SlideShare a Scribd company logo
1 of 98
DRAMBORA:  Risk and Trust and Data Management   Martin Donnelly DCC, University of Edinburgh [email_address]   (and Andrew McHugh, Sarah Jones, Joy Davidson,  Seamus Ross, Raivo Ruusalepp, Perla Innocenti…)
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA covers:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition of a repository ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
10 Characteristics of Digital Repositories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(CRL/OCLC/NESTOR/DCC/DPE meeting,  January 2007) © HATII UofGlasgow, 2007
Trustworthiness and Archival Stewardship ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Challenge of Building Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trustworthy Repositories Audit & Certification (TRAC) Criteria and Checklist ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk and Repositories
Types of preservation risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standard Risk Management Model
Risk Management and Digital Preservation ,[object Object],[object Object],[object Object],[object Object],[object Object]
The nestor  Catalogue of Criteria ,[object Object],[object Object],[object Object],[object Object],[object Object],www.digitalpreservation.de
Top down approach: tried and tested ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Risks of Objectivism ,[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Evolution of an Audit Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does this mean in practice? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Risks of Subjectivity ,[object Object],[object Object],[object Object],[object Object]
Finding Islands of Objectivity ,[object Object],[object Object],[object Object]
* Discussion Break * ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Audit Process  in a bit more detail
6 key questions ahead of the audit  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #1 Why? ,[object Object],[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #2 What? ,[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #3 Who? ,[object Object],[object Object],[object Object],[object Object],[object Object],AND
6 questions for auditing: #4 Where? ,[object Object],[object Object],[object Object],[object Object]
6 questions for auditing: #5 When? ,[object Object],[object Object],[object Object]
6 questions for auditing: #6 How? ,[object Object],[object Object],[object Object],[object Object]
Risk Impact, Risk Management  and DRAMBORA
Risk Impact in the repository context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management and DRAMBORA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Workflow Preliminary  collecting  and analysis  of  repository documentation Organise  appointments and  onsite visits with repository staff  (managers, curators, IT, legal experts…) Risk registry  finalisation  Audit report  finalisation Impact  on individuals and organisations
DRAMBORA Sample Audits (i) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ross, S., McHugh, A., Innocenti, P., Ruusalepp, R.: Investigation of the potential application of the DRAMBORA toolkit in the context of digital libraries to support the assessment of the repository aspects of digital libraries (Glasgow: DELOS NoE, August 2008) (ISBN: 2-912335-41-8)
DRAMBORA Sample Audits (ii) ,[object Object],[object Object],[object Object],[object Object],[object Object],Ross, S., McHugh, A., Innocenti, P., Ruusalepp, R.: Investigation of the potential application of the DRAMBORA toolkit in the context of digital libraries to support the assessment of the repository aspects of digital libraries (Glasgow: DELOS NoE, August 2008) (ISBN: 2-912335-41-8)
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA stages in brief ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining and identifying risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy of a risk The name of the individual who assumes ultimate responsibility for the risk in the event of the stated risk owner relinquishing control Escalation Owner:  Name of risk owner - usually the same as owner of corresponding activity Owner:  Hardware, software or communications equipment and facilities Operations and service delivery Personnel, management and administration procedures Physical environment Nature of Risk:  Date that risk was first identified  Date of Risk Identification: Example circumstances within which risk will or may execute Example Risk Manifestation(s):  A longer text string offering a fuller description of this risk Risk Description: A short text string describing the risk Risk Name:  A text string provided by the repository to uniquely identify this risk and facilitate references to it within risk relationship expressions Risk Identifier:
Anatomy of a risk A targetted risk-severity rating plus risk reassessment date Risk Management Activity Target:  Individual(s) responsible for performance of risk management activities Risk Management Activity Owner:  Practical activities deriving from defined policies and procedures Risk Management Activity(ies):  Description of policies and procedures to be pursued in order to manage (avoid and/or treat) risk Risk Management Strategy(ies):  A derived value, representing the product of probability and potential impact scores Risk Severity:  This indicates the perceived impact of the execution of this risk in terms of loss of digital objects' understandability and authenticity Risk Potential Impact:  This indicates the perceived likelihood of the execution of this particular risk Risk Probability:  A description of each of the risks with which this risk has relationships Risk Relationships:  Parties with an investment or assets threatened by the risk's execution, or with responsibility for its management Stakeholders:
Risk Relationships where risks exist in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of  n  risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
Scenario for the Exercise ,[object Object],[object Object],[object Object]
Part I – Identify a risk (30 minutes) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part II – Mitigate the risk (30 minutes) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Risk Assessment Exercise  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DRAMBORA Interactive www.repositoryaudit.eu
DRAMBORA Interactive ,[object Object],[object Object],[object Object]
Step-by-Step ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Repository Registration
Login ,[object Object],[object Object],[object Object]
Before the audit can start… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Repository Administration ,[object Object],[object Object],[object Object]
Repository Administration
Define the Audit Scope ,[object Object],[object Object]
Define Repository Scope
Functional classes ,[object Object],[object Object],[object Object]
Functional Classes
Repository Staff ,[object Object],[object Object],[object Object],[object Object]
Add/Edit Repository Staff
Repository Roles ,[object Object],[object Object],[object Object]
Add, Edit & Assign Roles
User Administration ,[object Object],[object Object],[object Object],[object Object],[object Object]
User Administration
Beginning the Audit ,[object Object],[object Object],[object Object]
Define Repository Mandate ,[object Object],[object Object],[object Object]
Define Mandate
Define Constraints ,[object Object],[object Object],[object Object]
Define Constraints
Define Objectives ,[object Object],[object Object],[object Object],[object Object]
Define Objectives
Define Activities, Assets, Owners ,[object Object],[object Object],[object Object]
Define Activities etc.
Identify Risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identify Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identify Risks
Assess Risks ,[object Object],[object Object]
Assess Risks ,[object Object],[object Object],[object Object],[object Object]
Risk Assessment
Manage Risks ,[object Object],[object Object]
Risk Relationships risks exists in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of  n  risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
Manage Risks
Reporting Audit Results ,[object Object],[object Object],[object Object]
Audit Reporting
Audit Snapshots ,[object Object],[object Object],[object Object]
Snapshot View
Ongoing and future developments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Order of Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Curation Lifecycle Model ,[object Object],[object Object]
What is DAF? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overlaps and Differences self-management tools to assess the effectiveness of approach to data management or preservation   - Repository focus - Process emphasis - Lifecycle: Preservation phase - Researcher focus - Data emphasis  - Lifecycle: Creation phase
What is collected in DAF? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mappings to DRAMBORA ,[object Object],[object Object],[object Object],[object Object]
Integrated  Data Management  Planning tool AIDA http://aida.jiscinvolve.org http://www.life.ac.uk/ http://www.data-audit.eu/ coming soon…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contacts

More Related Content

Similar to KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly

Similar to KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly (20)

Trm Trusted Repositories
Trm Trusted RepositoriesTrm Trusted Repositories
Trm Trusted Repositories
 
Practical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPEPractical ways to tackle digital preservation using DPE
Practical ways to tackle digital preservation using DPE
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
Starting a Digital Preservation Program
Starting a Digital Preservation ProgramStarting a Digital Preservation Program
Starting a Digital Preservation Program
 
Implementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research DataImplementing Open Access: Effective Management of Your Research Data
Implementing Open Access: Effective Management of Your Research Data
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Digital Preservation for DAMs
Digital Preservation for DAMsDigital Preservation for DAMs
Digital Preservation for DAMs
 
Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)Digitisation Workshop Pres 2008(V1)
Digitisation Workshop Pres 2008(V1)
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservation
 
DATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional RepositoriesDATAD-R: Criteria for Trusted African Institutional Repositories
DATAD-R: Criteria for Trusted African Institutional Repositories
 
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
Trusted Digital Repositories: OAIS and Certification - Robin Dale (2002)
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Hans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital PreservationHans Hofman - European Perspectives on Digital Preservation
Hans Hofman - European Perspectives on Digital Preservation
 
Criteria for a trusted institutional repository
Criteria for a trusted institutional repositoryCriteria for a trusted institutional repository
Criteria for a trusted institutional repository
 
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)
 
How the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR DataHow the Core Trust Seal (CTS) Enables FAIR Data
How the Core Trust Seal (CTS) Enables FAIR Data
 
How core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie HarrowerHow core trust seal enables FAIR data - Natalie Harrower
How core trust seal enables FAIR data - Natalie Harrower
 
The case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation toolThe case for yet another digital preservation evaluation tool
The case for yet another digital preservation evaluation tool
 
Archive service accreditation digital developments for ARA Conference 2016
Archive service accreditation   digital developments for ARA Conference 2016Archive service accreditation   digital developments for ARA Conference 2016
Archive service accreditation digital developments for ARA Conference 2016
 
CARDIO
CARDIOCARDIO
CARDIO
 

More from JISC KeepIt project

More from JISC KeepIt project (20)

EPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation PlanningEPrints Preservation: Why we need Preservation Planning
EPrints Preservation: Why we need Preservation Planning
 
Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...Preserving repository content: practical steps for repository managers by Mig...
Preserving repository content: practical steps for repository managers by Mig...
 
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010
 
Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...Transforming repositories: from repository managers to institutional data man...
Transforming repositories: from repository managers to institutional data man...
 
Keepit Course 5: Concluding the course
Keepit Course 5: Concluding the courseKeepit Course 5: Concluding the course
Keepit Course 5: Concluding the course
 
Keepit Course 5: Revision
Keepit Course 5: RevisionKeepit Course 5: Revision
Keepit Course 5: Revision
 
Keepit Course 5: Trust
Keepit Course 5: TrustKeepit Course 5: Trust
Keepit Course 5: Trust
 
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberPreservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
Preservation Planning using Plato, by Hannes Kulovits and Andreas Rauber
 
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...
 
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...
 
KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...KeepIt Course 4: Putting storage, format management and preservation planning...
KeepIt Course 4: Putting storage, format management and preservation planning...
 
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauKeepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
Keepit Course 3: Provenance (and OPM), based on slides by Luc Moreau
 
KeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to RepositoriesKeepIt Course 3: Applying Preservation Metadata to Repositories
KeepIt Course 3: Applying Preservation Metadata to Repositories
 
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...
 
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...
 
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...
 
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...
 
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...
 
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...
 
KeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflowKeepIt Course 3: preservation workflow
KeepIt Course 3: preservation workflow
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donnelly

  • 1. DRAMBORA: Risk and Trust and Data Management Martin Donnelly DCC, University of Edinburgh [email_address] (and Andrew McHugh, Sarah Jones, Joy Davidson, Seamus Ross, Raivo Ruusalepp, Perla Innocenti…)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. The Audit Process in a bit more detail
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Risk Impact, Risk Management and DRAMBORA
  • 34.
  • 35.
  • 36. DRAMBORA Workflow Preliminary collecting and analysis of repository documentation Organise appointments and onsite visits with repository staff (managers, curators, IT, legal experts…) Risk registry finalisation Audit report finalisation Impact on individuals and organisations
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Anatomy of a risk The name of the individual who assumes ultimate responsibility for the risk in the event of the stated risk owner relinquishing control Escalation Owner: Name of risk owner - usually the same as owner of corresponding activity Owner: Hardware, software or communications equipment and facilities Operations and service delivery Personnel, management and administration procedures Physical environment Nature of Risk: Date that risk was first identified Date of Risk Identification: Example circumstances within which risk will or may execute Example Risk Manifestation(s): A longer text string offering a fuller description of this risk Risk Description: A short text string describing the risk Risk Name: A text string provided by the repository to uniquely identify this risk and facilitate references to it within risk relationship expressions Risk Identifier:
  • 43. Anatomy of a risk A targetted risk-severity rating plus risk reassessment date Risk Management Activity Target: Individual(s) responsible for performance of risk management activities Risk Management Activity Owner: Practical activities deriving from defined policies and procedures Risk Management Activity(ies): Description of policies and procedures to be pursued in order to manage (avoid and/or treat) risk Risk Management Strategy(ies): A derived value, representing the product of probability and potential impact scores Risk Severity: This indicates the perceived impact of the execution of this risk in terms of loss of digital objects' understandability and authenticity Risk Potential Impact: This indicates the perceived likelihood of the execution of this particular risk Risk Probability: A description of each of the risks with which this risk has relationships Risk Relationships: Parties with an investment or assets threatened by the risk's execution, or with responsibility for its management Stakeholders:
  • 44. Risk Relationships where risks exist in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of n risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 51.
  • 52.
  • 54.
  • 55.
  • 56.
  • 58.
  • 60.
  • 62.
  • 64.
  • 65. Add, Edit & Assign Roles
  • 66.
  • 68.
  • 69.
  • 71.
  • 73.
  • 75.
  • 77.
  • 78.
  • 80.
  • 81.
  • 83.
  • 84. Risk Relationships risks exists in isolation, with no relationships with other risks Atomic where avoidance or treatment associated with a single risk renders the avoidance or treatment of another less effective Domino where avoidance or treatment mechanisms associated with one risk also benefit the management of another Complementry where a single risk’s execution will increase the likelihood of another’s Contagious where the simultaneous execution of n risks has an impact in excess of the sum of each risk occurring in isolation Explosive Definition of Risk Relationship Risk Relationship
  • 86.
  • 88.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94. Overlaps and Differences self-management tools to assess the effectiveness of approach to data management or preservation - Repository focus - Process emphasis - Lifecycle: Preservation phase - Researcher focus - Data emphasis - Lifecycle: Creation phase
  • 95.
  • 96.
  • 97. Integrated Data Management Planning tool AIDA http://aida.jiscinvolve.org http://www.life.ac.uk/ http://www.data-audit.eu/ coming soon…
  • 98.

Editor's Notes

  1. Hard to define: but we must define it if we want to automate its handling Multi-facetted: not one simple score that covers all data quality, need many such scores… expensive Highly app specific means: again need more than one score, hard to reuse the details of the scores Highly subjective: means difficult to completely automate
  2. Physical : Theft, vandalism, arson, building related risks, Storm, flood, other related weather, damage to vehicles, mobile plant and equipment.
  3. In the last 50 years, computer science has witnessed numerous cycles of software development migration, and the literature contains many studies, case reports, and models. Several publications were very useful in developing our understanding of risk assessment of digital information. Rapid Development (McConnell 1996) is a monograph on the general problems associated with software development. In many respects, software development exhibits several of the same problems associated with basic digital preservation. While researching risk assessments, we were struck by the vast differences in basic definitions used by different disciplines. (For example, see Reinert, Bartell, and Biddinger [1994], Warren-Hicks and Moore [1995], McNamee [1996], Wilson and Crouch [1987], Starr [1969], and Lagadec [1982]). Numerous professions measure risk, and each assigns risks a unique vocabulary and context. The degree and type of risk associated with any data archive may be understood differently by administrators, operational staff members, and data users, depending upon their individual training and experience. The measurement of risk was equally problematic. One paper correlated risk level with the nonlinear relative probability of risk occurring (Kansala 1997). Another publication introduced an algebraic formula (McConnell 1996). In a third instance, a research group felt that cases where one could accurately assess the probability of a future event were rare because the information technology environment for software changes so rapidly. They preferred simple estimates, such as high , medium , and low , which they believed facilitated decision making (Williams, Walker, and Dorofee 1997). Risk-measurement scales, like risk definitions, are as distinctive as their developers.
  4. Funded by the German Ministry of Education and Research
  5. If an auditor goes to where the activity takes place, he will observe more than he could with mere explanation, and will have more insight on what follow-ups to ask. Also ask for a demonstration of the procedure: when a procedure takes place is often not described. And some procedures take place in multiple or undefined locations.
  6. Excerpt: The process was extremely insightful and highlighted possible areas where the DRAMBORA methodology could be improved, as well as a range of generic objectives, functions and concerns common to digital libraries. We concluded that the take-up and use of DRAMBORA would benefit from the introduction of an interactive tool and sharable registry of responses so that organisations undertaking self-assessment could profit from the experiences and responses of the organisations that they consider to be their peers. Further clarification was achieved about the specific classes of post-holders that should participate in the assessment process, as well as the optimal number of participants and most appropriate means of establishing conversational focus. We gained a better understanding of the practical ways in which organisations assess their risks; as a result we concluded that the original DRAMBORA risk impact and probability scores could be made less granular, and that more opportunities should be available for respondents to consider the severity of their risks in more relative terms, rather than in comparison with objective impact and probability metrics. These four assessments have also made it possible to develop a generic risk profile for digital libraries. Finally, from the perspective of each of the audited institutions, the process was overwhelmingly successful; testimonials from representatives of each described in detail the benefits of formally scrutinising the organisational characteristics and implicit challenges faced within their own digital library.
  7. Risk assessment and the DRAMBORA methodology 15 July 2009 Donnelly, McHugh, Ross, Innocenti, Ruusalepp and Hofman AREAS OF EXPRESSION - Reputation and intangibles - Organisational viability - Service delivery - Technology
  8. Trick is to work backwards from mandate and goals: what could prevent these from being achieved?
  9. No single entry point into lifecycle. Tools cover different, but at times overlapping, phases of it
  10. - The underlying methodologies are the same: both are self-management tools to assess the extent to which you’re meeting goals, be that running effective repositories or good data management - The chief difference lies in the context in which they’re applied. DRAMBORA focuses on repositories and how well they’re meeting their mission OR helps with planning the development of trusted repositories (PLATTER useful here too) DAF assesses the management of data in the earlier stages of the lifecycle, looking more at the work of researchers - Information may not always map directly between the two tools as each assessment will have different parameters and be a self-contained process, however they will inform each other. e.g. the risks / gaps noted in a DAF assessment will point to what’s needed from a repository or more formal curation environment e.g. the standards and technologies used for data creation could point to preservation issues or DRAMBORA risks e.g. tracking assets from the point of creation using DAF to deposit and ongoing risk assessment activity may have a positive impact on the assets’ authenticity for the longer-term
  11. - Primary output from DAF is the register of data assets. This could feed into DRAMBORA assessment, but would also be a useful tool for repositories e.g. to track data / prompt ingest - Information on roles could map directly to DRAMBORA as some support / skills may overlap - Underlying context is a key area covered in DAF that can inform DRAMBORA. Funder requirements / legislative context will be similar Standards / best practice used at creation will affect longer-term curation - Data management risks will likely echo repository risks as both will have similar aims e.g. ensuring data integrity / authenticity, continued access, meaningful / reusable resources - Risks faced in one context could cast light on issues that may be faced in another OR may help to demonstrate value of other e.g. data better curated in repository context
  12. Here is a visualisation of the DRAMBORA process and the points at which DAF information may feed through Note: Assets has broader definition in DRAMBORA - includes software, physical assets, services, processes, people and intangibles Considering the DAF asset register as a collection may be beneficial for providing a more well-defined context for DRAMBORA audits. In this respect, the collections of assets could be assessed to reflect specific research projects, specific types of assets (e.g., images), department or institution, or perhaps even from a contributor perspective (i.e, a collection of assets reflecting various work for a specific researcher.
  13. - JISC funded project starting in November to integrate several related data management planning tools - Aim is to help institutions plan for and benchmark / assess their data management strategy AIDA about institutional preparedness for preservation: organisation; technology; resources LIFE about preservation costs – HATII will be developing the tool - Will work in collaboration with / provide support to 07/09 data infrastructure projects Let us know what overlaps you see between DRAMBORA and DAF methodologies / toolkits, or areas where you think they could be brought closer together