SlideShare uma empresa Scribd logo
1 de 19
What’s the problem? Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation
Digital preservation typically makes bleak reading …
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital preservation is not about ‘data’: Digital preservation is not about ‘access’:  Digital preservation is not about ‘risk’: it’s about people  and opportunity … and because people and technology continue to change it’s an ongoing process
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Risk Assessment Identify a risk ... Identify the consequences of that risk What is it’s likelihood? What is it’s impact? Risk Score: L x I How frequently does the risk occur? How often do we need to check? Who owns the risk?  How will we respond to the risk? How does our response change likelihood and impact?
Generic Digital Preservation Risks (there are more!) File format obsolesence Media degradation or failure Media obsolesence Barriers to access  (eg encryption) Insufficient resource discovery metadata Insufficient representational metadata Insufficient control (eg copyright) Authenticity and provenance is unclear Multiple copies are not synchronised Virus, trojans etc (aka malware) Disruptive technologies Poorly understood service dependencies …
Starting with risks .... RISK Likelihood Impact Score Frequency Owner Response Media will degrade 5 5 25 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Media will fail outright 3 5 15 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 5 5 25 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
Post mitigation risks .... RISK Likelihood Impact Score Frequency Owner Actions to maintain mitigation Media will degrade 3 1 3 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Sudden media failure 1 4 4 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 1 3 3 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
Two Worked Examples A whole class example live on screen Get your notebooks and ....... Write out TWELVE headings as follows: Risk, Consequence, Likelihood, Impact, Score, Proximity, Owner, Responses, New likelihood, New impact, New score, Frequency of review Do this twice, on two different pages. The first example we will do as a group,  The second one you should do on your own or with colleagues
Example 1: The Historic Parish Archive Archaeological Excavation: (closed) c. 1000 pages digitized text (TIFFS and PDFs) c. 500 photographs (TIFFS and JPEGS) c. 100 data tables (held as text) c. 25 Excel spreadsheets Architectural survey of building: (closed) c. 3000 images in JPEG format 25 CAD plans Parish newsletters and website: (ongoing) c. 500 document in variety of wp formats c. 150 web pages and images Oral History: (ongoing) c. 25 audio recordings Music performance: (ongoing) 10 hours of digital recordings Parish registers: (closed) Circa 1000 pages scanned (TIFFS) Based loosely on the Christ Church Spitalfields Archive, from ADS http://ads.ahds.ac.uk/catalogue/resources.html?spitalfields_var_2001
Example 2: The collection that worries you Existing Digital Archives: Digitized text (TIFFS and PDFs) Photographs (TIFFS and JPEGS) Data tables and  spreadsheets ... Ongoing data flows: Outputs from EDRMS Document in variety of office formats Web pages and images ... Things you know are coming:  Digital sound and vision Outputs from digitzation Corporate databases ...
So .... who’d like to start? RISK That  Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
Any examples you’d like to share? RISK That  Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
high risk low consequence high risk high consequence low risk low consequence low risk high consequence Consequences Risks low risk high consequence
 
Richard Blake,  Archives Sector Development,  The National Archives
Risk Appetite Explosive Risks Toxic risks Risk and  opportunity Project management (Prince2) Organisational risk register More Risk Management ...
Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation

Mais conteúdo relacionado

Semelhante a William Kilbride - Risk Management in Digital Preservation

2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunyaJosé Carlos Ramalho
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...Andris Soroka
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?Izar Tarandach
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin
 
Effective Software Development in the 21st Century
Effective Software Development in the 21st CenturyEffective Software Development in the 21st Century
Effective Software Development in the 21st CenturyAgileee
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan Özhan
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA SensePost
 
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfssuser4db968
 
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxssuser4db968
 

Semelhante a William Kilbride - Risk Management in Digital Preservation (20)

How big is your shadow?
How big is your shadow?How big is your shadow?
How big is your shadow?
 
2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya2015 05-27-congrés archivoscatalunya
2015 05-27-congrés archivoscatalunya
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
Prof m02 v2
Prof m02 v2Prof m02 v2
Prof m02 v2
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
Network security
Network securityNetwork security
Network security
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Effective Software Development in the 21st Century
Effective Software Development in the 21st CenturyEffective Software Development in the 21st Century
Effective Software Development in the 21st Century
 
Class vii
Class viiClass vii
Class vii
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA
 
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdfCYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
 
CYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptxCYB205-1 Evolving Threat Landscapes_01.pptx
CYB205-1 Evolving Threat Landscapes_01.pptx
 
2012 Nelson-Atkins Tech Summit
2012 Nelson-Atkins Tech Summit2012 Nelson-Atkins Tech Summit
2012 Nelson-Atkins Tech Summit
 

Mais de Scottish Library & Information Council (SLIC), CILIP in Scotland (CILIPS)

Mais de Scottish Library & Information Council (SLIC), CILIP in Scotland (CILIPS) (20)

Unlocking Doors: recent initiatives in open and linked data at the National L...
Unlocking Doors: recent initiatives in open and linked data at the National L...Unlocking Doors: recent initiatives in open and linked data at the National L...
Unlocking Doors: recent initiatives in open and linked data at the National L...
 
Why link?
Why link?Why link?
Why link?
 
Linked Open Data
Linked Open DataLinked Open Data
Linked Open Data
 
Will's World: Walking Through Shakespeare
Will's World: Walking Through ShakespeareWill's World: Walking Through Shakespeare
Will's World: Walking Through Shakespeare
 
The Danish National Bibliography as LOD
The Danish National Bibliography as LODThe Danish National Bibliography as LOD
The Danish National Bibliography as LOD
 
Linked Open Data stuff
Linked Open Data stuffLinked Open Data stuff
Linked Open Data stuff
 
datos.bne.es: Publishing and consuming
datos.bne.es: Publishing and consumingdatos.bne.es: Publishing and consuming
datos.bne.es: Publishing and consuming
 
The University of Edinburgh's Mobile App
The University of Edinburgh's Mobile App The University of Edinburgh's Mobile App
The University of Edinburgh's Mobile App
 
Social Media and National Libraries
Social Media and National LibrariesSocial Media and National Libraries
Social Media and National Libraries
 
Growing Knowledge : Supporting the Digital Researcher
Growing Knowledge : Supporting the Digital Researcher Growing Knowledge : Supporting the Digital Researcher
Growing Knowledge : Supporting the Digital Researcher
 
Libguides in Academic Libraries
Libguides in Academic Libraries Libguides in Academic Libraries
Libguides in Academic Libraries
 
SLIC FE 2011 Karen Stevenson
SLIC FE 2011 Karen StevensonSLIC FE 2011 Karen Stevenson
SLIC FE 2011 Karen Stevenson
 
SLIC FE 2011Tom MacMaster
SLIC FE 2011Tom MacMasterSLIC FE 2011Tom MacMaster
SLIC FE 2011Tom MacMaster
 
SLICFE2011 Elaine Fulton
SLICFE2011 Elaine FultonSLICFE2011 Elaine Fulton
SLICFE2011 Elaine Fulton
 
Introducing Reader Development
Introducing Reader DevelopmentIntroducing Reader Development
Introducing Reader Development
 
SCURL Walk in Access Project
SCURL Walk in Access ProjectSCURL Walk in Access Project
SCURL Walk in Access Project
 
Innovation with reducing budgets British Library
Innovation with reducing budgets British LibraryInnovation with reducing budgets British Library
Innovation with reducing budgets British Library
 
mlibrary project Napier University
mlibrary project Napier Universitymlibrary project Napier University
mlibrary project Napier University
 
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
Wendy Walker - Ebooks Unbound at University of Glasgow – Power to the Users?
 
Nora Dale - Growing Knowledge: The evolution of research
Nora Dale - Growing Knowledge: The evolution of researchNora Dale - Growing Knowledge: The evolution of research
Nora Dale - Growing Knowledge: The evolution of research
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

William Kilbride - Risk Management in Digital Preservation

  • 1. What’s the problem? Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation
  • 2. Digital preservation typically makes bleak reading …
  • 3.
  • 4. Digital preservation is not about ‘data’: Digital preservation is not about ‘access’: Digital preservation is not about ‘risk’: it’s about people and opportunity … and because people and technology continue to change it’s an ongoing process
  • 5.
  • 6. Simple Risk Assessment Identify a risk ... Identify the consequences of that risk What is it’s likelihood? What is it’s impact? Risk Score: L x I How frequently does the risk occur? How often do we need to check? Who owns the risk? How will we respond to the risk? How does our response change likelihood and impact?
  • 7. Generic Digital Preservation Risks (there are more!) File format obsolesence Media degradation or failure Media obsolesence Barriers to access (eg encryption) Insufficient resource discovery metadata Insufficient representational metadata Insufficient control (eg copyright) Authenticity and provenance is unclear Multiple copies are not synchronised Virus, trojans etc (aka malware) Disruptive technologies Poorly understood service dependencies …
  • 8. Starting with risks .... RISK Likelihood Impact Score Frequency Owner Response Media will degrade 5 5 25 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Media will fail outright 3 5 15 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 5 5 25 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
  • 9. Post mitigation risks .... RISK Likelihood Impact Score Frequency Owner Actions to maintain mitigation Media will degrade 3 1 3 ongoing Technology watch Good media storage Refreshment Routine checks of media Keep copies on different media ... Sudden media failure 1 4 4 ongoing Technology watch Careful procurement Warranties and liabilities Multiple copies Develop migration plan ... Media obsolesence 1 3 3 ongoing Technology watch Refreshment Routine checks of media Multiple media ...
  • 10. Two Worked Examples A whole class example live on screen Get your notebooks and ....... Write out TWELVE headings as follows: Risk, Consequence, Likelihood, Impact, Score, Proximity, Owner, Responses, New likelihood, New impact, New score, Frequency of review Do this twice, on two different pages. The first example we will do as a group, The second one you should do on your own or with colleagues
  • 11. Example 1: The Historic Parish Archive Archaeological Excavation: (closed) c. 1000 pages digitized text (TIFFS and PDFs) c. 500 photographs (TIFFS and JPEGS) c. 100 data tables (held as text) c. 25 Excel spreadsheets Architectural survey of building: (closed) c. 3000 images in JPEG format 25 CAD plans Parish newsletters and website: (ongoing) c. 500 document in variety of wp formats c. 150 web pages and images Oral History: (ongoing) c. 25 audio recordings Music performance: (ongoing) 10 hours of digital recordings Parish registers: (closed) Circa 1000 pages scanned (TIFFS) Based loosely on the Christ Church Spitalfields Archive, from ADS http://ads.ahds.ac.uk/catalogue/resources.html?spitalfields_var_2001
  • 12. Example 2: The collection that worries you Existing Digital Archives: Digitized text (TIFFS and PDFs) Photographs (TIFFS and JPEGS) Data tables and spreadsheets ... Ongoing data flows: Outputs from EDRMS Document in variety of office formats Web pages and images ... Things you know are coming: Digital sound and vision Outputs from digitzation Corporate databases ...
  • 13. So .... who’d like to start? RISK That Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
  • 14. Any examples you’d like to share? RISK That Likelihood ... Impact ... Score ... Frequency ... Owner ... Response ... New Likelihood ... New Impact ... New Score .... Frequency of Review ...
  • 15. high risk low consequence high risk high consequence low risk low consequence low risk high consequence Consequences Risks low risk high consequence
  • 16.  
  • 17. Richard Blake, Archives Sector Development, The National Archives
  • 18. Risk Appetite Explosive Risks Toxic risks Risk and opportunity Project management (Prince2) Organisational risk register More Risk Management ...
  • 19. Some basics on risk ‘ Whole class’ example Parallel your own example Some final thoughts William Kilbride william @dpconline.org Risk Management in digital preservation