Problems of Digital Sustainability

Total Page:16

File Type:pdf, Size:1020Kb

Problems of Digital Sustainability Acta Polytechnica Hungarica Vol. 7, No. 3, 2010 Problems of Digital Sustainability Tamás Szádeczky Department of Measurement and Automation, Kandó Kálmán Faculty of Electrical Engineering, Óbuda University Tavaszmező u. 17, H-1084 Budapest, Hungary [email protected] Abstract: The article introduces digital communication by drawing comparisons between the histories of digital and conventional written communication. It also shows the technical and legal bases and the currently reached achievements. In relation to the technical elements, it acquaints the reader with the development and current effects of computer technology, especially cryptography. In connection with the legal basis, the work presents the regulations which have emerged and made possible the legal acceptance of the digital signature and electronic documents in the United States of America, in the European Union and among certain of its member countries, including Hungary. The article reviews the regulations and the developed practices in the fields of e-commerce, electronic invoices, electronic records management and certain e-government functions in Hungary which are necessary for digital communication. The work draws attention to the importance of secure keeping and processing of electronic documents, which is also enforced by the legal environment. The author points to the technical requirements and practical troubles of digital communication, called digital sustainability. Keywords: electronic archive; digital sustainability; preservation; electronic signature; data security 1 Introduction We may distinguish three revolutions in the development of written communication [1]. The first revolution was the invention of alphabetical writing carrying phonetic value around 1300 BC., which segregated the text from the content. The second revolution in the 15th Century was the book printing invented by Gutenberg, Johannes Gensfleisch, which made written material widely available. The third revolution – which is called the digital revolution – is currently going on. We cannot accurately define its nature without an historical overview, but we may declare that it has modified all of the essential structures of written communication. At the same time, however, it has kept all the achievements of the previous revolutions. This is the key to digital culture and to the information society. – 123 – T. Szádeczky Problems of Digital Sustainability With the development of digital communication, computers conquered space in the area of applications which traditionally used paper. We can consider records management, accountancy and generally the creation of the public documents, notary documents and simple contracts as those applications. The necessary technical conditions have existed since the 1990s, when the technology of encryption with an asymmetric key was worked out in detail, in addition to computer and network technologies. First this development made creating electronic signature possible, and then came the acceptance of defining the legal consequences. We may solve electronic authentication of documents by electronic signature in the international practice and in Hungarian legal requirements. In the European Union and in the Republic of Hungary there are at present political and legislative endeavours aimed at rapid development in these areas. The problems of this process are referred to as the issue of digital sustainability [2]. The basic question of this research is: What is the difference between conventional and digital communication, especially as regards the long-term storage and usage of electronic documents. The research question was analysed via observation, information gathering and empirical statements based on the personal professional practice of the author. 2 Conditions of the Development of Digital Communication The technical requirements necessary for the development of digital communication can be divided into three parts: computer technology, networking technology and data security procedures, providing a practical equivalent to the requirements of traditional written communication. The first Turing-complete digital computer, the Zuse Z3, was constructed by Zuse Konrad in 1941. The creation of the transistor in 1947 revolutionized the world of crude electromechanical computers [3]. The integrated circuit, a mass of transistors fixed onto a single sheet, was developed in 1958. The first personal computer (the IBM PC) appeared in 1981, making it possible for home and office users to have computational performance. This was a huge invention compared to the usage of time slices in computer centres earlier. The development of computer networks started in 1962, when the Advanced Research Projects Agency (ARPA) set up a research team called the Intergalactic Network, a group of which developed the time-sharing system. This system made possible the sharing of a mainframe computers’ services between numerous users on a telex network [4]. – 124 – Acta Polytechnica Hungarica Vol. 7, No. 3, 2010 In 1969 a research team of ARPA created the first packet switched computer network, the ARPANET. This network connected only a couple of universities and military systems at that time. It was not until the end of the 1970s that the civilian and broad usage of the network was in sight, but already at this time rapid enlargement had started. ARPANET was interlinked with NSFNet during the late 1980s, and the term ‘Internet’ was used as the name of the new network, which has since become the large and global TCP/IP network. According to the World Internet Project 2007, 49 percent of Hungarian households (about two million) owned a personal computer at home, and the third of these computers (35%) also had an internet connection [5]. There is another significant requirement – but one which generally receives lesser emphasis – in connection with the development of digital communication: human resources. This means inclination and ability of citizens and clients to use the developments in digital communication and to actively participation in the information society. Because of the limited nature of this paper, the human resources and the economical aspect are beyond its. In the following parts of the chapter, the development of the data security procedures and the legal-political conditions will be outlined, because of their emphasized significance in the present approach to the topic. 2.1 Data Security Procedures The development and free public usage of data security procedures ensure a connection between the requirements of written communication and those of digital communication. It is necessary to ensure confidentiality, authenticity and originality in order to achieve the logic safety of electronic data. We accomplish this with mathematical methods, which cryptography (science of encryption) deals with. The encryption of information is practically the same age as writing, because since we started writing messages on paper (or on clay tablets) we have wanted others to be unable to read it. Modern cryptosystems are wholly based on mathematical encryption methods, made by computers, which were developed at the end of twentieth century. There are two kinds of encryption methods: symmetric and asymmetric. The primary difference between the two is that the same key is used for encryption and decryption in the case of the symmetric one (this method is called single key because of this), while we perform the encryption and decryption processes with two different keys in the case of the asymmetric one (the two key method). The modern computer-based symmetric encryption was developed in the 1970s. It applies reversible functions on blocks (generally 64-256 bits) by mixing and replacing characters or blocks of the clear text. In this method, it is possible to attain a good security level with the combination and numerous repeating of relatively simple procedures [6]. A popular symmetric cryptosystem of this kind is – 125 – T. Szádeczky Problems of Digital Sustainability the Data Encryption Standard (DES). While it is today insecure because of its short key length (56 bits), it is nevertheless occasionally used. As a result of break competitions on DES1 we can state that any confidential message encrypted by DES is breakable in minutes with the appropriate hardware. From the principle of symmetric encryption (in civilian use) the cyphertext is breakable in all cases; it depends only on time.2 Due to Kerckhoffs' principle, the security of encryption depends only on quality of the applied mathematical algorithm and the length of key, and thus not on the secrecy of the algorithm. Despite this, in individual cases, in the interest of increasing security (DES) or due to reasons of intellectual property (IDEA), the algorithm may be secret. Nowadays the Advanced Encryption Standard (AES) is used more often than anything else. AES, developed in the 2000s, uses 128-256 bits of key length and is hopefully based on an appropriate algorithm. Nobody has yet found a weak point on it, and thus experiments show that AES would be breakable in millions of years with all computers in the world [7]. The other branch of modern cryptography is public or asymmetric key cryptography, developed in mid 1970s. This branch is based on mathematical problems of one way trap door functions: discrete logarithm, discrete square root, and factorization with very large prime factors [8]. The solution to these problems is simple with a certain secret (private key), while without the secret it is
Recommended publications
  • Archives First: Digital Preservation Further Investigations Into Digital
    Archives First: digital preservation Further investigations into digital preservation for local authorities Viv Cothey * 2020 * Gloucestershire County Council ii Not caring about Archives because you have nothing to archive is no different from saying you don’t care about freedom of speech because you have nothing to say. Or that you don’t care about freedom of the press because you don’t like to read. (after Snowden, 2019, p 208) Disclaimer The views and opinions expressed in this report do not necessarily represent those of the institutions to which the author is affiliated. iii iv Executive summary This report is about an investigation into digital preservation by (English) local authorities which was commissioned by the Archives First consortium of eleven local authority record offices or similar memory organisations (Archives). The investigation is partly funded by The National Archives. Archival institutions are uniquely able to serve the public by providing current and future generations with access to authentic unique original records. In the case of local authority Archives these records will include documents related to significant decision making processes and events that bear on individuals and their communities. Archival practice, especially relating to provenance and purposeful preservation, is instrumental in supporting continuing public trust and essential to all of us being able to hold authority to account. The report explains how Archival practice differs from library practice where provenance and purposeful preservation are absent. The current investigation follows an earlier Archives First project in 2016-2017 that investigated local authority digital preservation preparedness. The 2016-2017 investigation revealed that local authority line of business systems in respect of children services, did not support the statutory requirement to retain digital records over the long- term (at least 100 years).
    [Show full text]
  • Digital Preservation Handbook
    Digital Preservation Handbook Digital Preservation Briefing Illustrations by Jørgen Stamp digitalbevaring.dk CC BY 2.5 Denmark Who is it for? Senior administrators (DigCurV Executive Lens), operational managers (DigCurV Manager Lens) and staff (DigCurV Practitioner Lens) within repositories, funding agencies, creators and publishers, anyone requiring an introduction to the subject. Assumed level of knowledge Novice. Purpose To provide a strategic overview and senior management briefing, outlining the broad issues and the rationale for funding to be allocated to the tasks involved in preserving digital resources. To provide a synthesis of current thinking on digital preservation issues. To distinguish between the major categories of issues. To help clarify how various issues will impact on decisions at various stages of the life-cycle of digital materials. To provide a focus for further debate and discussion within organisations and with external audiences. Gold sponsor Silver sponsors Bronze sponsors Reusing this information You may re-use this material in English (not including logos) with required acknowledgements free of charge in any format or medium. See How to use the Handbook for full details of licences and acknowledgements for re-use. For permission for translation into other languages email: [email protected] Please use this form of citation for the Handbook: Digital Preservation Handbook, 2nd Edition, http://handbook.dpconline.org/, Digital Preservation Coalition © 2015. 2 Contents Why Digital Preservation Matters
    [Show full text]
  • A New Digital Dark Age? Collaborative Web Tools, Social Media and Long-Term Preservation Stuart Jeffrey Version of Record First Published: 05 Dec 2012
    This article was downloaded by: [University of York] On: 10 December 2012, At: 04:01 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK World Archaeology Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rwar20 A new Digital Dark Age? Collaborative web tools, social media and long-term preservation Stuart Jeffrey Version of record first published: 05 Dec 2012. To cite this article: Stuart Jeffrey (2012): A new Digital Dark Age? Collaborative web tools, social media and long-term preservation, World Archaeology, 44:4, 553-570 To link to this article: http://dx.doi.org/10.1080/00438243.2012.737579 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and-conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. A new Digital Dark Age? Collaborative web tools, social media and long-term preservation Stuart Jeffrey Abstract This paper examines the impact of exciting new approaches to open data sharing, collaborative web tools and social media on the sustainability of archaeological data.
    [Show full text]
  • Digital Preservation.Pdf
    Digital Preservation By Jean-Yves Le Meur project leader of CERN Digital Memory 100 AD End of cuneiform on tablets 350-50 BC Jupiter orbit Tablets -> British Museum 1800- 1300-1400 Jupiter orbit 2014 (again) The missing 29 Jan 2016 ‘rosetta’ tablet Digital preservation in a nutshell ● World wide Landscape ○ Rationale ○ Interesting initiatives ○ Good practices: OAIS ● The different Approaches The Digital “Dark Age” "We are nonchalantly throwing all of our data into what could become an information black hole without realizing it" Vint Cerf (vice-president of Google in Feb 2015) The Digital “Dark Age” ● Very large community worrying about the preservation of digital content ● Digital Preservation Coalition ● Open Preservation Foundation ● UNESCO PERSIST project, EU e-ARK project, National Libraries and Archives ● Many related conferences: iPRES series, etc. “This is not about preserving bits, It is about preserving meaning, much like the Rosetta Stone.” More than 70 major libraries destroyed over time: accidents, disasters, ethnocides How digital data evaporates (I) 1. Physical Obsolescence: Bit rot Ten 2. Redundancy failure Major 3. Technological Obsolescence of readers, formats, OS, HWs New 4. Lost in migrations ! Risks 5. Missing context: no codec ! How digital data evaporates (II) 6. Redundancy failure Ten 7. Economical Failures Major 8. Lost in transitions: people ! New 9. Corruption, mistake or attack 10. Dissipation: out of reach Risks Some examples at CERN ● The very first WWW pages ○ Reconstructed in 2013 - found again in 2018!
    [Show full text]
  • Follow-Up Questions
    Follow-Up Questions ASERL Webinar: “Intro to Digital Preservation #2 -- Forbearing the Digital Dark Age: Capturing Metadata for Digital Objects” Speaker = Chris Dietrich, National Park Service Session Recording: https://vimeo.com/63669010 Speaker’s PPT: http://bit.ly/10PKvu8 UPDATED – May 23, 2013 Tools 1. Is photo watermarking available using Windows Explorer? Microsoft Paint, which comes installed with Microsoft Windows, provides basic (albeit inelegant) watermarking capabilities. 2. Do Microsoft tools capture basic metadata automatically, without user intervention? Microsoft Office products capture very basic metadata automatically. The Author, Initials, and Company are captured automatically from a user’s Windows User Account settings. File system properties like File Size, Date, etc. are also automatically captured. The following Microsoft Knowledge Base articles provide details for each Microsoft Office product: http://office.microsoft.com/en-us/access-help/view-or-change-the-properties-for-an-office-file- HA010354245.aspx, http://office.microsoft.com/en-us/help/about-file-properties-HP003071721.aspx. Microsoft SharePoint can be configured to automatically capture metadata for items uploaded to libraries: http://office.microsoft.com/en-us/sharepoint-help/introduction-to-managed-metadata-HA102832521.aspx. 3. Can you recommend tools/services that leverage geospatial data that do not provide latitude & longitude information? For example, I want to plot a photo of “Mt Doom” on a map but have no coordinates…. Embedding geospatial coordinates in digital objects (often called “geotagging”) can be done with a number of software tools. GPS Photo Link (http://www.geospatialexperts.com/gps-photo%20link.php) allows users to add coordinates to embedded metadata manually, or by selecting a photo(s) and then clicking a point on a Bing Maps satellite image.
    [Show full text]
  • A DIY Approach to Digital Preservation
    Practical Digital Solutions: A DIY Approach to Digital Preservation by Tyler McNally A Thesis Submitted to the Faculty of Graduate Studies of the University of Manitoba In Partial Fulfillment of the Requirements of the Degree of MASTER OF ARTS Department of History (Archival Studies) Joint Masters Program University of Manitoba/University of Winnipeg Winnipeg, Manitoba Copyright © 2018 by Tyler McNally Table of Contents Abstract…………………………………………………………...i AcknoWledgments…………………………………………….ii Acronym IndeX…………………………………………………iii Introduction……………………………………………………..1 Chapter 1………………………………………………………….12 Chapter 2………………………………………………………….54 Chapter 3………………………………………………………….81 Conclusion ……………………………………………………….116 Bibliography……………………………………………………..125 iii Abstract Since the introduction of computers, archivists have had to find ways to deal with digital records. As more records are born digital (created through digital means) and digital technologies become more entrenched in hoW data is created and processed, it is imperative that archivists properly preserve these records. This thesis seeks to propose one possible solution to this issue. Rather than advocate for paid solutions or electronic record management systems, it advocates for more practical in-house DIY solutions. The first chapter lays out background information and the historiography of digital archiving in Canada at the federal level. The second chapter moves step-by-step through a Workflow developed at the University of Manitoba’s Faculty of Medicine Archives that lays out one possible DIY style solution. The third chapter is an audit of the WorkfloW from the second chapter against three important international standards for preserving digital information. iv Acknowledgments I would like to acknoWledge and thank Professors Thomas Nesmith and Greg Bak. Their role as professors of the Archival Studies program has been a great source of support and inspiration as well as their knowledge and passion for both archives and their students.
    [Show full text]
  • Musso the Digital Dark
    Today I would like to talk about DIGITAL RESOURCES and what they can give to historical research. Digital sources seem like something that do not concerns us historians today, but twenty years from now we will not be able to invesEgate any aspect of history without taking into consideraon these sources, because this is what our era is producing now - and mostly, they represent possibiliEes that no previous generaon of historians could enjoy. The utopia of Alexandria’s library, the Universal Library which holds all knowledge and is accessible to anyone is potenEally something that the internet could give us – however, just like Alexandria’s library burned to the ground, our universal and fast-growing digital heritage is in danger. I called this presentaon “The digital dark age” to focus on the problem of preservaon of our digital cultural heritage, which has some specificity that make it par8cularly vulnerable for preservaon. But also, I would like to stress that when I talk about digital sources I don’t just mean documents created with the arrival of computers and the internet and that will be useful historical sources either to contemporary historians today or to historians in general 100 years from now, but really to anyone engaging in historical research today. 1 I would like to start with this: this is a digiEzed copy of the Magna Carta from the BriEsh Library h=p://www.bl.uk/collec8on-items/magna-carta-1215 Zoom – you can access the whole document in a simulaon of how it looks like Metadata on the document – where, when, copyright, descripEon Transcript So this makes the Magna Carta a digital source – like any other document, from any era, that has been digized.
    [Show full text]
  • The Theory and Craft of Digital Preservation Manuscript Submitted to Johns Hopkins University Press By: Trevor Owens June, 2017 2
    1 The Theory and Craft of Digital Preservation Manuscript Submitted to Johns Hopkins University Press By: Trevor Owens June, 2017 2 Table of Contents Acknowledgements 3 1. Beyond Digital Hype and Digital Anxiety 5 2. Artifact, Information, or Folklore: Preservation’s Divergent Lineages 11 3. Understanding Digital Objects 26 4. Challenges & Opportunities of Digital Preservation 39 5. The Craft of Digital Preservation 50 6. Preservation Intent & Collection Development 56 7. Managing Copies and Formats 70 8. Arranging and Describing Digital Objects 85 9. Enabling Multimodal Access and Use 104 10. Conclusions: Tools for Looking Forward 122 Bibliography 131 3 Acknowledgements I spent a year working on this book, but it represents the culmination of about a decade of trying to make my own sense of digital preservation. As such, I have a lot of people to acknowledge. The strengths of this book come from the international digital preservation community I’ve been welcomed into. Its’ weaknesses are my own. I first learned about digital preservation in my time at the Roy Rosenzweig Center for History and New Media. Before he passed away, Roy made an extensive and lasting impression those of us lucky enough to work for him. My constant hope is that the compassion, dedication, and pragmatism Roy brought into every day of his work at the Center comes through in my own. My understanding and appreciation for issues in digital history and digital preservation were sparked by four years of discussion and collaboration with colleges there; Dan Cohen, Josh Greenberg, Sean Takats, Tom Scheinfeldt, Sharon Leon, Sheila Brennan, Dave Lester, Jeremy Boggs, Jim Safley, Kari Kraus, Connie Moon Sehat, Miles Kelly, Mindy Lawrence, Jon Lesser, Kris Kelly, Ken Albers, Faolan Cheslack-Postava, John Flatness, Dan Stillman, and Christopher Hamner.
    [Show full text]
  • Evaluating Personal Archiving Strategies for Internet-Based Information
    Evaluating Personal Archiving Strategies for Internet-based Information Catherine C. Marshall; Microsoft; San Francisco, CA; Frank McCown and Michael L. Nelson; Old Dominion University; Norfolk, VA Abstract that is not shared – web-based email, personal photo stores, digital Internet-based personal digital belongings present different briefcases, and other non-published files – may be perceived dif- vulnerabilities than locally stored materials. We use responses to a ferently, as less at risk, than local files. survey of people who have recovered lost websites, in combination Consumers recognize the distinctions between materials with supplementary interviews, to paint a fuller picture of current stored locally and materials stored on the Internet. For example, curatorial strategies and practices. We examine the types of people may express the related opinion that if you find something personal, topical, and commercial websites that respondents have on the Internet once, it will be there when you look for it again, lost and the reasons they have lost this potentially valuable suggesting an almost magical persistence (in fact, one participant material. We further explore what they have tried to recover and in the study described in [1] said, “I thought that they [web pages] how the loss influences their subsequent practices. We found that were all set in stone.”). While individuals usually attribute this curation of personal digital materials in online stores bears some characteristic to files they have found rather than to personal mate- striking similarities to the curation of similar materials stored rial that they have stored on Internet services, there is no in- locally in that study participants continue to archive personal principal reason that this belief would not extend to their own assets by relying on a combination of benign neglect, sporadic digital belongings.
    [Show full text]
  • A Digital Dark Ages? Challenges in the Preservation of Electronic Information
    63RD IFLA Council and General Conference Workshop: Audiovisual and Multimedia joint with Preservation and Conservation, Information Technology, Library Buildings and Equipment, and the PAC Core Programme, September 4, 1997 A Digital Dark Ages? Challenges in the Preservation of Electronic Information Terry Kuny 1 XIST Inc. / UDT Core Programme email: [email protected] Last revised: August 27, 1997 Who controls the past controls the future. Who controls the present controls the past. George Orwell, Nineteen Eighty-Four, 1949 Monks and monasteries played a vital role in the Middle Ages in preserving and distributing books. It was their work which provided much of our present knowledge of the ancient past and of the rich heritage of Greek, Roman and Arabic traditions. With the advent of the printing press, this monastic tradition disappeared. However, the reverence for the historical record of text has been carried by librarians and archivists within private and public libraries to this very day. The tenor of our time appears to regard history as having ended, with pronouncements from many techno-pundits claiming that the Internet is revolutionary and changes everything. We seem at times, to be living in what Umberto Eco has called an “epoch of forgetting.” Within this hyperbolic environment of technology euphoria, there is a constant, albeit weaker, call among information professionals for a more sustained thinking about the impacts of the new technologies on society. One of these impacts is how we are to preserve the historic record in an electronic era where change and speed is valued more highly that conservation and longevity.
    [Show full text]
  • Electronic Records Archives Brian Knowles Roger Williams University, [email protected]
    Roger Williams University DOCS@RWU School of Architecture, Art, and Historic Historic Preservation Theses Preservation Theses and Projects 2015 Electronic Records Archives Brian Knowles Roger Williams University, [email protected] Follow this and additional works at: http://docs.rwu.edu/hp_theses Part of the Historic Preservation and Conservation Commons Recommended Citation Knowles, Brian, "Electronic Records Archives" (2015). Historic Preservation Theses. Paper 11. http://docs.rwu.edu/hp_theses/11 This Thesis is brought to you for free and open access by the School of Architecture, Art, and Historic Preservation Theses and Projects at DOCS@RWU. It has been accepted for inclusion in Historic Preservation Theses by an authorized administrator of DOCS@RWU. For more information, please contact [email protected]. Electronic Records Archives Brian Knowles Master of Science Historic Preservation School of Architecture, Art and Historic Preservation Roger Williams University Spring 2015 ii SIGNATURES Electronic Records Archives Brian Knowles ____________________________________ Date:____________ Jeremy Wells Thesis Adviser ____________________________________ Date:____________ Jessie Kratz Thesis Reader ____________________________________ Date:____________ Stephen White Dean of SAAHP ____________________________________ Date:____________ iii TABLE OF CONTENTS TITLE PAGE: i SIGNATURES: ii TABLE OF CONTENTS: iii ABSTRACT: v LIST OF FIGURES: vi PREFACE: 1 CHAPTER 1: ELECTRONIC RECORDS, BEST PRACTICES 1.0 Introduction: 3 1.1 Electronic Records
    [Show full text]
  • Bots, Seeds and People: Web Archives As Infrastructure
    Bots, Seeds and People Web Archives as Infrastructure Ed Summers Ricardo Punzalan University of Maryland University of Maryland [email protected] [email protected] ABSTRACT than 44%. Archives of web content matter, because hypertext The field of web archiving provides a unique mix of human links are known to break. Ceglowski [11] has estimated that and automated agents collaborating to achieve the preserva- about a quarter of all links break every 7 years. Even within tion of the web. Centuries old theories of archival appraisal highly curated regions of the web such as scholarly and legal are being transplanted into the sociotechnical environment publishing rates of link rot can be up to 50% [69,79]. of the World Wide Web with varying degrees of success. Failing to capture everything should not be surprising to the The work of the archivist and bots in contact with the mate- experienced archivist. Over the years, archival scholars have rial of the web present a distinctive and understudied CSCW argued that gaps and silences in the archival record are in- shaped problem. To investigate this space we conducted evitable. This is partly because we do not have the storage semi-structured interviews with archivists and technologists capacity nor all the manpower nor all the resources required who were directly involved in the selection of content from to keep everything. Thus, archivists necessarily select rep- the web for archives. These semi-structured interviews iden- resentative samples, identify unique and irreplaceable, and tified thematic areas that inform the appraisal process in web culturally valuable, records. We often assume that archivists archives, some of which are encoded in heuristics and algo- abide by a clear set of appraisal principles in their selection rithms.
    [Show full text]