SlideShare a Scribd company logo
1 of 98
DRAMBORA:  Risk and Trust and Data Management   Martin Donnelly DCC, University of Edinburgh [email_address]   (and Andrew McHugh, Sarah Jones, Joy Davidson,  Seamus Ross, Raivo Ruusalepp, Perla Innocenti…)
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA covers:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of a repository ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
10 Characteristics of Digital Repositories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(CRL/OCLC/NESTOR/DCC/DPE meeting,  January 2007) © HATII UofGlasgow, 2007
Trustworthiness and Archival Stewardship ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Challenge of Building Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trustworthy Repositories Audit & Certification (TRAC) Criteria and Checklist ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk and Repositories
Types of preservation risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standard Risk Management Model
Risk Management and Digital Preservation ,[object Object],[object Object],[object Object],[object Object],[object Object]
The nestor  Catalogue of Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object],www.digitalpreservation.de
Top down approach: tried and tested ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Risks of Objectivism ,[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Evolution of an Audit Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does this mean in practice? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Risks of Subjectivity ,[object Object],[object Object],[object Object],[object Object]
Finding Islands of Objectivity ,[object Object],[object Object],[object Object]
* Discussion Break * ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Audit Process  in a bit more detail
6 key questions ahead of the audit  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #1 Why? ,[object Object],[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #2 What? ,[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #3 Who? ,[object Object],[object Object],[object Object],[object Object],[object Object],AND
6 questions for auditing: #4 Where? ,[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #5 When? ,[object Object],[object Object],[object Object]
6 questions for auditing: #6 How? ,[object Object],[object Object],[object Object],[object Object]
Risk Impact, Risk Management  and DRAMBORA
Risk Impact in the repository context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management and DRAMBORA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Workflow Preliminary  collecting  and analysis  of  repository documentation Organise  appointments and  onsite visits with repository staff  (managers, curators, IT, legal experts…) Risk registry  finalisation  Audit report  finalisation Impact  on individuals and organisations
DRAMBORA Sample Audits (i) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ross, S., McHugh, A., Innocenti, P., Ruusalepp, R.: Investigation of the potential application of the DRAMBORA toolkit in the context of digital libraries to support the assessment of the repository aspects of digital libraries (Glasgow: DELOS NoE, August 2008) (ISBN: 2-912335-41-8)
DRAMBORA Sample Audits (ii) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ross, S., McHugh, A., Innocenti, P., Ruusalepp, R.: Investigation of the potential application of the DRAMBORA toolkit in the context of digital libraries to support the assessment of the repository aspects of digital libraries (Glasgow: DELOS NoE, August 2008) (ISBN: 2-912335-41-8)
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA stages in brief ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining and identifying risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy of a risk The name of the individual who assumes ultimate responsibility for the risk in the event of the stated risk owner relinquishing control Escalation Owner:  Name of risk owner - usually the same as owner of corresponding activity Owner:  Hardware, software or communications equipment and facilities Operations and service delivery Personnel, management and administration procedures Physical environment Nature of Risk:  Date that risk was first identified  Date of Risk Identification: Example circumstances within which risk will or may execute Example Risk Manifestation(s):  A longer text string offering a fuller description of this risk Risk Description: A short text string describing the risk Risk Name:  A text string provided by the repository to uniquely identify this risk and facilitate references to it within risk relationship expressions Risk Identifier:
Anatomy of a risk A targetted risk-severity rating plus risk reassessment date Risk Management Activity Target:  Individual(s) responsible for performance of risk management activities Risk Management Activity Owner:  Practical activities deriving from defined policies and procedures Risk Management Activity(ies):  Description of policies and procedures to be pursued in order to manage (avoid and/or treat) risk Risk Management Strategy(ies):  A derived value, representing the product of probability and potential impact scores Risk Severity:  This indicates the perceived impact of the execution of this risk in terms of loss of digital objects' understandability and authenticity Risk Potential Impact:  This indicates the perceived likelihood of the execution of this particular risk Risk Probability:  A description of each of the risks with which this risk has relationships Risk Relationships:  Parties with an investment or assets threatened by the risk's execution, or with responsibility for its management Stakeholders:
Risk Relationships where risks exist in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of  n  risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
Scenario for the Exercise ,[object Object],[object Object],[object Object]
Part I – Identify a risk (30 minutes) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part II – Mitigate the risk (30 minutes) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Risk Assessment Exercise  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Interactive www.repositoryaudit.eu
DRAMBORA Interactive ,[object Object],[object Object],[object Object]
Step-by-Step ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Repository Registration
Login ,[object Object],[object Object],[object Object]
Before the audit can start… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Repository Administration ,[object Object],[object Object],[object Object]
Repository Administration
Define the Audit Scope ,[object Object],[object Object]
Define Repository Scope
Functional classes ,[object Object],[object Object],[object Object]
Functional Classes
Repository Staff ,[object Object],[object Object],[object Object],[object Object]
Add/Edit Repository Staff
Repository Roles ,[object Object],[object Object],[object Object]
Add, Edit & Assign Roles
User Administration ,[object Object],[object Object],[object Object],[object Object],[object Object]
User Administration
Beginning the Audit ,[object Object],[object Object],[object Object]
Define Repository Mandate ,[object Object],[object Object],[object Object]
Define Mandate
Define Constraints ,[object Object],[object Object],[object Object]
Define Constraints
Define Objectives ,[object Object],[object Object],[object Object],[object Object]
Define Objectives
Define Activities, Assets, Owners ,[object Object],[object Object],[object Object]
Define Activities etc.
Identify Risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identify Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identify Risks
Assess Risks ,[object Object],[object Object]
Assess Risks ,[object Object],[object Object],[object Object],[object Object]
Risk Assessment
Manage Risks ,[object Object],[object Object]
Risk Relationships risks exists in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of  n  risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
Manage Risks
Reporting Audit Results ,[object Object],[object Object],[object Object]
Audit Reporting
Audit Snapshots ,[object Object],[object Object],[object Object]
Snapshot View
Ongoing and future developments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Curation Lifecycle Model ,[object Object],[object Object]
What is DAF? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overlaps and Differences self-management tools to assess the effectiveness of approach to data management or preservation   - Repository focus - Process emphasis - Lifecycle: Preservation phase - Researcher focus - Data emphasis  - Lifecycle: Creation phase
What is collected in DAF? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mappings to DRAMBORA ,[object Object],[object Object],[object Object],[object Object]
Integrated  Data Management  Planning tool AIDA http://aida.jiscinvolve.org http://www.life.ac.uk/ http://www.data-audit.eu/ coming soon…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contacts

More Related Content

Similar to KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly

Practical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPEPractical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPEDigitalPreservationEurope
 
Starting a Digital Preservation Program
Starting a Digital Preservation ProgramStarting a Digital Preservation Program
Starting a Digital Preservation ProgramSarah Shreeves
 
Implementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research DataImplementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research DataMartin Hamilton
 
Digital Preservation
Digital PreservationDigital Preservation
Digital PreservationMichael Day
 
Digital Preservation for DAMs
Digital Preservation for DAMsDigital Preservation for DAMs
Digital Preservation for DAMsEmily Kolvitz
 
Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)Mal Booth
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservationFIAT/IFTA
 
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)faflrt
 
Digital Preservation
Digital PreservationDigital Preservation
Digital PreservationMichael Day
 
Hans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital PreservationHans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital PreservationNational Digital Forum
 
Criteria for a trusted institutional repository
Criteria for a trusted institutional repositoryCriteria for a trusted institutional repository
Criteria for a trusted institutional repositoryIna Smith
 
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)dri_ireland
 
How core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie HarrowerHow core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie HarrowerOpenAIRE
 
How the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR DataHow the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR Datadri_ireland
 
The case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation toolThe case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation toolbertwerk
 
Archive service accreditation digital developments for ARA Conference 2016
Archive service accreditation   digital developments for ARA Conference 2016Archive service accreditation   digital developments for ARA Conference 2016
Archive service accreditation digital developments for ARA Conference 2016Melinda Haunton
 

Similar to KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly (20)

Trm Trusted Repositories
Trm Trusted RepositoriesTrm Trusted Repositories
Trm Trusted Repositories
 
Practical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPEPractical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPE
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
Starting a Digital Preservation Program
Starting a Digital Preservation ProgramStarting a Digital Preservation Program
Starting a Digital Preservation Program
 
Implementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research DataImplementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research Data
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Digital Preservation for DAMs
Digital Preservation for DAMsDigital Preservation for DAMs
Digital Preservation for DAMs
 
Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservation
 
DATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional RepositoriesDATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional Repositories
 
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Hans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital PreservationHans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital Preservation
 
Criteria for a trusted institutional repository
Criteria for a trusted institutional repositoryCriteria for a trusted institutional repository
Criteria for a trusted institutional repository
 
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
 
How core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie HarrowerHow core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie Harrower
 
How the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR DataHow the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR Data
 
The case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation toolThe case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation tool
 
Archive service accreditation digital developments for ARA Conference 2016
Archive service accreditation   digital developments for ARA Conference 2016Archive service accreditation   digital developments for ARA Conference 2016
Archive service accreditation digital developments for ARA Conference 2016
 
CARDIO
CARDIOCARDIO
CARDIO
 

More from JISC KeepIt project

EPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningEPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningJISC KeepIt project
 
Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...JISC KeepIt project
 
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010JISC KeepIt project
 
Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...JISC KeepIt project
 
Keepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseKeepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseJISC KeepIt project
 
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberPreservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberJISC KeepIt project
 
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...JISC KeepIt project
 
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...JISC KeepIt project
 
KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...JISC KeepIt project
 
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauKeepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauJISC KeepIt project
 
KeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesKeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesJISC KeepIt project
 
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...JISC KeepIt project
 
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...JISC KeepIt project
 
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...JISC KeepIt project
 
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...JISC KeepIt project
 
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...JISC KeepIt project
 
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...JISC KeepIt project
 
KeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowKeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowJISC KeepIt project
 

More from JISC KeepIt project (20)

EPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningEPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation Planning
 
Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...
 
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
 
Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...
 
Keepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseKeepit Course 5: Concluding the course
Keepit Course 5: Concluding the course
 
Keepit Course 5: Revision
Keepit Course 5: RevisionKeepit Course 5: Revision
Keepit Course 5: Revision
 
Keepit Course 5: Trust
Keepit Course 5: TrustKeepit Course 5: Trust
Keepit Course 5: Trust
 
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberPreservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
 
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
 
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
 
KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...
 
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauKeepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
 
KeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesKeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to Repositories
 
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
 
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
 
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
 
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
 
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
 
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
 
KeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowKeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflow
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly

  • 1. DRAMBORA: Risk and Trust and Data Management Martin Donnelly DCC, University of Edinburgh [email_address] (and Andrew McHugh, Sarah Jones, Joy Davidson, Seamus Ross, Raivo Ruusalepp, Perla Innocenti…)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. The Audit Process in a bit more detail
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Risk Impact, Risk Management and DRAMBORA
  • 34.
  • 35.
  • 36. DRAMBORA Workflow Preliminary collecting and analysis of repository documentation Organise appointments and onsite visits with repository staff (managers, curators, IT, legal experts…) Risk registry finalisation Audit report finalisation Impact on individuals and organisations
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Anatomy of a risk The name of the individual who assumes ultimate responsibility for the risk in the event of the stated risk owner relinquishing control Escalation Owner: Name of risk owner - usually the same as owner of corresponding activity Owner: Hardware, software or communications equipment and facilities Operations and service delivery Personnel, management and administration procedures Physical environment Nature of Risk: Date that risk was first identified Date of Risk Identification: Example circumstances within which risk will or may execute Example Risk Manifestation(s): A longer text string offering a fuller description of this risk Risk Description: A short text string describing the risk Risk Name: A text string provided by the repository to uniquely identify this risk and facilitate references to it within risk relationship expressions Risk Identifier:
  • 43. Anatomy of a risk A targetted risk-severity rating plus risk reassessment date Risk Management Activity Target: Individual(s) responsible for performance of risk management activities Risk Management Activity Owner: Practical activities deriving from defined policies and procedures Risk Management Activity(ies): Description of policies and procedures to be pursued in order to manage (avoid and/or treat) risk Risk Management Strategy(ies): A derived value, representing the product of probability and potential impact scores Risk Severity: This indicates the perceived impact of the execution of this risk in terms of loss of digital objects' understandability and authenticity Risk Potential Impact: This indicates the perceived likelihood of the execution of this particular risk Risk Probability: A description of each of the risks with which this risk has relationships Risk Relationships: Parties with an investment or assets threatened by the risk's execution, or with responsibility for its management Stakeholders:
  • 44. Risk Relationships where risks exist in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of n risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 51.
  • 52.
  • 54.
  • 55.
  • 56.
  • 58.
  • 60.
  • 62.
  • 64.
  • 65. Add, Edit & Assign Roles
  • 66.
  • 68.
  • 69.
  • 71.
  • 73.
  • 75.
  • 77.
  • 78.
  • 80.
  • 81.
  • 83.
  • 84. Risk Relationships risks exists in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of n risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
  • 86.
  • 88.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94. Overlaps and Differences self-management tools to assess the effectiveness of approach to data management or preservation - Repository focus - Process emphasis - Lifecycle: Preservation phase - Researcher focus - Data emphasis - Lifecycle: Creation phase
  • 95.
  • 96.
  • 97. Integrated Data Management Planning tool AIDA http://aida.jiscinvolve.org http://www.life.ac.uk/ http://www.data-audit.eu/ coming soon…
  • 98.

Editor's Notes

  1. Hard to define: but we must define it if we want to automate its handling Multi-facetted: not one simple score that covers all data quality, need many such scores… expensive Highly app specific means: again need more than one score, hard to reuse the details of the scores Highly subjective: means difficult to completely automate
  2. Physical : Theft, vandalism, arson, building related risks, Storm, flood, other related weather, damage to vehicles, mobile plant and equipment.
  3. In the last 50 years, computer science has witnessed numerous cycles of software development migration, and the literature contains many studies, case reports, and models. Several publications were very useful in developing our understanding of risk assessment of digital information. Rapid Development (McConnell 1996) is a monograph on the general problems associated with software development. In many respects, software development exhibits several of the same problems associated with basic digital preservation. While researching risk assessments, we were struck by the vast differences in basic definitions used by different disciplines. (For example, see Reinert, Bartell, and Biddinger [1994], Warren-Hicks and Moore [1995], McNamee [1996], Wilson and Crouch [1987], Starr [1969], and Lagadec [1982]). Numerous professions measure risk, and each assigns risks a unique vocabulary and context. The degree and type of risk associated with any data archive may be understood differently by administrators, operational staff members, and data users, depending upon their individual training and experience. The measurement of risk was equally problematic. One paper correlated risk level with the nonlinear relative probability of risk occurring (Kansala 1997). Another publication introduced an algebraic formula (McConnell 1996). In a third instance, a research group felt that cases where one could accurately assess the probability of a future event were rare because the information technology environment for software changes so rapidly. They preferred simple estimates, such as high , medium , and low , which they believed facilitated decision making (Williams, Walker, and Dorofee 1997). Risk-measurement scales, like risk definitions, are as distinctive as their developers.
  4. Funded by the German Ministry of Education and Research
  5. If an auditor goes to where the activity takes place, he will observe more than he could with mere explanation, and will have more insight on what follow-ups to ask. Also ask for a demonstration of the procedure: when a procedure takes place is often not described. And some procedures take place in multiple or undefined locations.
  6. Excerpt: The process was extremely insightful and highlighted possible areas where the DRAMBORA methodology could be improved, as well as a range of generic objectives, functions and concerns common to digital libraries. We concluded that the take-up and use of DRAMBORA would benefit from the introduction of an interactive tool and sharable registry of responses so that organisations undertaking self-assessment could profit from the experiences and responses of the organisations that they consider to be their peers. Further clarification was achieved about the specific classes of post-holders that should participate in the assessment process, as well as the optimal number of participants and most appropriate means of establishing conversational focus. We gained a better understanding of the practical ways in which organisations assess their risks; as a result we concluded that the original DRAMBORA risk impact and probability scores could be made less granular, and that more opportunities should be available for respondents to consider the severity of their risks in more relative terms, rather than in comparison with objective impact and probability metrics. These four assessments have also made it possible to develop a generic risk profile for digital libraries. Finally, from the perspective of each of the audited institutions, the process was overwhelmingly successful; testimonials from representatives of each described in detail the benefits of formally scrutinising the organisational characteristics and implicit challenges faced within their own digital library.
  7. Risk assessment and the DRAMBORA methodology 15 July 2009 Donnelly, McHugh, Ross, Innocenti, Ruusalepp and Hofman AREAS OF EXPRESSION - Reputation and intangibles - Organisational viability - Service delivery - Technology
  8. Trick is to work backwards from mandate and goals: what could prevent these from being achieved?
  9. No single entry point into lifecycle. Tools cover different, but at times overlapping, phases of it
  10. - The underlying methodologies are the same: both are self-management tools to assess the extent to which you’re meeting goals, be that running effective repositories or good data management - The chief difference lies in the context in which they’re applied. DRAMBORA focuses on repositories and how well they’re meeting their mission OR helps with planning the development of trusted repositories (PLATTER useful here too) DAF assesses the management of data in the earlier stages of the lifecycle, looking more at the work of researchers - Information may not always map directly between the two tools as each assessment will have different parameters and be a self-contained process, however they will inform each other. e.g. the risks / gaps noted in a DAF assessment will point to what’s needed from a repository or more formal curation environment e.g. the standards and technologies used for data creation could point to preservation issues or DRAMBORA risks e.g. tracking assets from the point of creation using DAF to deposit and ongoing risk assessment activity may have a positive impact on the assets’ authenticity for the longer-term
  11. - Primary output from DAF is the register of data assets. This could feed into DRAMBORA assessment, but would also be a useful tool for repositories e.g. to track data / prompt ingest - Information on roles could map directly to DRAMBORA as some support / skills may overlap - Underlying context is a key area covered in DAF that can inform DRAMBORA. Funder requirements / legislative context will be similar Standards / best practice used at creation will affect longer-term curation - Data management risks will likely echo repository risks as both will have similar aims e.g. ensuring data integrity / authenticity, continued access, meaningful / reusable resources - Risks faced in one context could cast light on issues that may be faced in another OR may help to demonstrate value of other e.g. data better curated in repository context
  12. Here is a visualisation of the DRAMBORA process and the points at which DAF information may feed through Note: Assets has broader definition in DRAMBORA - includes software, physical assets, services, processes, people and intangibles Considering the DAF asset register as a collection may be beneficial for providing a more well-defined context for DRAMBORA audits. In this respect, the collections of assets could be assessed to reflect specific research projects, specific types of assets (e.g., images), department or institution, or perhaps even from a contributor perspective (i.e, a collection of assets reflecting various work for a specific researcher.
  13. - JISC funded project starting in November to integrate several related data management planning tools - Aim is to help institutions plan for and benchmark / assess their data management strategy AIDA about institutional preparedness for preservation: organisation; technology; resources LIFE about preservation costs – HATII will be developing the tool - Will work in collaboration with / provide support to 07/09 data infrastructure projects Let us know what overlaps you see between DRAMBORA and DAF methodologies / toolkits, or areas where you think they could be brought closer together