AIMS Symposium
Charlottesville, VA
13-14 May 2011
See also Proposed topics by archival function.
Table of Contents |
---|
In addition to a 5 minute lightning talk we also require everybody to propose a topic. This does not necessarily mean that you are an expert or that you are willing to lead a discussion on this topic. Proposed topics could entail:
...
In each please explain your level of knowledge or experience and comment on the proposals. Please use the following format:
Short phrase summary of topic
Name, Affiliation
Paragraph-long statement describing topic
Tom Laudeman, University of Virginia (AIMS Project)
I would like to demonstrate Rubymatica and discuss issues related to processing of files to make them suitable for a Submission Information Package (SIP). I am the author of Rubymatica. It is a Ruby port of the SIP creation phase of Archivematica. My efforts were supported by the AIMS team, especially the digital archivists. (Many thanks to the Archivematica people for blazing the trail.) A key question is: How much processing should we do before initial assessment? The demo is just a few minutes, but I hope the discussion will be lively.
Mark Matienzo, Yale University (AIMS)
...
I would like to talk about "Muse" which is a program for browsing long-term email archives using data mining and visualization techniques. The program is created by Sudheendra Hangal from the Mobisocial laboratory at Stanford University. (http://mobisocial.stanford.edu/muse/)
Simon Wilson, Hull University (AIMS)
...
Do these new challenges mean that archivists will increasingly be called upon to learn new skills or work more closely with digital archivists or IT departments? Whilst time restrictions on paper archives can be easily administered by archivists the situation is more complex when restricting material within born-digital collections.
Seth Shaw, Duke University
How do we identify, preserve, describe, and provide access materials to "restricted materials?" Many times donors give us material with very sensitive content with varying degrees of awareness. Software is available both to uncover deleted records but also to identify PII (personally identifiable information) of donor and others but these usually miss some things. Do we place spacial, temporal, or group based access restrictions on the materials we can identify as restricted? How do we manage access to originals, redactions, and/or derivative access copies?
Peter Chan, Stanford University (AIMS)
...
Erin O'Meara, University of North Carolina
This is somewhat complementary to Alison's topic above. I want to talk about how we fully realize born-digital materials as normal components of a special collections and/or archives workflows. Many repositories are hiring specialized staff for born-digital. I want to ask the group and discuss how we move to digital as the norm within our competencies, workflows and policies. Part of my strategy in a large, multi-special collection library has been to empower archivists (curators, technical services and public services staff). We have designed basic procedures and user-friendly tools so they can begin to feel comfortable with handling born-digital materials. I would like to hear what other repositories are doing to engage archivists in this area.
...