platform via a virtual machine with the result that applications can run on different platforms by migrating the virtual machine to those platforms. The Java virtual machine might be an example.</p>
<p>Hendley sees emulation as a short to medium term strategy or a specialist strategy where the need to maintain the physical presence of the original digital resource is of great importance to the users. Again, he sees technology emulation being primarily used in cases where digital resources cannot be converted into software independent formats and migrated forward.</p>
<p>Waugh et al. [
<xref rid="b12-j71lee" ref-type="bibr">12</xref>
] indicate that the application software itself could contain viruses that would result in the loss of information over time. Particularly, they note that emulation requires preserving a significant amount of information. They consider it useful if the goal is to preserve the software as an artifact itself and if future user organizations lack sufficient knowledge to understand the format of the digital information. Granger [
<xref rid="b16-j71lee" ref-type="bibr">16</xref>
] discusses its potential advantages such as the re-creation of the look and feel of the resource. They identify the possible disadvantages as the undefined nature of technological change and the complexity of creating emulator specifications. His conclusion is that emulation is not a complete digital preservation solution but a partial one.</p>
<p>On the contrary, Russell [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
] states that emulation potentially offers the best solution for very long-term preservation of digital material, especially for resources for which the value is unknown and where future use of the material is unlikely. Woodyard [
<xref rid="b1-j71lee" ref-type="bibr">1</xref>
] points out that emulation could be a more suitable solution than migration for long-term access to complex digital resources such as executable files. Gilheany [
<xref rid="b18-j71lee" ref-type="bibr">18</xref>
] discusses the need for emulators to permanently preserve the functionality of computers. Rothenberg advocates and recommends emulation as the best possible solution [
<xref rid="b10-j71lee" ref-type="bibr">10</xref>
,
<xref rid="b18-j71lee" ref-type="bibr">18</xref>
] and presents results from the first phase of an emulation experiment [
<xref rid="b15-j71lee" ref-type="bibr">15</xref>
] in the Networked European Deposit Library (NEDLIB)
<xref ref-type="fn" rid="fn1-j71lee">1</xref>
project [
<xref rid="b19-j71lee" ref-type="bibr">19</xref>
].</p>
<p>Holdsworth and Wheatley [
<xref rid="b20-j71lee" ref-type="bibr">20</xref>
] consider the method of Rothenberg, in which the production of an emulator can be postponed by instead producing an emulator specification at the time of platform obsolescence, as a very risky approach to preserving information forever. This is because there is no guarantee that a specification produced can be used to produce an emulator in the future. They present some illustrative guidelines for the use of emulation and argue that emulation is a valid method of digital preservation, at least for systems where the documentation is not available in electronic form. Holdsworth [
<xref rid="b21-j71lee" ref-type="bibr">21</xref>
] also suggests the use of widely available programming languages such as C in the implementation of emulation.</p>
<p>The emulation approach requires detailed specifications for the outdated hardware and operating system software [
<xref rid="b10-j71lee" ref-type="bibr">10</xref>
]. Therefore, standard formats for the emulation specification need to be developed. The extent to which emulation should mimic the original technical environment entirely or emulates only those components necessary to access the data remains an issue for debate.</p>
</sec>
<sec>
<title>2.3 Information Migration</title>
<p>The migration of digital information refers to the periodic transfer of digital materials from one hardware and software configuration to another, or from one generation of computer technology to a subsequent generation [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
]. The purpose of migration is to preserve the integrity of digital objects and to retain the ability of users to retrieve, display, and use them in the face of constantly changing technology.</p>
<p>The Open Archiving Information System (OAIS) model [
<xref rid="b22-j71lee" ref-type="bibr">22</xref>
], developed by the Consultative Committee for Space Data Systems (CCSDS)
<xref ref-type="fn" rid="fn2-j71lee">2</xref>
, breaks migration into four categories: refreshment, replication, repackaging, and transformation. Refreshment ensures that a reliable copy of the bit stream of a digital object is maintained while replication and repackaging ensure that a manageable package of the object is available. On the other hand, transformation actually modifies the bit stream of a digital object and this is what is considered as the process of migration in this paper.</p>
<p>Rather than focus on the technology, information migration tends to focus on the intellectual content and on ensuring its accessibility using current technology [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
]. This strategy could be facilitated through copying the digital information to an analog medium or through application programs that are backward compatible. It could also be facilitated through the conversion of digital resources into a small number of standard formats that are hardware and software independent [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
].</p>
<p>The first solution involves the transfer of digital resources from less stable to more stable analog media such as paper or microfilm [
<xref rid="b23-j71lee" ref-type="bibr">23</xref>
]. While analog media have better proven long-term reliability, they may not provide adequate representations of the original object. This solution may also lead to severe loss in functionality and presentation of the original digital object. It is not possible, for example, to microfilm the equations embedded in a spreadsheet, to print out an interactive video, or to preserve a multimedia document as a flat file [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
,
<xref rid="b18-j71lee" ref-type="bibr">18</xref>
,
<xref rid="b24-j71lee" ref-type="bibr">24</xref>
].</p>
<p>The second solution, software that is backward compatible, will simplify migration. The latest versions of most popular word processing packages, for example, will be able to decode files created on earlier versions of the same package. While this strategy may work over the short term for simple digital resources created on some of the leading application packages, it cannot be relied upon over the medium to long-term or for more complex digital resources. Meanwhile, interoperability of systems will also facilitate migration because a specific program is not needed to access a digital resource. However, these features become harder to achieve with greater software complexity. Hence, any information migration through backward compatibility or interoperability between application software packages would represent a short-term strategy [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
].</p>
<p>Another approach entails initially migrating digital information from the great multiplicity of formats to a smaller more manageable number of standard formats. These are less volatile than the wide array of nonstandard formats and can still encode the complexity of structure and form of the original resource [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
]. Decisions on which formats to convert digital resources into should be based on the structure of the digital resources, on the objectives set by the collection manager, and on the requirements of the users of that collection [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
]. For example, one important issue is whether the top priority is given to preserving the ability to process the digital resource or to preserving the format or visual presentation of the digital resource.</p>
<p>A report [
<xref rid="b5-j71lee" ref-type="bibr">5</xref>
] from the task force on the Commission on Preservation and Access (CPA) and the Research Libraries Group (RLG) makes the point that there are a variety of migration strategies. Particularly, Wheatley [
<xref rid="b25-j71lee" ref-type="bibr">25</xref>
] attempted to break migration into more specific cases in the Creative Archiving at Michigan and Leeds: Emulating the Old and the New (CAMiLEON)
<xref ref-type="fn" rid="fn3-j71lee">3</xref>
project: minimum migration, preservation migration, recreation, human conversion migration, and automatic conversion migration. He applied each case to test materials and discussed its usefulness for digital preservation.</p>
<p>Recently, the concept of migration on request has been conceived by the Consortium of University Research Libraries Exemplars for Digital Archives (CEDARS)
<xref ref-type="fn" rid="fn4-j71lee">4</xref>
project [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
], in which original objects are maintained and preserved in addition to a migration tool that runs on a current computing platform and can be employed by users as necessary. When the current platform becomes obsolete, the migration tool will no longer work. Therefore, the preservation problem in this case is obviously focused on the maintenance of the migration tool. Preserving the original bit stream and a migration tool is compatible with emulation strategy.</p>
<p>The task force report and Hendley consider this migration strategy the most promising for the future. Bearman [
<xref rid="b26-j71lee" ref-type="bibr">26</xref>
] also believes that it is the most promising strategy for preservation of electronic records and the only one that has worked to date. Russell [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
] points out that the migration strategy is the most practical approach at least for the short and medium term.</p>
<p>However, for resources where it is difficult to disentangle format from content such as complex multimedia documents, this is not an easy option. Multiple components may require separate migration activities and this can be very complex. Indeed, for some multimedia resources, migration may not be possible without significant compromises in functionality. Russell states that the costs of migration may, in the long run, exceed those costs necessary for preserving either the technology itself or the detailed technical specification that will allow future emulation.</p>
<p>Waugh et al. believe that the key to successful migration is the knowledge of the original data format and a close match in functionality between the original and replacement format. They consider migration the simplest over the short and medium term for digital information that is actively managed. On the other hand, Rothenberg dismisses the strategy of migrating electronic records systematically before they become inaccessible [
<xref rid="b18-j71lee" ref-type="bibr">18</xref>
].</p>
<p>Lawrence et al. [
<xref rid="b27-j71lee" ref-type="bibr">27</xref>
] have attempted to quantify the risks involved in the use of migration and have analyzed several commercially available migration tools for their relative accuracy. This practical investigation has led to the identification of some key requirements for migration software: access to the source file specification, analysis of the differences between it and the target format, identification of the degree of risk in the case of a mismatch, accurate conversion of the source file to a target specification, and so on.</p>
<p>However, none of current migration methods or tools comes close to meeting all of these requirements. It is important to realize that technical standards may change rapidly and that this strategy may not ensure that digital information remains accessible. Recently, however, XML has become widely accepted as a universal standard format in various fields of digital library, electronic commerce, and the Web. Standardization based on XML could be helpful in addressing the digital preservation problem.</p>
</sec>
<sec>
<title>2.4 Encapsulation</title>
<p>Encapsulation aims to overcome the problems of the technological obsolescence of file formats by making the details of how to interpret the digital object part of the encapsulated information. This strategy involves creating the original application that was used to create or access the digital object on future computer platforms. Part of the process of encapsulation may be to migrate the record to a more easily documented format.</p>
<p>The concept of encapsulation is similar to the Bento
<xref ref-type="fn" rid="fn5-j71lee">5</xref>
[
<xref rid="b28-j71lee" ref-type="bibr">28</xref>
] container, which was developed to increase compatibility of data between computer applications. Bento is a specification for storage and interchange of compound content, and is designed to be platform and content neutral. Thus, it provides a convenient container for transporting any type of compound content between multiple platforms.</p>
<p>Encapsulation can be achieved by using physical or logical structures called containers or wrappers to provide a relationship between all information components such as the digital object and some supporting information including metadata [
<xref rid="b29-j71lee" ref-type="bibr">29</xref>
,
<xref rid="b30-j71lee" ref-type="bibr">30</xref>
]. The reference model for the OAIS also describes the types of supporting information that should be included in an encapsulation. They include the representation information used to interpret the bits appropriately, the provenance to describe the source of the object, the context to describe how the object relates to other information outside the container, a reference to one or more identifiers to uniquely identify the object, and fixity to provide evidence that the object has not been altered.</p>
<p>The Universal Preservation Format (UPF) [
<xref rid="b31-j71lee" ref-type="bibr">31</xref>
,
<xref rid="b32-j71lee" ref-type="bibr">32</xref>
,
<xref rid="b33-j71lee" ref-type="bibr">33</xref>
] is a method being developed for digital preservation, based on the theory of encapsulation. It is a self-describing storage technology, which uses a wrapper to hold the digital object and the metadata together to protect against technological obsolescence. The Digital Rosetta Stone [
<xref rid="b34-j71lee" ref-type="bibr">34</xref>
] is a method for storing the representation information needed to interpret the digital content of an object separate from the encapsulation to avoid duplication of effort and inefficient use of storage space.</p>
<p>Encapsulation has been widely promoted by Rothenberg who is a strong advocate of encapsulation and emulation methods for digital preservation. Day [
<xref rid="b30-j71lee" ref-type="bibr">30</xref>
] and Shepard [
<xref rid="b35-j71lee" ref-type="bibr">35</xref>
] have also supported the encapsulation approach. However, Bearman [
<xref rid="b26-j71lee" ref-type="bibr">26</xref>
] disputes the theory of Rothenberg stating that it is not clear as to how metadata encapsulation strategies may be practically implemented.</p>
<p>Waugh et al. argue that encapsulation is the best basis for long-term preservation. They introduce three challenges of encapsulation: the requirements for applications to generate encapsulated records, the potential storage overhead of including documentation about the format within each record, and information about unpublished data formats. However, even if format specifications are publicly available, they are often incomplete and substantial components of file specifications often consist of nonstandard elements.</p>
<p>Encapsulation can be considered to be a type of migration technique. Although documentation may delay the need for migration for a long time, the encapsulated information will eventually need to be migrated. Therefore, encapsulation techniques can be applied to the digital resources whose format is well known and that are unlikely to be accessed actively.</p>
</sec>
<sec>
<title>2.5 The Digital Tablet</title>
<p>Kranch [
<xref rid="b36-j71lee" ref-type="bibr">36</xref>
,
<xref rid="b37-j71lee" ref-type="bibr">37</xref>
] proposes developing a digital tablet for preservation. The digital tablet technique does not precisely fit into the above categories. The tablet would have a self-contained power source, present the stored digital information on a screen as glyphs from a written language appropriate for the information, and have touch-sensitive controls to change the presentation and manipulate the information. Additionally, it should be able to withstand millennia of neglect under harsh conditions yet cost no more than a few dollars to produce and encode. It should have a storage capacity of dozens or hundreds of terabytes, and contain a simple serial read-only port to download the original digital information into an external system along with instructions on how to do it. However, the digital tablet may be considered to be another technology preservation method.</p>
</sec>
</sec>
<sec>
<title>3. Projects and Case Studies</title>
<p>This section introduces representative projects for digital preservation, describes their goals and results, and presents their specific preservation strategies. Recently, Cloonan and Sanett [
<xref rid="b38-j71lee" ref-type="bibr">38</xref>
] presented a report on the initial phase of projects involved in developing, evaluating, and/or implementing digital preservation strategies in Europe, Australia, and the United States.</p>
<sec>
<title>3.1 Australian Projects</title>
<p>Australia has been examining digital preservation issues since 1994. Several projects are aiming to preserve various digital materials such as electronic records, online publications, digital audio resources, theses, and cartographic materials [
<xref rid="b1-j71lee" ref-type="bibr">1</xref>
,
<xref rid="b12-j71lee" ref-type="bibr">12</xref>
,
<xref rid="b39-j71lee" ref-type="bibr">39</xref>
]. The Victorian Electronic Records Strategy (VERS)
<xref ref-type="fn" rid="fn6-j71lee">6</xref>
project [
<xref rid="b12-j71lee" ref-type="bibr">12</xref>
] produced a standard for management and preservation of electronic records [
<xref rid="b40-j71lee" ref-type="bibr">40</xref>
,
<xref rid="b41-j71lee" ref-type="bibr">41</xref>
]. The standard proposed by the VERS project recommends encapsulating the documents and their context in a single object based on XML.</p>
<p>The Preserving and Accessing Networked Documentary Resources of Australia (PANDORA)
<xref ref-type="fn" rid="fn7-j71lee">7</xref>
project by the National Library of Australia has led the way in archiving the Web [
<xref rid="b42-j71lee" ref-type="bibr">42</xref>
,
<xref rid="b43-j71lee" ref-type="bibr">43</xref>
]. The primary objective of PANDORA is to capture, archive, and provide long-term access to significant online publications. The project aims at addressing both archiving and preservation processes. The PANDORA archiving processes refer to the collection and provision of immediate access to the publications while preservation processes involve managing the materials and applying appropriate strategies (e.g., migration) to ensure long-term access. The archiving processes have been developed while techniques for managing long-term access to these digital resources is still being developed.</p>
<p>The project has also embarked on migration experiments with some HTML pages. The format of these pages is not yet obsolete, but the HTML specification [
<xref rid="b44-j71lee" ref-type="bibr">44</xref>
] has declared a number of mark-up tags as dead and not to be supported in this or future versions. The aim of these trials is to make changes in the HTML source code to remove tags declared as dead and replace them with current tags, effectively migrating the source code to a different version to reduce problems of future compatibility with Web browsers. Additionally, the National Archives of Australia is undertaking a project to develop advice for commonwealth agencies on using migration as a preservation strategy for electronic records [
<xref rid="b45-j71lee" ref-type="bibr">45</xref>
].</p>
</sec>
<sec>
<title>3.2 CEDARS</title>
<p>The Consortium of University Research Libraries, which represents both university and national libraries across the UK and Ireland, leads the CEDARS project. The project is based on the OAIS model described earlier. Essentially it is an archival model for an archiving system but does not explicitly include a preservation module. Current projects investigating the use of the model include NEDLIB in Europe, CEDARS in the UK, and PANDORA in Australia.</p>
<p>The CEDARS project aims to address the strategic, methodological, and practical issues of digital preservation as well as providing guidance for libraries in best practices. Specifically, the project is producing guidelines for developing digital collection management policies and preserving different classes of digital resources. Additionally, it is performing an analysis of the cost implications of digital preservation. The project is running pilot projects to test and promote the chosen strategy for digital preservation. The CEDARS Data Preservation Strategies Working Group is looking at preservation issues that are related with migration, emulation, and data refreshing.</p>
<p>Specifically, the project has done some work comparing migration and emulation across older digital materials in conjunction with the CAMiLEON project [
<xref rid="b20-j71lee" ref-type="bibr">20</xref>
,
<xref rid="b25-j71lee" ref-type="bibr">25</xref>
]. They suggest that both migration and emulation strategies are viable for different types of digital materials. They also believe that no strategy is a panacea, and the strategy adopted for providing access to preserved resources will very much depend on the nature of the resource itself and the reason for its preservation. More work is planned to investigate the information loss associated with each strategy.</p>
</sec>
<sec>
<title>3.3 CAMiLEON</title>
<p>The CAMiLEON project is funded by the Joint Information Systems Committee (JISC) in the UK and the National Science Foundation (NSF) in the USA. The project looks at the issues surrounding the implementation of technology emulation as a digital preservation strategy. The project recognizes the potential of emulation for the retention of the functionality and the look and feel of digital objects [
<xref rid="b20-j71lee" ref-type="bibr">20</xref>
]. It aims to develop tools, guidelines, and costs for emulation as compared to other digital preservation options.</p>
<p>The project is performing user testing of various digital resources both in their original environments and in emulated environments. The project presents guidelines for use of emulation and argues that emulation is a valid method for both complex digital resources that include executable files and resources for which the documentation is not available in electronic form.</p>
</sec>
<sec>
<title>3.4 NEDLIB</title>
<p>The NEDLIB project was initiated by a permanent standing committee of the Conference of European National Libraries (CENL) in 1998, with funding from the European Commission’s Telematics Application Programme. Eight national libraries in Europe, one national archive, and major publishers are participating in the project. The National Library of the Netherlands leads the project.</p>
<p>The project aims to develop a common architectural framework and basic tools for building deposit systems for electronic publications. The project has also adopted the OAIS migration model described earlier. The main objective of the NEDLIB project is to provide better insight into the merit and weakness of different long-term preservation strategies. The project defines the characteristics of electronic publications and other categories of digital deposit material and associated preservation and authenticity requirements. It is recognized that many aspects including cost-effectiveness, legal restrictions, agreements with publishers, and user access requirements ultimately need to be taken into account when policy choices for preservation strategies are set. However, the project focuses on the technical issues of preservation.</p>
<p>The project has taken a first step to test the technicalities of the preservation mechanisms by starting an emulation experiment. The fundamental idea of the work is to test whether emulating obsolete computer hardware on future systems could be used to ensure long-term access to digital publications. Rothenberg has performed the first phase of this experimental work [
<xref rid="b15-j71lee" ref-type="bibr">15</xref>
]. It involved developing a prototype experimental environment for trying out emulation-based preservation and using commercial emulation tools to provide an initial proof-of-concept. The experimental results indicate that emulation should work in principle, assuming that suitable emulators for obsolete computing platforms can be hosted on future platforms.</p>
</sec>
<sec>
<title>3.5 Kulturarw
<sup>3</sup>
Heritage</title>
<p>The Kulturarw
<xref ref-type="fn" rid="fn3-j71lee">3</xref>
Heritage Project
<xref ref-type="fn" rid="fn8-j71lee">8</xref>
of the Royal Library in Sweden is testing methods of collecting, archiving, and providing access to Swedish electronic documents. Web crawlers or robots are used in order to collect all the Swedish Web pages automatically. Although the project currently does not focus on preservation, it is growing into a broader Nordic initiative that may explore the long-term preservation of this archive.</p>
</sec>
<sec>
<title>3.6 Library of Congress</title>
<p>Recently, the Computer Science and Telecommunications Board (CSTB) of the National Academies [
<xref rid="b46-j71lee" ref-type="bibr">46</xref>
,
<xref rid="b47-j71lee" ref-type="bibr">47</xref>
] convened the Committee on the Information Technology Strategy for the Library of Congress for advice on digital preservation. The committee report includes specific recommendations for enhancing technology infrastructure, particularly in the area of networks, databases, and information technology security.</p>
<p>The Library of Congress’ pilot project, working with the Internet Archive
<xref ref-type="fn" rid="fn9-j71lee">9</xref>
, has worked through all aspects of archiving the Web in the area of political Web sites. This project uses the Digital Library SunSITE Collection and Preservation Policy
<xref ref-type="fn" rid="fn10-j71lee">10</xref>
from the University of California, Berkeley, which provides several digital collecting levels, as guidance.</p>
</sec>
<sec>
<title>3.7 NARA: Persistent Archives and Electronic Records Management</title>
<p>The NARA (National Archives and Records Administration) project,
<xref ref-type="fn" rid="fn11-j71lee">11</xref>
which is led by the San Diego Supercomputer Center and funded by NARA, aims to develop a persistent archive to support ingestion, archival storage, information discovery, and preservation of digital collections. One of its premises is the importance of preserving the organization of digital collections simultaneously with the digital objects that comprise the collection [
<xref rid="b48-j71lee" ref-type="bibr">48</xref>
].</p>
<p>The ultimate goal is to preserve not only the original data, but also the context that permits the data to be interpreted. The project proposes an approach for maintaining digital data for hundreds of years through development of an environment that supports migration of collections onto new software systems. The proposed infrastructure combines elements from supercomputer centers, digital libraries, and distributed computing environments. The project emphasizes the synergy that is achieved through the identification of the unique capabilities provided by each environment, and the construction of interoperability mechanisms for integrating these environments. According to this project, collection-based persistent archives are now feasible and can manage massive amounts of information based on XML [
<xref rid="b49-j71lee" ref-type="bibr">49</xref>
].</p>
</sec>
<sec>
<title>3.8 InterPARES</title>
<p>The International Research on Permanent Authentic Records Electronic Systems (InterPARES)
<xref ref-type="fn" rid="fn12-j71lee">12</xref>
project [
<xref rid="b38-j71lee" ref-type="bibr">38</xref>
] is a multinational research initiative, in which archival scholars, computer engineering scholars, national archival institutions, and private industry representatives are collaborating to develop the theoretical knowledge and methodology required for the permanent preservation of authentic records created using electronic systems [
<xref rid="b50-j71lee" ref-type="bibr">50</xref>
].</p>
<p>The research areas include identifying the electronic record elements that need to be maintained, developing criteria to appraise electronic records for preservation, and formulating principles for development of international, national, and organizational preservation strategies. Specifically, the research areas are divided into four complementary domains: authenticity, appraisal, preservation, and strategies. In terms of authenticity, the purpose is to identify the specific elements of electronic records that must be preserved, over time and across technologies, in order to verify the record’s authenticity. As a first step, a template to guide the analysis of electronic records was developed and is being evaluated. The project is based in the School of Library, Archival and Information Studies at the University of British Columbia in Canada. The current phase of the project would end on December 31, 2001.</p>
</sec>
<sec>
<title>3.9 PRISM</title>
<p>The Preservation, Reliability, Interoperability, Security, Metadata (PRISM)
<sup>13</sup>
project [
<xref rid="b29-j71lee" ref-type="bibr">29</xref>
] of the Cornell University is a 4 year project funded by the Digital Library Initiative to investigate and develop policies and mechanisms needed for information integrity in digital libraries. The project focuses on long-term survivability of digital information, reliability of information resources and services, interoperability, security, and metadata.</p>
<p>The current direction of the project is toward developing techniques for monitoring the integrity of distributed Web-based information resources and enforcing preservation policies set by the owners and users of collections. Monitoring resources will involve both the automated capture of information using a specialized Web crawler and the manual gathering of data on the organizational status of particular resources and collections. The ultimate objective is to develop a cost-effective and event-based metadata scheme that will enable users to define preservation policies and enforce them automatically.</p>
</sec>
<sec>
<title>3.10 Canadian Projects</title>
<p>E-preservation
<xref ref-type="fn" rid="fn14-j71lee">14</xref>
was developed through a cooperative effort between the National Library of Canada and the Canadian Initiative on Digital Libraries (CIDL). E-preservation is intended 1) to provide Canadians with easy access to policies and 2) to perform research on the creation, use, and preservation of digital collections. The project includes guidelines about various aspects including acquiring digital materials, formats, and metadata.</p>
</sec>
<sec>
<title>3.11 Preservation Projects at the National Institute of Standards and Technology (NIST)</title>
<p>The earliest work on data preservation at NIST can be traced back to the 1980s when Podio performed research on the lifetime measurement of compact discs [
<xref rid="b51-j71lee" ref-type="bibr">51</xref>
]. His work provided a basis for a standard methodology for the lifetime measurement of optical discs. With the increasing usage of digital storage in libraries and the archiving of the government agencies, the great importance of digital preservation became clear to NIST’s Information Technology Laboratory,
<xref ref-type="fn" rid="fn15-j71lee">15</xref>
and accordingly new projects on the study of digital data preservation have started in the following aspects:
<list list-type="bullet">
<list-item>
<p>Longevity testing. This project initially consisted of an examination of the effects of heat and humidity on the lifetime of optical discs and was later extended to include the effects of light exposure. The focus is not only on the lifetime itself, but also on the deterioration process. The results may be useful both for new disc production and for the classification of existing recorded discs.</p>
</list-item>
<list-item>
<p>Testing of interchangeability and interoperability of optical discs for use in high-density storage systems such as optical disc “Jukeboxes.” Combined with the application and further development of XML, a new preservation strategy may be developed. This program is being conducted in collaboration with the High Density Storage Association (HDSA).
<xref ref-type="fn" rid="fn16-j71lee">16</xref>
An open testing laboratory is being developed that will include interoperability and interchangeability testing as well as testing of the suitability of various types of high capacity storage systems for different applications including preservation.</p>
</list-item>
<list-item>
<p>Development of the Turbo coding system [
<xref rid="b52-j71lee" ref-type="bibr">52</xref>
]. Unlike the traditional digital preservation techniques that aim to keep the information readable in the long term, this new technique aims to develop a method for finding and recovering useful information from failed discs. The failure of many commercial error correction codes to support retrieval of important information from aging or damaged digital storage devices has indirectly resulted in the reduction of the rated life expectancy and archival properties of digital storage devices. Turbo code has shown promise in retrieving information previously inaccessible. Turbo codes are two parallel, recursive, and systematic convolution codes. These codes are used for the channel coding and decoding in order to detect and correct the errors that may occur in the transmission of digital data through different channels. The iterative method of the decoding scheme helps to achieve the theoretical limit (near Shannon-limit [
<xref rid="b53-j71lee" ref-type="bibr">53</xref>
]) in error correction performance. This program is being conducted in cooperation with Carnegie-Mellon University.</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec>
<title>4. Discussion and Summary</title>
<p>In this paper, three main preservation techniques have been discussed in detail. Each of them has advantages and disadvantages as shown in
<xref rid="t1-j71lee" ref-type="table">Table 1</xref>
. Different strategies are viable for different types of digital materials. In cases of complex resources and application softwares such as games and executable files, emulation is a suitable approach. In particular, emulation is the most feasible choice where there is a lack of sufficient knowledge regarding the format of the digital information and where the look and feel of digital information is important.</p>
<p>On the other hand, migration or encapsulation is appropriate for digital resources where knowledge of the format is sufficient and where the resource is relatively simple. Specifically, migration is appropriate for resources that are actively accessed and managed. Encapsulation is suitable for resources that are unlikely to be actively accessed.
<xref rid="f4-j71lee" ref-type="fig">Fig. 4</xref>
shows a schematic diagram to select the suitable preservation techniques for digital resources according to the type and complexity of digital information, the availability of the data format, and its usage.</p>
<p>As mentioned before, the objective of long-term digital preservation is to ensure continuing access to stored digital information. Future users will be able to access digital information, which will be preserved by digital libraries, through their own computing environments or portable reading devices. This means that the digital information may have to be migrated for long-term digital preservation even if some emulation techniques have already been applied. Therefore, long-term preservation may involve several preservation techniques. In other words, for successful preservation, combined application of different strategies should be taken into account. These techniques are not mutually exclusive, that is, one approach may include some aspects of other approaches.</p>
<p>The preservation of physical artifacts generally occurs through developing and maintaining collections in a decentralized manner. By contrast, the preservation of digital resources does not lend itself well to such a process and no single institution can preserve all digital information. Fortunately, the Internet enables digital libraries worldwide to communicate and share information online. For this to happen successfully, the interoperability of archives and digital library systems and the interchangeability of preserved digital information are necessary.</p>
<p>Standard formats for preservation of digital information should be developed. Standards can provide optimum interoperability and interchangeability, well-constructed tool sets for developers, and solutions for complex systems. Furthermore, standard solutions are likely to be available for use for far longer than nonstandard solutions. Migration from standard formats is much easier, cheaper, and more accurate that migration from non-standard formats.</p>
<p>Standards are required for both emulation and encapsulation. Conventional standards were based on various kinds of encoding schemes according to the types of digital resources, with the result that quite a few software packages support these standards. Meanwhile, XML is being adopted as a standard in various fields due to the recognition of its advantages, including its independence of hardware and software, and due to its wide dissemination. Although XML is a relatively new technology for the Web, SGML (Standard Generalized Markup Language) [
<xref rid="b54-j71lee" ref-type="bibr">54</xref>
], which is a superset of XML, is a proven technology that has been tested and evaluated since 1986, when it was accepted as an international standard. Furthermore, standards based on XML will facilitate support for the Internet and Web. For example, a standard [
<xref rid="b55-j71lee" ref-type="bibr">55</xref>
] for digital representation of paper-based books is based on XML.</p>
<p>Since the use of XML is expected to grow wider in the areas of interoperability and interchangeability, preservation standards based on XML are needed. A single standard format is desirable when implementing a preservation system.</p>
<p>The most successful preservation strategies will contain elements of migration based on standardization. While techniques for the migration of digital resources comprised of simple data appear to be widely accepted and followed, the preservation community is only beginning to address migration of more complex digital objects. Additional research on migration is needed to test the technical feasibility of various approaches to migration, determine the costs associated with these approaches, and establish benchmarks and best practices.</p>
<p>Furthermore, a test bed is needed in which specific migration techniques can be prototyped. This test bed should be used to quantitatively test the performance of migration tools that are currently available on the market and new tools being developed. Results from this test bed shall give good guidelines for choosing appropriate tools to migrate digital resources that are in different formats. For this purpose, systematic categorization of digital resources must be developed.</p>
<p>Other critical technical issues must be resolved for preserving digital information. They include requirements relating to metadata, authenticity and integrity, cost modeling, content and structure, format and styles, storage media, and workflow process. Brief descriptions of some critical issues are as follows:</p>
<sec>
<title>Metadata</title>
<p>The metadata for digital preservation is critical but complex. Metadata types include descriptive metadata for resource discovery, administrative metadata for the preservation process itself, technical metadata, and rights metadata to describe copyright information [
<xref rid="b3-j71lee" ref-type="bibr">3</xref>
]. Metadata must enable access to the intellectual content of the object (whether by migration or emulation), find the object, manage the object, and allow other versions of the object to be produced. There have been several specifications for preservation metadata by CEDARS [
<xref rid="b56-j71lee" ref-type="bibr">56</xref>
], the National Archives and Library of Australia [
<xref rid="b57-j71lee" ref-type="bibr">57</xref>
,
<xref rid="b58-j71lee" ref-type="bibr">58</xref>
], and NEDLIB [
<xref rid="b59-j71lee" ref-type="bibr">59</xref>
]. Recently, collaborative efforts between RLG and the Online Computer Library Center (OCLC) have produced a report [
<xref rid="b60-j71lee" ref-type="bibr">60</xref>
] identifying common goals and approaches to these digital preservation metadata. The metadata should cover the requirements of various types of organizations and be standardized for interoperability. Efforts to develop tools for automatically creating metadata are needed.</p>
</sec>
<sec>
<title>Interoperability and Interchangeability</title>
<p>As mentioned before, the interoperability of archives and digital libraries as well as the interchangeability of digital information are important issues, particularly in a distributed environment such as the Internet. Standard formats and procedures should therefore be developed.</p>
</sec>
<sec>
<title>Authenticity and Integrity</title>
<p>Authentication allows the user to be certain of the originality of the digital resource when it is needed. Although there are several techniques used for authentication including cryptography, hashing, and time stamping [
<xref rid="b15-j71lee" ref-type="bibr">15</xref>
], there are multiple meanings and implications of authenticity and integrity. Therefore, creating a common understanding of authenticity and integrity is critical in the digital environment [
<xref rid="b61-j71lee" ref-type="bibr">61</xref>
]. Dollar [
<xref rid="b62-j71lee" ref-type="bibr">62</xref>
] identifies maintaining the authenticity of a digital object as a key aim in the migration process.</p>
</sec>
<sec>
<title>Cost Model</title>
<p>Decisions about preserving information should consider the costs [
<xref rid="b6-j71lee" ref-type="bibr">6</xref>
]. However, there are no proven techniques for estimating the costs of long-term preservation of digital information. Recently, Russell and Weinberger [
<xref rid="b63-j71lee" ref-type="bibr">63</xref>
] postulate that the ongoing costs of digital preservation span a more extended timeframe than traditional preservation and will therefore require resource commitments of a different nature. Different strategies may necessitate different costing timeframes and schedules. They state that current cost models have yet to reflect this more complex environment.</p>
</sec>
</sec>
</body>
<back>
<ack>
<title>Acknowledgments</title>
<p>The authors would like to thank Mr. John Roberts, Dr. Albert Paul, and Dr. Theodore Vorburger for their helpful and constructive comments and suggestions.</p>
</ack>
<fn-group>
<fn id="fn1-j71lee">
<label>1</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.konbib.nl/nedlib/">http://www.konbib.nl/nedlib/</ext-link>
</p>
</fn>
<fn id="fn2-j71lee">
<label>2</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.ccsds.org/">http://www.ccsds.org/</ext-link>
</p>
</fn>
<fn id="fn3-j71lee">
<label>3</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.si.umich.edu/CAMILEON/">http://www.si.umich.edu/CAMILEON/</ext-link>
</p>
</fn>
<fn id="fn4-j71lee">
<label>4</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.leeds.ac.uk/cedars/">http://www.leeds.ac.uk/cedars/</ext-link>
</p>
</fn>
<fn id="fn5-j71lee">
<label>5</label>
<p>Certain commercial equipment, instruments, or materials are identified in this paper to foster understanding. Such identification does not imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the materials or equipment identified are necessarily the best available for the purpose.</p>
</fn>
<fn id="fn6-j71lee">
<label>6</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.prov.vic.gov.au/vers/">http://www.prov.vic.gov.au/vers/</ext-link>
</p>
</fn>
<fn id="fn7-j71lee">
<label>7</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/policy/plan/pandora.html">http://www.nla.gov.au/policy/plan/pandora.html</ext-link>
</p>
</fn>
<fn id="fn8-j71lee">
<label>8</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://kulturarw3.kb.se/html/projectdescription.html">http://kulturarw3.kb.se/html/projectdescription.html</ext-link>
</p>
</fn>
<fn id="fn9-j71lee">
<label>9</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.archive.org/">http://www.archive.org/</ext-link>
</p>
</fn>
<fn id="fn10-j71lee">
<label>10</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://sunsite.berkeley.edu/">http://sunsite.berkeley.edu/</ext-link>
</p>
</fn>
<fn id="fn11-j71lee">
<label>11</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.sdsc.edu/NARA/">http://www.sdsc.edu/NARA/</ext-link>
</p>
</fn>
<fn id="fn12-j71lee">
<label>12</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.interPARES.org/">http://www.interPARES.org/</ext-link>
</p>
</fn>
<fn id="fn13-j71lee">
<label>13</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.prism.cornell.edu/">http://www.prism.cornell.edu/</ext-link>
</p>
</fn>
<fn id="fn14-j71lee">
<label>14</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.nlc-bnc.ca/cidl/preserv-conserv/index.htm">http://www.nlc-bnc.ca/cidl/preserv-conserv/index.htm</ext-link>
</p>
</fn>
<fn id="fn15-j71lee">
<label>15</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.itl.nist.gov/">http://www.itl.nist.gov/</ext-link>
</p>
</fn>
<fn id="fn16-j71lee">
<label>16</label>
<p>
<ext-link ext-link-type="uri" xlink:href="http://www.hidensity.org/">http://www.hidensity.org/</ext-link>
</p>
</fn>
</fn-group>
<app-group>
<app id="app1-j71lee">
<title>5. Appendix A. Glossary</title>
<p>The following is a list of important words that are used in this paper. Brief definitions of these words are summarized here for readers’ convenience. For more specific definitions refer to the URLs.</p>
<sec>
<title>Emulation</title>
<p>The process of setting up a system to perform in the same way as another system of a different type in order to run its programs.</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/download/dsp/appendices.pdf">http://www.nla.gov.au/download/dsp/appendices.pdf</ext-link>
></p>
</sec>
<sec>
<title>Encapsulation</title>
<p>A technique of grouping together a digital object and anything else necessary to provide access to that object.</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/padi/topics/20.html">http://www.nla.gov.au/padi/topics/20.html</ext-link>
></p>
</sec>
<sec>
<title>Migration</title>
<p>The periodic transfer of digital materials from one hardware/software configuration to another or from one generation of computer technology to a subsequent generation. The purpose of migration is to preserve the integrity of digital objects and to retain the ability for clients to retrieve, display, and otherwise use them in the face of constantly changing technology.</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://info.wgbh.org/upf/glossary.html">http://info.wgbh.org/upf/glossary.html</ext-link>
></p>
</sec>
<sec>
<title>Open Archiving Information System (OAIS)</title>
<p>An archive, consisting of an organization of people and systems, that has accepted responsibility to preserve information and make it available for one or more designated communities.</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://www.kb.nl/coop/nedlib/glossary.pdf">http://www.kb.nl/coop/nedlib/glossary.pdf</ext-link>
></p>
</sec>
<sec>
<title>Refreshing</title>
<p>To copy digital information from one long-term storage medium to another of the same type, with no change whatsoever in the bit − stream (e.g. from a decaying 800bpi tape to a new 800bpi tape, or from an older 5 1/4” floppy to a new 5 1/4” floppy).</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://info.wgbh.org/upf/glossary.html">http://info.wgbh.org/upf/glossary.html</ext-link>
></p>
</sec>
<sec>
<title>XML (eXtensible Markup Language)</title>
<p>Subset of SGML designed to be transmissible over the Internet in such a way that document browsers do not need to access the document type definition to validate the document before display. As well as requiring all elements to be “well-formed,” e.g., have both start and end tags present, the specification provides XML specific attributes and processing instructions that can be used to control the way documents are presented to users.</p>
<p><
<ext-link ext-link-type="uri" xlink:href="http://www.w3.org/TR/PR-xml.html">http://www.w3.org/TR/PR-xml.html</ext-link>
></p>
</sec>
</app>
</app-group>
<bio id="d36e938">
<p>
<bold>About the authors:</bold>
Kyong-Ho Lee, Oliver Slattery, and Richang Lu are guest researchers in the Convergent Information Systems Division of the NIST Information Technology Laboratory. Xiao Tang is the Group Leader of the Information Storage and Integrated Systems Group within the Convergent Information Systems Division. Victor McCrary is the Chief of the Convergent Information Systems Division. The National Institute of Standards and Technology is an agency of the Technology Administration, U.S. Department of Commerce.</p>
</bio>
<ref-list>
<title>6. References</title>
<ref id="b1-j71lee">
<label>1</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Woodyard</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>Digital Preservation: The Australian Experience</source>
<conf-name>Digital Preservation: The Australian ExperienceProc. Third Conf. Digital Library: Positioning the Fountain of Knowledge</conf-name>
<conf-loc>Malaysia</conf-loc>
<conf-date>2000</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/nla/staffpaper/dw001004.html">http://www.nla.gov.au/nla/staffpaper/dw001004.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b2-j71lee">
<label>2</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Levy</surname>
<given-names>DM</given-names>
</name>
</person-group>
<source>Heroic Measure: Reflections on the Possibility and Purpose of Digital Preservation</source>
<conf-name>Proc. Conf. ACM Digital Libraries</conf-name>
<conf-loc>Pittsburgh</conf-loc>
<conf-date>1998</conf-date>
<fpage>152</fpage>
<lpage>161</lpage>
</element-citation>
</ref>
<ref id="b3-j71lee">
<label>3</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Russell</surname>
<given-names>K</given-names>
</name>
</person-group>
<source>Digital Preservation and the CEDARS Project Experience</source>
<conf-name>Proc. Int’l Conf. Preservation and Long Term Accessibility of Digital Materials</conf-name>
<conf-loc>York, England</conf-loc>
<conf-date>2000</conf-date>
<fpage>139</fpage>
<lpage>154</lpage>
</element-citation>
</ref>
<ref id="b4-j71lee">
<label>4</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>S-S</given-names>
</name>
</person-group>
<article-title>The Paradox of Digital Preservation</article-title>
<source>IEEE Computer</source>
<volume>34</volume>
<issue>3</issue>
<fpage>24</fpage>
<lpage>28</lpage>
<year>2001</year>
</element-citation>
</ref>
<ref id="b5-j71lee">
<label>5</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Garrett</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Waters</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>Preserving Digital Information, Report of the Task Force on Archiving of Digital Information</source>
<conf-name>The Commission on Preservation and Access and The Research Libraries Group</conf-name>
<conf-loc>Washington DC and Mountain View CA</conf-loc>
<conf-date>May 1996</conf-date>
<fpage>64</fpage>
</element-citation>
</ref>
<ref id="b6-j71lee">
<label>6</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hendley</surname>
<given-names>T</given-names>
</name>
</person-group>
<source>Comparison of Methods & Costs of Digital Preservation, British Library Research and Innovation Report 106</source>
<conf-name>British Library Research and Innovation Center</conf-name>
<conf-loc>West Yorkshire</conf-loc>
<conf-date>1998</conf-date>
<fpage>121</fpage>
</element-citation>
</ref>
<ref id="b7-j71lee">
<label>7</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Fresko</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Tombs</surname>
<given-names>K</given-names>
</name>
</person-group>
<source>Digital Preservation Guidelines</source>
<conf-name>European Commission DG XIII/E</conf-name>
<conf-loc>Luxembourg</conf-loc>
<conf-date>1998</conf-date>
<fpage>69</fpage>
</element-citation>
</ref>
<ref id="b8-j71lee">
<label>8</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Woodyard</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>Farewell My Floppy: A Strategy for Migration of Digital Information</source>
<conf-name>Proc. Conf. VALA</conf-name>
<conf-loc>Melbourne</conf-loc>
<conf-date>1998</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/nla/staffpaper/valadw.html">http://www.nla.gov.au/nla/staffpaper/valadw.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b9-j71lee">
<label>9</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>W3C Recommendation</collab>
</person-group>
<source>Extensible Markup Language (XML) 1.0 (Second Edition)</source>
<publisher-name>World Wide Web Consortium</publisher-name>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.w3c.org/TR/REC-xml">http://www.w3c.org/TR/REC-xml</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b10-j71lee">
<label>10</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rothenberg</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Ensuring the Longevity of Digital Documents</article-title>
<source>Sci Amer</source>
<volume>272</volume>
<issue>1</issue>
<fpage>42</fpage>
<lpage>47</lpage>
<year>1995</year>
</element-citation>
</ref>
<ref id="b11-j71lee">
<label>11</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zwaneveld</surname>
<given-names>EH</given-names>
</name>
</person-group>
<article-title>Standards and New Technology Strategies to Preserve Content on Magnetic and Disc Media, Point of View</article-title>
<source>SMPTE J</source>
<volume>109</volume>
<fpage>628</fpage>
<lpage>635</lpage>
<year>2000</year>
</element-citation>
</ref>
<ref id="b12-j71lee">
<label>12</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Waugh</surname>
<given-names>A</given-names>
</name>
<etal></etal>
</person-group>
<source>Preserving Digital Information Forever</source>
<conf-name>Proc. Conf. ACM Digital Libraries</conf-name>
<conf-loc>San Antonio</conf-loc>
<conf-date>2000</conf-date>
<fpage>175</fpage>
<lpage>184</lpage>
</element-citation>
</ref>
<ref id="b13-j71lee">
<label>13</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bearman</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>Collecting Software: A New Challenge for Archives & Museums</article-title>
<source>Technical Reports 1 (2), Archival Informatics</source>
<year>1987</year>
<fpage>80</fpage>
</element-citation>
</ref>
<ref id="b14-j71lee">
<label>14</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Graham</surname>
<given-names>PS</given-names>
</name>
</person-group>
<article-title>Intellectual Preservation in the Electronic Environment, After the Electronic Revolution, Will You Be the First to Go?</article-title>
<person-group person-group-type="editor">
<name>
<surname>Hirshon</surname>
<given-names>Arnold</given-names>
</name>
</person-group>
<source>American Library Association</source>
<publisher-loc>Chicago</publisher-loc>
<year>1993</year>
</element-citation>
</ref>
<ref id="b15-j71lee">
<label>15</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Rothenberg</surname>
<given-names>J</given-names>
</name>
</person-group>
<source>An Experiment in Using Emulation to Preserve Digital Publications</source>
<publisher-name>Koninklijke Bibliotheek</publisher-name>
<publisher-loc>Hague, Netherlands</publisher-loc>
<year>2000</year>
<fpage>85</fpage>
</element-citation>
</ref>
<ref id="b16-j71lee">
<label>16</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Granger</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Emulation as a Digital Preservation Strategy</article-title>
<source>D-Lib Mag</source>
<volume>6</volume>
<issue>10</issue>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.dlib.org/dlib/october00/granger/10granger.html">http://www.dlib.org/dlib/october00/granger/10granger.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b17-j71lee">
<label>17</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Gilheany</surname>
<given-names>S</given-names>
</name>
</person-group>
<source>Preserving Information Forever and a Call for Emulators</source>
<conf-name>Proc. Digital Libraries Conference and Exhibition: The Digital Era: Implications, Challenges and Issues</conf-name>
<conf-loc>Singapore</conf-loc>
<conf-date>1998</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.archivebuilders.com/aba010.html">http://www.archivebuilders.com/aba010.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b18-j71lee">
<label>18</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Rothenberg</surname>
<given-names>J</given-names>
</name>
</person-group>
<source>Avoiding Technological Quicksand: Finding a Viable Technical Foundation for Digital Preservation (A Report to the Council on Library and Information Resources)</source>
<publisher-name>Council on Library and Information Resources</publisher-name>
<publisher-loc>Washington, DC</publisher-loc>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.clir.org/pubs/reports/rothenberg/contents.html">http://www.clir.org/pubs/reports/rothenberg/contents.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b19-j71lee">
<label>19</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Werf-Davelaar</surname>
<given-names>T</given-names>
</name>
</person-group>
<article-title>Long-term Preservation of Electronic Publications</article-title>
<source>D-Lib Mag</source>
<volume>5</volume>
<issue>9</issue>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.dlib.org/dlib/september99/vanderwerf/09vanderwerf.html">http://www.dlib.org/dlib/september99/vanderwerf/09vanderwerf.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b20-j71lee">
<label>20</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Holdsworth</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Wheatley</surname>
<given-names>P</given-names>
</name>
</person-group>
<source>Emulation, Preservation and Abstraction</source>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.leeds.ac.uk/CAMiLEON/dh/ep5.html">http://www.leeds.ac.uk/CAMiLEON/dh/ep5.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b21-j71lee">
<label>21</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Holdsworth</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>Emulation: C-ing Ahead</source>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://129.11.152.25/CAMiLEON/dh/cingahd.html">http://129.11.152.25/CAMiLEON/dh/cingahd.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b22-j71lee">
<label>22</label>
<element-citation publication-type="book">
<source>Reference Model for an Open Archival Information System (OAIS), CCSDS 650.0-R-1</source>
<publisher-name>Consultative Committee for Space Data Systems</publisher-name>
<month>5</month>
<year>1999</year>
<fpage>140</fpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.ccsds.org/documents/pdf/CCSDS-650.0-R-1.pdf">http://www.ccsds.org/documents/pdf/CCSDS-650.0-R-1.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b23-j71lee">
<label>23</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Eaton</surname>
<given-names>FL</given-names>
</name>
</person-group>
<article-title>The National Archives and Electronic Records for Preservation</article-title>
<source>Preservation of Electronic Formats & Formats for Electronic Preservation</source>
<person-group person-group-type="editor">
<name>
<surname>Mohlhenrich</surname>
<given-names>Janice</given-names>
</name>
</person-group>
<publisher-name>Ft. Atkinson</publisher-name>
<publisher-loc>Highsmith</publisher-loc>
<year>1993</year>
</element-citation>
</ref>
<ref id="b24-j71lee">
<label>24</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bearman</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>The Implications of
<italic>Armstrong vs. Executive Office of the President</italic>
for the Archival Management of Electronic Records</article-title>
<source>Amer Archivist</source>
<volume>56</volume>
<fpage>150</fpage>
<lpage>160</lpage>
<year>1993</year>
</element-citation>
</ref>
<ref id="b25-j71lee">
<label>25</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Wheatley</surname>
<given-names>P</given-names>
</name>
</person-group>
<source>Migration—A CAMiLEON Discussion Paper</source>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.personal.leeds.ac.uk/~issprw/camileon/migration.htm">http://www.personal.leeds.ac.uk/~issprw/camileon/migration.htm</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b26-j71lee">
<label>26</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bearman</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>Reality and Chimeras in the Preservation of Electronic Records</article-title>
<source>D-Lib Mag</source>
<volume>5</volume>
<issue>4</issue>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.dlib.org/dlib/april99/bearman/04bearman.html">http://www.dlib.org/dlib/april99/bearman/04bearman.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b27-j71lee">
<label>27</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Lawrence</surname>
<given-names>GW</given-names>
</name>
<etal></etal>
</person-group>
<source>Risk Management of Digital Information: A File Format Investigation</source>
<conf-name>The Council on Library and Information Resources</conf-name>
<conf-loc>Washington DC</conf-loc>
<conf-date>June 2000</conf-date>
</element-citation>
</ref>
<ref id="b28-j71lee">
<label>28</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Harris</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ruben</surname>
<given-names>I</given-names>
</name>
</person-group>
<source>Bento Specification, Apple Computer Inc</source>
<month>7</month>
<year>1993</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://info.wgbh.org/upf/pdfs/BentoSpec1_0d5.pdf">http://info.wgbh.org/upf/pdfs/BentoSpec1_0d5.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b29-j71lee">
<label>29</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Rieger</surname>
<given-names>OY</given-names>
</name>
</person-group>
<source>Project PRISM: Preservation Metadata Research</source>
<conf-name>Proc. Conf. Information Infrastructures for Digital Preservation</conf-name>
<conf-loc>York, England</conf-loc>
<conf-date>2000</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/events/pres-2000/infopapers.html">http://www.rlg.org/events/pres-2000/infopapers.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b30-j71lee">
<label>30</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Day</surname>
<given-names>M</given-names>
</name>
</person-group>
<source>Issues and Approaches to Preservation Metadata</source>
<conf-name>Proc. RLG/NPO Conf. Guidelines for Digital Imaging</conf-name>
<conf-loc>University of Warwick</conf-loc>
<conf-date>1998</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/preserv/joint/day.html">http://www.rlg.org/preserv/joint/day.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b31-j71lee">
<label>31</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Shepard</surname>
<given-names>T</given-names>
</name>
<name>
<surname>MacCarn</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>The Universal Preservation Format: Background and Fundamentals</source>
<conf-name>Proc. Sixth Delos Workshop</conf-name>
<conf-loc>Tomar, Portugal</conf-loc>
<conf-date>1998</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.ercim.org/publication/ws-proceedings/DELOS6/upf.pdf">http://www.ercim.org/publication/ws-proceedings/DELOS6/upf.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b32-j71lee">
<label>32</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>MacCarn</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>Toward a Universal Data Format for the Preservation of Media</article-title>
<source>SMPTE J</source>
<volume>106</volume>
<fpage>477</fpage>
<year>1997</year>
</element-citation>
</ref>
<ref id="b33-j71lee">
<label>33</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Shepard</surname>
<given-names>T</given-names>
</name>
<name>
<surname>MacCarn</surname>
<given-names>D</given-names>
</name>
</person-group>
<source>The Universal Preservation Format: A Recommended Practice for Archiving Media and Electronic Records</source>
<publisher-name>WGBH Educational Foundation</publisher-name>
<publisher-loc>Boston</publisher-loc>
<year>1999</year>
</element-citation>
</ref>
<ref id="b34-j71lee">
<label>34</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Heminger</surname>
<given-names>AR</given-names>
</name>
<name>
<surname>Robertson</surname>
<given-names>SB</given-names>
</name>
</person-group>
<source>Digital Rosetta Stone: A Conceptual Model for Maintaining Long-term Access to Digital Documents</source>
<conf-name>Proc. Sixth Delos Workshop</conf-name>
<conf-loc>Tomar, Portugal</conf-loc>
<conf-date>1998</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.ercim.org/publication/ws-proceedings/DELOS6/rosetta.pdf">http://www.ercim.org/publication/ws-proceedings/DELOS6/rosetta.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b35-j71lee">
<label>35</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shepard</surname>
<given-names>T</given-names>
</name>
</person-group>
<article-title>Universal Preservation Format (UPF): Conceptual Framework</article-title>
<source>RLG DigiNews</source>
<volume>2</volume>
<issue>6</issue>
<year>1998</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/preserv/diginews/diginews2-6.html">http://www.rlg.org/preserv/diginews/diginews2-6.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b36-j71lee">
<label>36</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Kranch</surname>
<given-names>DA</given-names>
</name>
</person-group>
<source>Preserving Electronic Documents</source>
<conf-name>Proc. Conf. ACM Digital Libraries</conf-name>
<conf-loc>Pittsburgh</conf-loc>
<conf-date>1998</conf-date>
<fpage>295</fpage>
<lpage>296</lpage>
</element-citation>
</ref>
<ref id="b37-j71lee">
<label>37</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kranch</surname>
<given-names>DA</given-names>
</name>
</person-group>
<article-title>Beyond Migration: Preserving Electronic Documents with Digital Tablets</article-title>
<source>Inform Technol Libraries</source>
<volume>17</volume>
<issue>3</issue>
<fpage>138</fpage>
<lpage>148</lpage>
<year>1998</year>
</element-citation>
</ref>
<ref id="b38-j71lee">
<label>38</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Cloonan</surname>
<given-names>MV</given-names>
</name>
<name>
<surname>Sanett</surname>
<given-names>S</given-names>
</name>
</person-group>
<source>Comparing Preservation Strategies and Practices for Electronic Records</source>
<conf-name>Proc. Int’l Conf. Preservation and Long Term Accessibility of Digital Materials</conf-name>
<conf-loc>York, England</conf-loc>
<conf-date>2000</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/events/pres-2000/cloonan.html">http://www.rlg.org/events/pres-2000/cloonan.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b39-j71lee">
<label>39</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Kenney</surname>
<given-names>AR</given-names>
</name>
<name>
<surname>Rieger</surname>
<given-names>OY</given-names>
</name>
</person-group>
<article-title>The National Library of Australia’s Digital Preservation Agenda: An Interview with Colin Webb</article-title>
<source>RLG DigiNews</source>
<issue>5</issue>
<issue>1</issue>
<year>2001</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/preserv/diginews/diginews5-1.html">http://www.rlg.org/preserv/diginews/diginews5-1.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b40-j71lee">
<label>40</label>
<element-citation publication-type="web">
<article-title>PROS 99/007 Standard for the Management of Electronic Records</article-title>
<source>Public Record Office Victoria</source>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.prov.vic.gov.au/gservice/standard/pros9907.htm">http://www.prov.vic.gov.au/gservice/standard/pros9907.htm</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b41-j71lee">
<label>41</label>
<element-citation publication-type="book">
<source>Victorian Electronic Records Strategy Final Report</source>
<publisher-name>Public Records Office Victoria</publisher-name>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.prov.vic.gov.au/vers/final.htm">http://www.prov.vic.gov.au/vers/final.htm</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b42-j71lee">
<label>42</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Phillips</surname>
<given-names>ME</given-names>
</name>
</person-group>
<article-title>Ensuring Long-term Access to Online Publications</article-title>
<source>J Electron Publ</source>
<volume>4</volume>
<issue>4</issue>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.press.umich.edu/jep/04-04/phillips.html">http://www.press.umich.edu/jep/04-04/phillips.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b43-j71lee">
<label>43</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Webb</surname>
<given-names>C</given-names>
</name>
</person-group>
<source>Towards a Preserved National Collection of Selected Australian Digital Publications</source>
<conf-name>Proc. Int’l Conf. Preservation and Long Term Accessibility of Digital Materials</conf-name>
<conf-loc>York, England</conf-loc>
<conf-date>2000</conf-date>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.rlg.org/events/pres-2000/webb.html">http://www.rlg.org/events/pres-2000/webb.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b44-j71lee">
<label>44</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>W3C Recommendation</collab>
</person-group>
<source>Hypertext Markup Language (HTML) 4.01</source>
<publisher-name>World Wide Web Consortium</publisher-name>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.w3.org/TR/html4/">http://www.w3.org/TR/html4/</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b45-j71lee">
<label>45</label>
<element-citation publication-type="book">
<source>Electronic Records: Preservation and Migration of Electronic Records</source>
<publisher-name>National Archives of Australia</publisher-name>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.naa.gov.au/recordkeeping/er/summary.html#preservation">http://www.naa.gov.au/recordkeeping/er/summary.html#preservation</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b46-j71lee">
<label>46</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Inouye</surname>
<given-names>AS</given-names>
</name>
<name>
<surname>Digital</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>Strategy for the Library of Congress</article-title>
<source>Commun ACM</source>
<volume>44</volume>
<issue>5</issue>
<fpage>43</fpage>
<year>2001</year>
</element-citation>
</ref>
<ref id="b47-j71lee">
<label>47</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>Committee on an Information Technology Strategy for the Library of Congress</collab>
</person-group>
<source>LC21: A Digital Strategy for the Library of Congress</source>
<publisher-name>National Academy Press</publisher-name>
<publisher-loc>Washington, DC</publisher-loc>
<year>2001</year>
</element-citation>
</ref>
<ref id="b48-j71lee">
<label>48</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Moore</surname>
<given-names>R</given-names>
</name>
<etal></etal>
</person-group>
<article-title>Collection-Based Persistent Digital Archives: Part 1</article-title>
<source>D-Lib Mag</source>
<volume>6</volume>
<issue>3</issue>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.dlib.org/dlib/march00/moore/03moore-pt1.html">http://www.dlib.org/dlib/march00/moore/03moore-pt1.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b49-j71lee">
<label>49</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Moore</surname>
<given-names>R</given-names>
</name>
<etal></etal>
</person-group>
<article-title>Collection-Based Persistent Digital Archives: Part 2</article-title>
<source>D-Lib Mag</source>
<volume>6</volume>
<issue>4</issue>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.dlib.org/dlib/april00/moore/04moore-pt2.html">http://www.dlib.org/dlib/april00/moore/04moore-pt2.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b50-j71lee">
<label>50</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Duranti</surname>
<given-names>L</given-names>
</name>
</person-group>
<source>The Impact of Technological Change on Archival Theory</source>
<conf-name>Proc. Int’l Congress of Archives</conf-name>
<conf-loc>Seville</conf-loc>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.interpares.org/documents/ld_sevilla_2000.pdf">http://www.interpares.org/documents/ld_sevilla_2000.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b51-j71lee">
<label>51</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Podio</surname>
<given-names>F</given-names>
</name>
</person-group>
<source>Development of a Testing Methodology to Predict Optical Disk Life Expectancy Values</source>
<series>NIST Special Publication 500-200</series>
<publisher-name>NIST</publisher-name>
<publisher-loc>Gaithersburg, MD</publisher-loc>
<year>1991</year>
</element-citation>
</ref>
<ref id="b52-j71lee">
<label>52</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Bhagavatula</surname>
<given-names>VK</given-names>
</name>
</person-group>
<source>Turbo Coding for Data Storage</source>
<publisher-name>Carnegie Mellon University</publisher-name>
<year>2001</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://amp.ece.cmu.edu/ECESeminar/slides/kumar/kumar.pdf">http://amp.ece.cmu.edu/ECESeminar/slides/kumar/kumar.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b53-j71lee">
<label>53</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shannon</surname>
<given-names>CE</given-names>
</name>
</person-group>
<article-title>A Mathematical Theory of Communication</article-title>
<source>Bell Sys Tech J</source>
<volume>27</volume>
<fpage>379</fpage>
<lpage>423</lpage>
<year>1948</year>
</element-citation>
<note>
<p>ibid.
<bold>27</bold>
, 623–656 (1948)</p>
</note>
</ref>
<ref id="b54-j71lee">
<label>54</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>ISO/IEC 8879</collab>
</person-group>
<source>Information Processing—Text and Office Systems—Standard Generalized Markup Language (SGML)</source>
<publisher-name>International Organization for Standardization</publisher-name>
<year>1986</year>
</element-citation>
</ref>
<ref id="b55-j71lee">
<label>55</label>
<element-citation publication-type="web">
<article-title>OEB Publication Structure 1.0</article-title>
<source>Open eBook Forum</source>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.openebook.org/OEB1.html">http://www.openebook.org/OEB1.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b56-j71lee">
<label>56</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<collab>The CEDARS Project Team and UKOLN</collab>
</person-group>
<source>Metadata for Digital Preservation: The CEDARS Project Outline Specification</source>
<month>3</month>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.leeds.ac.uk/cedars/MD-STR~5.pdf">http://www.leeds.ac.uk/cedars/MD-STR~5.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b57-j71lee">
<label>57</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<collab>National Archives of Australia</collab>
</person-group>
<source>Recordkeeping Metadata Standard for Commonwealth Agencies Version 1.0</source>
<month>5</month>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.naa.gov.au/govserv/TECHPUB/rkms/intro.htm">http://www.naa.gov.au/govserv/TECHPUB/rkms/intro.htm</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b58-j71lee">
<label>58</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<collab>National Library of Australia</collab>
</person-group>
<source>Preservation Metadata for Digital Collections: Exposure Draft</source>
<month>10</month>
<year>1999</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.nla.gov.au/preserve/pmeta.html">http://www.nla.gov.au/preserve/pmeta.html</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b59-j71lee">
<label>59</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Lupovici</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Masanès</surname>
<given-names>J</given-names>
</name>
</person-group>
<source>Metadata for Long Term Preservation</source>
<month>7</month>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.kb.nl/coop/nedlib/results/preservationmetadata.pdf">http://www.kb.nl/coop/nedlib/results/preservationmetadata.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b60-j71lee">
<label>60</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<collab>OCLC/RLG Working Group on Preservation Metadata</collab>
</person-group>
<source>Preservation Metadata for Digital Objects: A Review of the State of the Art</source>
<month>1</month>
<year>2001</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.oclc.org/difitalpreservation/presmeta_wp.pdf">http://www.oclc.org/difitalpreservation/presmeta_wp.pdf</ext-link>
</comment>
</element-citation>
</ref>
<ref id="b61-j71lee">
<label>61</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Cullen</surname>
<given-names>CT</given-names>
</name>
<etal></etal>
</person-group>
<source>Authenticity in a Digital Environement</source>
<conf-name>The Council on Library and Information Resources</conf-name>
<conf-loc>Washington, DC</conf-loc>
<conf-date>May 2000</conf-date>
<fpage>84</fpage>
</element-citation>
</ref>
<ref id="b62-j71lee">
<label>62</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Dollar</surname>
<given-names>C</given-names>
</name>
</person-group>
<source>Authentic Electronic Records: Strategies for Long-Term Access</source>
<publisher-name>Cohasset Associates</publisher-name>
<publisher-loc>Chicago</publisher-loc>
<year>1998</year>
</element-citation>
</ref>
<ref id="b63-j71lee">
<label>63</label>
<element-citation publication-type="web">
<person-group person-group-type="author">
<name>
<surname>Russell</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Weinberger</surname>
<given-names>E</given-names>
</name>
</person-group>
<source>Cost Elements of Digital Preservation</source>
<year>2000</year>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.leeds.ac.uk/cedars/documents/CIW01r.html">http://www.leeds.ac.uk/cedars/documents/CIW01r.html</ext-link>
</comment>
</element-citation>
</ref>
</ref-list>
</back>
<floats-group>
<fig id="f1-j71lee" orientation="portrait" position="float">
<label>Fig. 1</label>
<caption>
<p>A progression of information preservation strategies.</p>
</caption>
<graphic xlink:href="j71leef1"></graphic>
</fig>
<fig id="f2-j71lee" orientation="portrait" position="float">
<label>Fig. 2</label>
<caption>
<p>Existing preservation approaches.</p>
</caption>
<graphic xlink:href="j71leef2"></graphic>
</fig>
<fig id="f3-j71lee" orientation="portrait" position="float">
<label>Fig. 3</label>
<caption>
<p>Rothenberg’s emulation-based preservation [
<xref rid="b15-j71lee" ref-type="bibr">15</xref>
].</p>
</caption>
<graphic xlink:href="j71leef3"></graphic>
</fig>
<fig id="f4-j71lee" orientation="portrait" position="float">
<label>Fig. 4</label>
<caption>
<p>A schematic diagram for selection of preservation techniques of digital information.</p>
</caption>
<graphic xlink:href="j71leef4"></graphic>
</fig>
<table-wrap id="t1-j71lee" orientation="portrait" position="float">
<label>Table 1</label>
<caption>
<p>Advantages and disadvantages of preservation techniques</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="1" colspan="1">Technique</th>
<th valign="top" align="center" rowspan="1" colspan="1">Advantages</th>
<th valign="top" align="center" rowspan="1" colspan="1">Disadvantages</th>
<th valign="top" align="center" rowspan="1" colspan="1">Domain</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" rowspan="1" colspan="1">Emulation</td>
<td valign="top" align="left" rowspan="1" colspan="1">Maintains the look and feel.</td>
<td valign="top" align="left" rowspan="1" colspan="1">The complexity of creating emulator specifications.
<break></break>
The large amount of information that must be preserved.
<break></break>
Archaic software required to access information.</td>
<td valign="top" align="left" rowspan="1" colspan="1">Application software.
<break></break>
Complex digital resources such as those that contain executable files.
<break></break>
Resources for which there is a lack of sufficient knowledge.
<break></break>
Resources for which the value is unknown and for which future use is unlikely.
<break></break>
Resources whose look and feel are important.</td>
</tr>
<tr>
<td valign="top" align="left" rowspan="1" colspan="1">Migration</td>
<td valign="top" align="left" rowspan="1" colspan="1">Does not need to retain original applications.
<break></break>
Supports active access and management.</td>
<td valign="top" align="left" rowspan="1" colspan="1">Significant cost for long-term preservation.
<break></break>
Information degradation.
<break></break>
Lack of preservation metadata.
<break></break>
Need for continued diligence on the part of archivists.</td>
<td valign="top" align="left" rowspan="1" colspan="1">Resources that are actively accessed and managed, such as scientific data or database.
<break></break>
Resources whose formats are sufficiently well known.</td>
</tr>
<tr>
<td valign="top" align="left" rowspan="1" colspan="1">Encapsulation</td>
<td valign="top" align="left" rowspan="1" colspan="1">Maintains preservation information.</td>
<td valign="top" align="left" rowspan="1" colspan="1">Knowledge about the format must be preserved.
<break></break>
Systems required for capturing the digital information.</td>
<td valign="top" align="left" rowspan="1" colspan="1">Resources that are unlikely to be accessed and managed actively.
<break></break>
Resources whose formats are sufficiently well-known.</td>
</tr>
</tbody>
</table>
</table-wrap>
</floats-group>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Informatique/explor/SgmlV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000196 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000196 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Informatique
   |area=    SgmlV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:4865277
   |texte=   The State of the Art and Practice in Digital Preservation
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:27446721" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a SgmlV1 

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jul 1 14:26:08 2019. Site generation: Wed Apr 28 21:40:44 2021