Please use this identifier to cite or link to this item:
http://repositorio.lnec.pt:8080/jspui/handle/123456789/17439
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Barateiro, J. | pt_BR |
dc.contributor.author | Antunes, G. J. | pt_BR |
dc.contributor.author | Freitas, F. | pt_BR |
dc.contributor.author | Borbinha, J. L. | pt_BR |
dc.date.accessioned | 2009-12-07T18:04:45Z | pt_BR |
dc.date.accessioned | 2010-04-29T14:00:36Z | pt_BR |
dc.date.accessioned | 2014-10-09T13:35:09Z | pt_BR |
dc.date.accessioned | 2016-06-01T11:00:08Z | - |
dc.date.available | 2009-12-07T18:04:45Z | pt_BR |
dc.date.available | 2010-04-29T14:00:36Z | pt_BR |
dc.date.available | 2014-10-09T13:35:09Z | pt_BR |
dc.date.available | 2016-06-01T11:00:08Z | - |
dc.date.issued | 2009-12 | pt_BR |
dc.identifier.uri | https://repositorio.lnec.pt/jspui/handle/123456789/17439 | - |
dc.description.abstract | Digital preservation aims at maintaining digital objects accessible over long periods of time, ensuring the authenticity and integrity of these digital objects. In such complex environments, Risk Management is a key factor to assure the normal behaviour of systems along time. Currently, the digital preservation arena commonly uses Risk Management concepts to assess repositories. In this paper, we intend to go beyond and propose a perspective where Risk Management can be used to assess existing solutions, but also to conceive digital preservation environments. Thus, we propose a Risk Management based approach to design and assess digital preservation environments, enclosing: (i) the definition of context and identification of strategic objectives to determine specific requirements and characterize which consequences are acceptable within the identified context; (ii) the identification, analysis and evaluation of threats and vulnerabilities that may affect the normal behaviour of a specific business or the achievement of the goals and conformance to the requirements identified in the context characterization; and, (iii) definition of actions to deal with the risks associated with the identified threats and vulnerabilities. We generalize and survey the main requirements, threats, vulnerabilities and techniques that can be applied in the scope of digital preservation. | pt_BR |
dc.format.extent | 3191296 bytes | pt_BR |
dc.format.extent | 184711 bytes | pt_BR |
dc.format.mimetype | application/vnd.ms-powerpoint | pt_BR |
dc.format.mimetype | application/pdf | pt_BR |
dc.language.iso | eng | pt_BR |
dc.rights | openAccess | pt_BR |
dc.subject | Risk management | pt_BR |
dc.subject | Digital preservation | pt_BR |
dc.title | Designing digital preservation solutions: a risk management based approach | pt_BR |
dc.type | article | pt_BR |
dc.description.figures | 1 | pt_BR |
dc.description.tables | 2 | pt_BR |
dc.identifier.seminario | 5th International Digital Curation Conference | pt_BR |
dc.identifier.local | Londres | pt_BR |
dc.description.sector | CTI/NTIEC | pt_BR |
dc.name.label | Risk management | pt_BR |
dc.name.label | Digital Preservation | pt_BR |
dc.name.label | Threats | pt_BR |
dc.name.label | Vulnerabilities | pt_BR |
dc.description.year | 2009 | pt_BR |
dc.description.data | 2 a 4 de Dezembro de 2009 | pt_BR |
Appears in Collections: | CD/NTIEC - Comunicações a congressos e artigos de revista |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
dcc09-jbarateiro.pdf | 180.38 kB | Adobe PDF | View/Open | |
639.pdf | 889.61 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.