SlideShare a Scribd company logo
De-mystifying OAIS
compliance
Benefits and challenges of
mapping the OAIS reference
model to the GESIS Data Archive
Natascha Schumann, Astrid Recker
OAIS* in a (very small) nutshell
• *Reference Model for an Open Archival
Information System
• Most recent version: CCSDS 2012 (ISO
14721:2012)
• Highly influential and ground-breaking, but
also frequently misunderstood
CCSDS (2012). Reference Model for an Open Archival Information System (OAIS).
Recommended Practice. http://public.ccsds.org/publications/archive/650x0m2.pdf
What people say
• „We are currently implementing OAIS“
Image: Zonk! by Gwendal Uguen on flickr
OAIS is a reference model!
Abstract framework
describe and compare
Preservation strategies and
techniques
Does not specify a
design or an
implementation
entities
• Information packages
• Content Information
• Preservation Description
Information
• Packaging Information
• Descriptive Information
• Representation Information
• Negotiate for/accept information
• Ensure information is
Independently Understandable
• Determine Designated Communities
• Make information available
• Follow documented policies and
procedures
• Sufficient control of information
What does it mean to be
OAIS-compliant?
Support OAIS
information
model
Fulfill OAIS
responsibilities
Support of
functional
model not
required
What does it mean to be
OAIS-compliant?
• (Necessarily) vague concept
– does not lend itself to self-auditing or certification
– label „OAIS-compliant“ meaningless without
further context and specification
• Route commonly taken: compliance testing
by mapping of OAIS functions and
information model to Archive
Steps to check compliance
with the functionalities
• Prepare an overview about functional
model (excel sheet)
• Create a (simplified) workflow diagram
• Mapping example Pre-ingest/Ingest incl.
quality control
Overview - snippet
Archiving Workflow
Acquisition and deposit Ingest and processing Archival storage Dissemination and access
Temporary
storage
Archival
storage
Dissemination
server
Quality
control
Build data and
document set
Create
metadata
Metadata
database
Deposit study
and context
material
Access to
study and
metadata
Preservation
action
Data curation
Negotiate
Submission
Agreement
GESIS Pre-Ingest/Ingest
Negotiate
submission
agreement
Deposit study
and context
material
Quality
control
Definition SIP
Archival
contract
Validation
transfer
Verification
Quality control
Transformation
into AIP,
file format
conversion
• Disclosure control, control of
anonymity
• Control of completeness
• Technical control: formats, readability,
malware/virus check
• Control of plausibility
• Control of consistency
• Control of weightings
A B B
Acquisition and deposit Ingest and processing
GESIS
GESIS ↔ OAIS
Negotiate
submission
agreement
Deposit study
and context
material
Quality control
A B B
Negotiate
submission
agreement
Receive
submission
Audit
submission
Quality
assurance
Generate AIP
Administration AdministrationIngest Ingest
Acquisition and deposit Ingest and processing
GESIS
OAIS
… ……
Some findings
• At GESIS Data Archive pre-ingest and ingest
including quality control are central aspects
 important for all following steps
• No reference in OAIS to extensive quality control
• OAIS does not accommodate this in a single
function
 parts of it are located in different functions
• One colleague is responsible for most steps of this
part and acts like playing Twister :-)
Image “Four Storms and a Twister” by JD Hancock on flickr
Lessons learned: Benefits
• Terminology
Supports internal and external communication
• Self-reflection
Helps getting a clearer sense of what, as an
established Archive, one has already been doing
• Process evaluation
Helps spotting gaps and setting an agenda for
further development
Lessons learned: Challenges
• Simplicity vs. Complexity
– Certain OAIS (sub-)functions look neat
and tidy, but can turn into a “kraken”
when trying to map them
– Some functions not complex enough
(e.g. Ingest), depending on the digital objects
archived
Lessons learned: Challenges
• Formalism vs. Pragmatism
– In some places, OAIS describes highly
formalized processes which in reality are
carried out much more pragmatically
– Archives have to decide where more
formalism is needed and where pragmatism is
tenable or even beneficial
( risk assessment)
So what does it really mean to be
OAIS-compliant?
• Notion of OAIS-compliance is only
significant if extended to functional model
• Compliance comes in degrees: conscious
decisions for and against compliance
• Context counts!
Thank you for your attention!
Natascha Schumann | Dr. Astrid Recker
GESIS – Leibniz Institute for the Social Sciences, Data Archive
natascha.schumann@gesis.org | astrid.recker@gesis.org
www.gesis.org
Slides: http://www.slideshare.net/GESIS_Leibniz_Institut

More Related Content

Viewers also liked

CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
CNZ2013 Keynote | Trust in Digital Preservation | Natalie HarrowerCNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
dri_ireland
 
HNI leeromgeving 02
HNI leeromgeving 02HNI leeromgeving 02
HNI leeromgeving 02
fneggers
 
Challenges & opportunities in the preservation of (digital) information: the ...
Challenges & opportunities in the preservation of (digital) information: the ...Challenges & opportunities in the preservation of (digital) information: the ...
Challenges & opportunities in the preservation of (digital) information: the ...
LIBER Europe
 
The lifecycle of a short story
The lifecycle of a short storyThe lifecycle of a short story
The lifecycle of a short story
Lynne Thomas
 
Adding MediaConch to Archivematica for mkv/ffv1 checking
Adding MediaConch to Archivematica for mkv/ffv1 checkingAdding MediaConch to Archivematica for mkv/ffv1 checking
Adding MediaConch to Archivematica for mkv/ffv1 checking
Artefactual Systems - Archivematica
 
SHAREmodule2
SHAREmodule2SHAREmodule2
SHAREmodule2
Lynne Thomas
 
Character profiles
Character profilesCharacter profiles
Character profiles
EllenorHandy
 
Rebecca Grant - Collection creation, management and ingest
Rebecca Grant - Collection creation, management and ingestRebecca Grant - Collection creation, management and ingest
Rebecca Grant - Collection creation, management and ingest
dri_ireland
 
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
12th International Conference on Digital Preservation (iPRES 2015)
 
HNI leeromgeving 05
HNI leeromgeving 05HNI leeromgeving 05
HNI leeromgeving 05
fneggers
 
HNI leeromgeving 04
HNI leeromgeving 04HNI leeromgeving 04
HNI leeromgeving 04
fneggers
 
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul PrinslooLASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
University of South Africa (Unisa)
 
The DURAARK Workbench and PREMIS
The DURAARK Workbench and PREMISThe DURAARK Workbench and PREMIS
The DURAARK Workbench and PREMIS
lindlar
 
SHAREmodule1
SHAREmodule1SHAREmodule1
SHAREmodule1
Lynne Thomas
 
Digital Forensics for Digital Archives
Digital Forensics for Digital ArchivesDigital Forensics for Digital Archives
Digital Forensics for Digital Archives
Mark Matienzo
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...Mark Matienzo
 
Implementing digital preservation strategy: collection profiling at the Briti...
Implementing digital preservation strategy: collection profiling at the Briti...Implementing digital preservation strategy: collection profiling at the Briti...
Implementing digital preservation strategy: collection profiling at the Briti...
Michael Day
 
OCLC Digital Archive - Suzanne Butte (2002)
OCLC Digital Archive - Suzanne Butte (2002)OCLC Digital Archive - Suzanne Butte (2002)
OCLC Digital Archive - Suzanne Butte (2002)
faflrt
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
Mark Matienzo
 

Viewers also liked (20)

CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
CNZ2013 Keynote | Trust in Digital Preservation | Natalie HarrowerCNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrower
 
HNI leeromgeving 02
HNI leeromgeving 02HNI leeromgeving 02
HNI leeromgeving 02
 
Challenges & opportunities in the preservation of (digital) information: the ...
Challenges & opportunities in the preservation of (digital) information: the ...Challenges & opportunities in the preservation of (digital) information: the ...
Challenges & opportunities in the preservation of (digital) information: the ...
 
The lifecycle of a short story
The lifecycle of a short storyThe lifecycle of a short story
The lifecycle of a short story
 
Adding MediaConch to Archivematica for mkv/ffv1 checking
Adding MediaConch to Archivematica for mkv/ffv1 checkingAdding MediaConch to Archivematica for mkv/ffv1 checking
Adding MediaConch to Archivematica for mkv/ffv1 checking
 
SHAREmodule2
SHAREmodule2SHAREmodule2
SHAREmodule2
 
Character profiles
Character profilesCharacter profiles
Character profiles
 
Rebecca Grant - Collection creation, management and ingest
Rebecca Grant - Collection creation, management and ingestRebecca Grant - Collection creation, management and ingest
Rebecca Grant - Collection creation, management and ingest
 
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
Characterization of CDROMs for Emulation-based Access. Klaus Rechert, Thomas ...
 
HNI leeromgeving 05
HNI leeromgeving 05HNI leeromgeving 05
HNI leeromgeving 05
 
cv (2)
cv (2)cv (2)
cv (2)
 
HNI leeromgeving 04
HNI leeromgeving 04HNI leeromgeving 04
HNI leeromgeving 04
 
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul PrinslooLASI13 ZA 5 july2013 final 1 Paul Prinsloo
LASI13 ZA 5 july2013 final 1 Paul Prinsloo
 
The DURAARK Workbench and PREMIS
The DURAARK Workbench and PREMISThe DURAARK Workbench and PREMIS
The DURAARK Workbench and PREMIS
 
SHAREmodule1
SHAREmodule1SHAREmodule1
SHAREmodule1
 
Digital Forensics for Digital Archives
Digital Forensics for Digital ArchivesDigital Forensics for Digital Archives
Digital Forensics for Digital Archives
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
 
Implementing digital preservation strategy: collection profiling at the Briti...
Implementing digital preservation strategy: collection profiling at the Briti...Implementing digital preservation strategy: collection profiling at the Briti...
Implementing digital preservation strategy: collection profiling at the Briti...
 
OCLC Digital Archive - Suzanne Butte (2002)
OCLC Digital Archive - Suzanne Butte (2002)OCLC Digital Archive - Suzanne Butte (2002)
OCLC Digital Archive - Suzanne Butte (2002)
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 

Similar to De-mystifying OAIS compliance Benefits and challenges of mapping the OAIS reference model to the GESIS Data Archive

Digital Preservation - Manage and Provide Access
Digital Preservation - Manage and Provide AccessDigital Preservation - Manage and Provide Access
Digital Preservation - Manage and Provide Access
MichaelPaulmeno
 
Integration - the heart of researcher centric research data management system...
Integration - the heart of researcher centric research data management system...Integration - the heart of researcher centric research data management system...
Integration - the heart of researcher centric research data management system...
Repository Fringe
 
Keeex - On data governance - xofos-bafek-zebug
Keeex - On data governance - xofos-bafek-zebugKeeex - On data governance - xofos-bafek-zebug
Keeex - On data governance - xofos-bafek-zebug
Laurent Henocque
 
Biehl (2012) implementing a healthcare data warehouse
Biehl (2012) implementing a healthcare data warehouseBiehl (2012) implementing a healthcare data warehouse
Biehl (2012) implementing a healthcare data warehouse
rbiehl
 
Navigating the BI Stack _
Navigating the BI Stack _Navigating the BI Stack _
Navigating the BI Stack _Michael Phipps
 
Using agile for business process design and development oct 19, 2010 ottawa
Using agile for business process design and development oct 19, 2010 ottawaUsing agile for business process design and development oct 19, 2010 ottawa
Using agile for business process design and development oct 19, 2010 ottawa
AdaptiveOrg Inc.
 
2017 bio it world
2017 bio it world2017 bio it world
2017 bio it world
Chris Dwan
 
Lightweight Documentation: An Agile Approach
Lightweight Documentation: An Agile ApproachLightweight Documentation: An Agile Approach
Lightweight Documentation: An Agile Approach
Stephen Ritchie
 
Lightweight Documentation
Lightweight DocumentationLightweight Documentation
Lightweight Documentation
Stephen Ritchie
 
Agile Data Warehousing
Agile Data WarehousingAgile Data Warehousing
Agile Data Warehousing
Davide Mauri
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
Senturus
 
WCMS Evaluation Tips
WCMS Evaluation TipsWCMS Evaluation Tips
WCMS Evaluation Tips
Dave Olsen
 
Data Publishing Models by Sünje Dallmeier-Tiessen
Data Publishing Models by Sünje Dallmeier-TiessenData Publishing Models by Sünje Dallmeier-Tiessen
Data Publishing Models by Sünje Dallmeier-Tiessen
datascienceiqss
 
Data Description Registry Interoperability WG at Research Data Alliance Third...
Data Description Registry Interoperability WG at Research Data Alliance Third...Data Description Registry Interoperability WG at Research Data Alliance Third...
Data Description Registry Interoperability WG at Research Data Alliance Third...
amiraryani
 
NetCom Learning : How to Improve Business Processes using Agile
NetCom Learning : How to Improve Business Processes using AgileNetCom Learning : How to Improve Business Processes using Agile
NetCom Learning : How to Improve Business Processes using Agile
Swati Chhabra
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
African Open Science Platform
 
Nimble Framework - Software architecture and design in agile era - PSQT Template
Nimble Framework - Software architecture and design in agile era - PSQT TemplateNimble Framework - Software architecture and design in agile era - PSQT Template
Nimble Framework - Software architecture and design in agile era - PSQT Templatetjain
 
ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation
ARDC
 
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
faflrt
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at NetflixJason Chan
 

Similar to De-mystifying OAIS compliance Benefits and challenges of mapping the OAIS reference model to the GESIS Data Archive (20)

Digital Preservation - Manage and Provide Access
Digital Preservation - Manage and Provide AccessDigital Preservation - Manage and Provide Access
Digital Preservation - Manage and Provide Access
 
Integration - the heart of researcher centric research data management system...
Integration - the heart of researcher centric research data management system...Integration - the heart of researcher centric research data management system...
Integration - the heart of researcher centric research data management system...
 
Keeex - On data governance - xofos-bafek-zebug
Keeex - On data governance - xofos-bafek-zebugKeeex - On data governance - xofos-bafek-zebug
Keeex - On data governance - xofos-bafek-zebug
 
Biehl (2012) implementing a healthcare data warehouse
Biehl (2012) implementing a healthcare data warehouseBiehl (2012) implementing a healthcare data warehouse
Biehl (2012) implementing a healthcare data warehouse
 
Navigating the BI Stack _
Navigating the BI Stack _Navigating the BI Stack _
Navigating the BI Stack _
 
Using agile for business process design and development oct 19, 2010 ottawa
Using agile for business process design and development oct 19, 2010 ottawaUsing agile for business process design and development oct 19, 2010 ottawa
Using agile for business process design and development oct 19, 2010 ottawa
 
2017 bio it world
2017 bio it world2017 bio it world
2017 bio it world
 
Lightweight Documentation: An Agile Approach
Lightweight Documentation: An Agile ApproachLightweight Documentation: An Agile Approach
Lightweight Documentation: An Agile Approach
 
Lightweight Documentation
Lightweight DocumentationLightweight Documentation
Lightweight Documentation
 
Agile Data Warehousing
Agile Data WarehousingAgile Data Warehousing
Agile Data Warehousing
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
 
WCMS Evaluation Tips
WCMS Evaluation TipsWCMS Evaluation Tips
WCMS Evaluation Tips
 
Data Publishing Models by Sünje Dallmeier-Tiessen
Data Publishing Models by Sünje Dallmeier-TiessenData Publishing Models by Sünje Dallmeier-Tiessen
Data Publishing Models by Sünje Dallmeier-Tiessen
 
Data Description Registry Interoperability WG at Research Data Alliance Third...
Data Description Registry Interoperability WG at Research Data Alliance Third...Data Description Registry Interoperability WG at Research Data Alliance Third...
Data Description Registry Interoperability WG at Research Data Alliance Third...
 
NetCom Learning : How to Improve Business Processes using Agile
NetCom Learning : How to Improve Business Processes using AgileNetCom Learning : How to Improve Business Processes using Agile
NetCom Learning : How to Improve Business Processes using Agile
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
 
Nimble Framework - Software architecture and design in agile era - PSQT Template
Nimble Framework - Software architecture and design in agile era - PSQT TemplateNimble Framework - Software architecture and design in agile era - PSQT Template
Nimble Framework - Software architecture and design in agile era - PSQT Template
 
ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation ADA - CoretrustSeal webinar presentation
ADA - CoretrustSeal webinar presentation
 
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
OAIS and It's Applicability for Libraries, Archives, and Digital Repositories...
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 

More from CESSDA Training

Höher, schneller, weiter? Datenmanagement mit Augenmaß!
Höher, schneller, weiter? Datenmanagement mit Augenmaß!Höher, schneller, weiter? Datenmanagement mit Augenmaß!
Höher, schneller, weiter? Datenmanagement mit Augenmaß!
CESSDA Training
 
Was sind Daten, Forschungsdaten, Metadaten?
Was sind Daten, Forschungsdaten, Metadaten?Was sind Daten, Forschungsdaten, Metadaten?
Was sind Daten, Forschungsdaten, Metadaten?
CESSDA Training
 
Supporting the creation, management, and long-term preservation of social sc...
Supporting the creation, management, and  long-term preservation of social sc...Supporting the creation, management, and  long-term preservation of social sc...
Supporting the creation, management, and long-term preservation of social sc...
CESSDA Training
 
Academic Writing and Research Data Management
Academic Writing and Research Data ManagementAcademic Writing and Research Data Management
Academic Writing and Research Data Management
CESSDA Training
 
Alive and kicking! Keeping data re-usable in the European Values Study
Alive and kicking! Keeping data re-usable in the European Values StudyAlive and kicking! Keeping data re-usable in the European Values Study
Alive and kicking! Keeping data re-usable in the European Values Study
CESSDA Training
 
Access Policies and Licensing for Archives and Repositories
Access Policies and Licensing for Archives and RepositoriesAccess Policies and Licensing for Archives and Repositories
Access Policies and Licensing for Archives and RepositoriesCESSDA Training
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
CESSDA Training
 
Archive and Data Management Training Center
Archive and Data Management Training CenterArchive and Data Management Training Center
Archive and Data Management Training Center
CESSDA Training
 
Archiving and Data Management Training and Information Center
Archiving and Data Management Training and Information CenterArchiving and Data Management Training and Information Center
Archiving and Data Management Training and Information Center
CESSDA Training
 
Archives as a market regulator, or how can archives connect supply and demand?
Archives as a market regulator, or how can archives connect supply and demand?Archives as a market regulator, or how can archives connect supply and demand?
Archives as a market regulator, or how can archives connect supply and demand?
CESSDA Training
 
Election studies: a research data management challenge
Election studies: a research data management challengeElection studies: a research data management challenge
Election studies: a research data management challenge
CESSDA Training
 

More from CESSDA Training (11)

Höher, schneller, weiter? Datenmanagement mit Augenmaß!
Höher, schneller, weiter? Datenmanagement mit Augenmaß!Höher, schneller, weiter? Datenmanagement mit Augenmaß!
Höher, schneller, weiter? Datenmanagement mit Augenmaß!
 
Was sind Daten, Forschungsdaten, Metadaten?
Was sind Daten, Forschungsdaten, Metadaten?Was sind Daten, Forschungsdaten, Metadaten?
Was sind Daten, Forschungsdaten, Metadaten?
 
Supporting the creation, management, and long-term preservation of social sc...
Supporting the creation, management, and  long-term preservation of social sc...Supporting the creation, management, and  long-term preservation of social sc...
Supporting the creation, management, and long-term preservation of social sc...
 
Academic Writing and Research Data Management
Academic Writing and Research Data ManagementAcademic Writing and Research Data Management
Academic Writing and Research Data Management
 
Alive and kicking! Keeping data re-usable in the European Values Study
Alive and kicking! Keeping data re-usable in the European Values StudyAlive and kicking! Keeping data re-usable in the European Values Study
Alive and kicking! Keeping data re-usable in the European Values Study
 
Access Policies and Licensing for Archives and Repositories
Access Policies and Licensing for Archives and RepositoriesAccess Policies and Licensing for Archives and Repositories
Access Policies and Licensing for Archives and Repositories
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
 
Archive and Data Management Training Center
Archive and Data Management Training CenterArchive and Data Management Training Center
Archive and Data Management Training Center
 
Archiving and Data Management Training and Information Center
Archiving and Data Management Training and Information CenterArchiving and Data Management Training and Information Center
Archiving and Data Management Training and Information Center
 
Archives as a market regulator, or how can archives connect supply and demand?
Archives as a market regulator, or how can archives connect supply and demand?Archives as a market regulator, or how can archives connect supply and demand?
Archives as a market regulator, or how can archives connect supply and demand?
 
Election studies: a research data management challenge
Election studies: a research data management challengeElection studies: a research data management challenge
Election studies: a research data management challenge
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

De-mystifying OAIS compliance Benefits and challenges of mapping the OAIS reference model to the GESIS Data Archive

  • 1. De-mystifying OAIS compliance Benefits and challenges of mapping the OAIS reference model to the GESIS Data Archive Natascha Schumann, Astrid Recker
  • 2. OAIS* in a (very small) nutshell • *Reference Model for an Open Archival Information System • Most recent version: CCSDS 2012 (ISO 14721:2012) • Highly influential and ground-breaking, but also frequently misunderstood CCSDS (2012). Reference Model for an Open Archival Information System (OAIS). Recommended Practice. http://public.ccsds.org/publications/archive/650x0m2.pdf
  • 3. What people say • „We are currently implementing OAIS“ Image: Zonk! by Gwendal Uguen on flickr
  • 4. OAIS is a reference model! Abstract framework describe and compare Preservation strategies and techniques Does not specify a design or an implementation entities
  • 5. • Information packages • Content Information • Preservation Description Information • Packaging Information • Descriptive Information • Representation Information • Negotiate for/accept information • Ensure information is Independently Understandable • Determine Designated Communities • Make information available • Follow documented policies and procedures • Sufficient control of information What does it mean to be OAIS-compliant? Support OAIS information model Fulfill OAIS responsibilities Support of functional model not required
  • 6. What does it mean to be OAIS-compliant? • (Necessarily) vague concept – does not lend itself to self-auditing or certification – label „OAIS-compliant“ meaningless without further context and specification • Route commonly taken: compliance testing by mapping of OAIS functions and information model to Archive
  • 7. Steps to check compliance with the functionalities • Prepare an overview about functional model (excel sheet) • Create a (simplified) workflow diagram • Mapping example Pre-ingest/Ingest incl. quality control
  • 9. Archiving Workflow Acquisition and deposit Ingest and processing Archival storage Dissemination and access Temporary storage Archival storage Dissemination server Quality control Build data and document set Create metadata Metadata database Deposit study and context material Access to study and metadata Preservation action Data curation Negotiate Submission Agreement
  • 10. GESIS Pre-Ingest/Ingest Negotiate submission agreement Deposit study and context material Quality control Definition SIP Archival contract Validation transfer Verification Quality control Transformation into AIP, file format conversion • Disclosure control, control of anonymity • Control of completeness • Technical control: formats, readability, malware/virus check • Control of plausibility • Control of consistency • Control of weightings A B B Acquisition and deposit Ingest and processing GESIS
  • 11. GESIS ↔ OAIS Negotiate submission agreement Deposit study and context material Quality control A B B Negotiate submission agreement Receive submission Audit submission Quality assurance Generate AIP Administration AdministrationIngest Ingest Acquisition and deposit Ingest and processing GESIS OAIS … ……
  • 12. Some findings • At GESIS Data Archive pre-ingest and ingest including quality control are central aspects  important for all following steps • No reference in OAIS to extensive quality control • OAIS does not accommodate this in a single function  parts of it are located in different functions • One colleague is responsible for most steps of this part and acts like playing Twister :-)
  • 13. Image “Four Storms and a Twister” by JD Hancock on flickr
  • 14. Lessons learned: Benefits • Terminology Supports internal and external communication • Self-reflection Helps getting a clearer sense of what, as an established Archive, one has already been doing • Process evaluation Helps spotting gaps and setting an agenda for further development
  • 15. Lessons learned: Challenges • Simplicity vs. Complexity – Certain OAIS (sub-)functions look neat and tidy, but can turn into a “kraken” when trying to map them – Some functions not complex enough (e.g. Ingest), depending on the digital objects archived
  • 16. Lessons learned: Challenges • Formalism vs. Pragmatism – In some places, OAIS describes highly formalized processes which in reality are carried out much more pragmatically – Archives have to decide where more formalism is needed and where pragmatism is tenable or even beneficial ( risk assessment)
  • 17. So what does it really mean to be OAIS-compliant? • Notion of OAIS-compliance is only significant if extended to functional model • Compliance comes in degrees: conscious decisions for and against compliance • Context counts!
  • 18. Thank you for your attention! Natascha Schumann | Dr. Astrid Recker GESIS – Leibniz Institute for the Social Sciences, Data Archive natascha.schumann@gesis.org | astrid.recker@gesis.org www.gesis.org Slides: http://www.slideshare.net/GESIS_Leibniz_Institut