Repository software evaluation using the audit checklist for certification of trusted digital repositories

Jeanne S. Kaczmarek, Thomas G. Habing, Janet Eke

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (Audit Checklist) [2] to provide a framework for examining how well currently popular repository software applications support the notion of a "trusted digital repository." The evaluation will also demonstrate the application of a scoring software evaluation methodology similar to one developed by the Center for Data Insight (GDI) at Northern Arizona University [3], used for evaluation data mining software. This scoring methodology in conjunction with the Audit Checklist can be used as a tool by librarians, archivists, and other data custodians to make informed decisions as they develop digital preservation management services.

Original languageEnglish (US)
Title of host publication6th ACM/IEEE-CS Joint Conference on Digital Libraries 2006
Subtitle of host publicationOpening Information Horizons, JCDL '06
Pages107-108
Number of pages2
DOIs
StatePublished - 2006
Event6th ACM/IEEE-CS Joint Conference on Digital Libraries 2006: Opening Information Horizons, JCDL '06 - Chapel Hill, NC, United States
Duration: Jun 11 2006Jun 15 2006

Publication series

NameProceedings of the ACM/IEEE Joint Conference on Digital Libraries
Volume2006
ISSN (Print)1552-5996

Other

Other6th ACM/IEEE-CS Joint Conference on Digital Libraries 2006: Opening Information Horizons, JCDL '06
Country/TerritoryUnited States
CityChapel Hill, NC
Period6/11/066/15/06

Keywords

  • Digital preservation management
  • Evaluation
  • Repositories

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Repository software evaluation using the audit checklist for certification of trusted digital repositories'. Together they form a unique fingerprint.

Cite this