|Titel||Digital Forensics and Born-Digital Content in Cultural Heritage Collections|
|Auteurs||Kirschenbaum, M. G., Ovenden R., Redwine G., & Donahue R.|
|Uitgever||CLIR - Council on Library and Information Resources|
|Trefwoord(en)||authenticity, diplomatics, forensics, information object, reliability, trustworthiness|
While the purview of digital forensics was once specialized to fields of law enforcement, computer security, and national defense, the increasing ubiquity of computers and electronic devices means that digital forensics is now used in a wide variety of cases and circumstances. Most records today are born digital, and libraries and other collecting institutions increasingly receive computer storage media as part of their acquisition of "papers" from writers, scholars, scientists, musicians, and public figures. This poses new challenges to librarians, archivists, and curators—challenges related to accessing and preserving legacy formats, recovering data, ensuring authenticity, and maintaining trust. The methods and tools developed by forensics experts represent a novel approach to these demands. For example, the same forensics software that indexes a criminal suspect's hard drive allows the archivist to prepare a comprehensive manifest of the electronic files a donor has turned over for accession. This report introduces the field of digital forensics in the cultural heritage sector and explores some points of convergence between the interests of those charged with collecting and maintaining born-digital cultural heritage materials and those charged with collecting and maintaining legal evidence.
Donor agreements by Cal Lee (blz 57)
The seven levels of representation:
Level 7: aggregation of objects.
Level 6: object or package.
Level 5: in-application rendering.
Level 4: file thru filesystem.
Level 3: file as "raw" bitstream.
Level 2: sub-file data structure.
Level 1: bitstream thru I/O equipment.
Level 0: bitstream on physical medium.
(eigenlijk zijn het er 8)