DPC
Current Hard Disk Technologies
Current Hard Disk Technologies
Materials saved to storage devices with a variety of underlying magnetic or solid-state (flash) technologies that are hardwired into a computer still under warranty or supported: typically hard disks that are less than five years old. |
||
Digital Species: Integrated Storage |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2019 |
Trend in 2023: No Change |
Previously: Vulnerable |
Imminence of Action Action is recommended within five years, detailed assessment within three years. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve | Inevitability Loss of material in this group could be entirely avoidable if provided the means to deploy proven tools and techniques. |
Examples Direct Attached Storage (DAS) such as magnetic or solid-state drives integrated into individual laptops or workstations and into smaller scale storage facilities. |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; poor handling; poor storage; lack of consistent replication; failure of external (dependencies, e.g., suppliers, security); political or commercial interference; failure of internal dependencies (e.g., power supply, disk controller); overly aggressive compression; poor information security; lack of integrity-checking; lack of strategic investment; lack of warranty; unenforceable warranty. |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; refreshment planning; export functionality; resilient to hacking; selection and appraisal criteria; version control; resilient funding; technology watch; enforceable warranty; disaster planning. |
||
2023 Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. It was reviewed in 2021 with a noted trend towards greater risk in light of the continued shift towards reliance on cloud storage with computers increasingly reducing hard disk for solid-state storage and commercial motivations for less support, and reviewed in 2022 with no noted increase in trend towards even greater or reduced risk. The 2023 Council agreed with the current Vulnerable classification, with overall risks remaining on the same basis as before (no change to the trend), while also noting a slight decrease in the effort needed to preserve and the imminence of action required when compared to the 2021 Jury review. |
||
Additional Comments As people increasingly select other storage methods, such as cloud, they are less likely to maintain existing content on portable hard disks, which means the portable hard disks are more likely to be overlooked or ignored (e.g., left in drawers) rather than checked and refreshed. There are also indications of increasing prevalence of soldered-in flash storage which cannot easily be accessed in the case of device failure. Case Studies or Examples:
See also:
|
Recently Commissioned or Completed Media Art
Recently Commissioned or Completed Media Art
Media art currently displayed in a gallery or in the process of being displayed. |
||
Digital Species: Media Art |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2019 |
Trend in 2023: No Change |
Previously: Vulnerable |
Imminence of Action Action is recommended within twelve months, detailed assessment is a priority. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve | Inevitability It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Media art recently acquired by galleries that utilize specific hardware and software in order to be accessed or exhibited. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of documentation to enable maintenance; lack of clarity with respect to intellectual property; complex interdependencies on specific hardware, software or operating systems; lack of capacity in the gallery or workshop; lack of strategic investment; complex external dependencies; lack of documentation about artist intent. |
||
‘Lower Risk’ in the Presence of Good Practice Strong documentation; clarity of preservation path and ensuing responsibilities; proven preservation plan; capacity of workshop to support artwork at de-installation; capacity of gallery to conserve after de-installation; capacity of gallery to re-install work. |
||
2023 Review This entry was added in 2019 as a separate entry, but it was previously introduced in 2017 under ‘Media Art’ with particular reference to historical media art. It was added for greater specificity for its recommendations, to represent works commissioned in the last five years where there is a reasonable expectation that documentation has been produced or could still be obtained. While the 2020 Jury found no change in trend, the 2021 Jury discussed how prospects for longterm preservation depend entirely on whether the artwork is collected post-commission and by an organization with the resources to care for it. They agreed that the classification remains Vulnerable but with a trend towards greater risk because the imminence of action is timesensitive, requiring working with the artist to get the documentation from them about their work and what is needed before it is too late. Furthermore, there remains a vulnerability for the smaller museums or others that do not take the preservation of media art as seriously. The 2023 Council agreed with the Vulnerable classification with overall risks remaining on the same basis as before (no change to the trend), although noted a change in the imminence of action from 3 years to 12 months. |
||
Additional Comments By the time digital art, time-based media, etc., has entered into the permanent care of a stewarding institution, many of its technologies are already end-of-life, unsupported, or the hardware components have deteriorated. Often the expertise to maintain these many interacting components sits outside the host organization, with a technical supplier to the gallery, and this is in itself vulnerable to business change. Although there are a few exceptions, there is a need for greater capacity within the museum and gallery sector to address the challenges. There have been new initiatives for guidance and examples of institutions taking wider sectoral responsibility for standards, which have helped with the effort to preserve, such as Matters in Media Art information resource and guidance. Media artworks are often made with a network of knowledge that can be precarious. Documentation around production processes can be minimal, and hence acting quickly with known processes can gather information before the knowledge and people networks start to disperse. This can mean preservation of production environments and associated workflows can be preserved alongside the media. Some art works specifically leverage the limitations and characteristics of the systems that they incorporate, often in unusual ways. This can be hard to migrate or emulate accurately. Case Studies or Examples:
See also:
|
Documents presented in PDF (Portable Document Format) format (ISO 32000:1 and ISO 32000:2) and other data wrapped inside them, including all variants and versions, including PDF/A. |
||
Digital Species: Formats |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2017 |
Trend in 2023: No Change |
Previously: Vulnerable/Endangered |
Imminence of Action Action is recommended as required, with periodic review every five years. |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve | Inevitability It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Documents stored offline, or online in repositories or EDRMS, including reports, agenda, minutes, correspondence, contracts, essays, articles, or research papers, PDF 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7 and 2.0. PDF/A, PDF/X and PDF/E. |
||
‘Endangered’ in the Presence of Aggravating Conditions Loss of context; loss of authenticity or integrity; external dependencies; poor storage; lack of understanding; significant diversity of data; poorly developed digitization specifications; lack of integrity checking; poorly developed migration or normalizations specifications; lack of virus control; poor storage or replication; lack of validation at the point of creation; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Well-managed data infrastructure; preservation planning; authenticity managed; use of persistent identifiers; reduction of dependencies; application of records management standards; recognition of preservation requirements beyond formats; strategic investment in digital preservation; preservation roadmap; participation in digital preservation community; format validation; version control. |
||
2023 Review The PDF entry was added in 2017 and was split into two entries, ‘PDF/A’ and ‘PDF other than PDF/A’, in 2019 to emphasize the different threats faced by different types of PDF. The 2021 Jury agreed with this decision and noted that trends for the PDF other than PDF/A entry and the PDF/A entry were both towards a reduced risk. The 2023 Council recommended merging the two previously split entries (‘PDF/A’ and ‘PDF other than PDF/A’). After reviewing the two entries separately, they found more similarities than differences between the two and indeed across all types of PDF (not just PDF/A). Due to the level of commercial, open-source tools that are available to assist preservation, the risk of loss is less persistent than previously suggested. Therefore a Vulnerable classification is appropriate for all PDF formats as whole. |
||
Additional Comments There is a lot of material produced and kept in PDF. Some of it is authoritative, in other words, the only available copy, while some of it is not. However, if it is the only copy and it is lost, it can have an impact on a lot of people The challenge in evaluating the significance and impact of the loss of PDFs is that they’re quite often a surrogate of something else, whether a digitized record or a Word document, etc. Whether or not that record is retained may be a factor. We should also be considering PDF Portfolios, which are an extension of PDF 1.7. Portfolios contain embedded files and can include text documents, spreadsheets, PowerPoints, emails, Computer Aided Design (CAD) drawings. Vulnerability also depends on if the PDF file conforms to the specific PDF/A standard or not. This is caused by a combination of 1) not conforming to the standard and 2) collection managers assuming that the file is resilient simply because it purports to be a PDF/A. This risk is less with the format and more with the understanding and experience in data management. Moreover, materials embedded in or attached to PDF/A-2 and PDF/A-3 may be at risk. See also:
|
Published Research Papers
Published Research Papers
Completed research papers published in serials, monographs or theses which fall under specific collecting policies of research libraries or archives and are managed through dedicated repository infrastructures. |
||
Digital Species: Research Outputs |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2017 |
Trend in 2023: No Change |
Previously: Vulnerable |
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve | Inevitability It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Published research papers in scholarly E-Books and Electronic Journals; Electronic manuscripts; Electronic theses (E-theses). |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of documentation; lack of clarity with respect to intellectual property; embedded complex objects; unstable funding for repository; lack of strategic investment; complex external dependencies; lack of persistent identifiers; bespoke formats; lack of legal deposit mandate. |
||
‘Lower Risk’ in the Presence of Good Practice Strong documentation including intellectual property rights; clarity of preservation path and ensuing responsibilities; credible preservation plan; proven capacity of repository; legal deposit preservation copying; post-cancellation access service; persistent identifiers used consistently; non-proprietary formats used and validated; minimal or well managed external dependencies. |
||
2023 Review This entry was added in 2017 under 'Published research outputs,' though without reference to the capacity of the repository infrastructure. The 2019 Jury amended it to presume the existence of repository infrastructure and noted that the aggravating conditions (which introduce risks) and good practice enhancements (which reduce it) are most relevant to repository operations. While the 2020 Jury found no change in trend, the 2021 Jury agreed it should remain Vulnerable but discussed improvements and initiatives towards the preservation of research data and outputs, pointing to a trend towards reduced risk. The 2023 Council agreed with the Vulnerable classification, noting a slight decrease in imminence of action with no significant trends towards greater or reduced risk. Additionally, the Council recommended that a nomination received for a new ‘E-theses’ entry would provide a valuable example to this entry rather than as a new, standalone entry. However, as noted in the additional comments below, a recommended rescoping of the entry planned the next Bit List will revisit this nomination again as part of a restructuring. |
||
Additional Comments The 2023 Council additionally recognize that further scoping and input are needed for this entry and recommend that the next major review revisit and restructure the entry, in particular looking at restructuring based on differences between:
A 2023 nomination for E-theses highlights distinct risks tied to these digital published materials. E-theses tend to be sole documents which when published by universities may get harvested into other aggregators or resources but in many cases the only copy (with no physical/analogue copy) sits on an Institution's repository. In addition, many are deposited in PDF format (of many varieties and many don't even attempt to use PDF/A etc.) risking long term accessibility and re-use. However, the breadth of risks goes beyond just the PDF variety, as e-theses often include databases, audiovisual materials, websites, and more. The loss of tools, data or services within this group would impact on people and sectors around the world. Particularly those involved with reproducibility and those wishing to use the datasets for further research. Although there have been improvements in current practice, policies and workflows, there is still a significant corpus of information that was deposited before these improvements came into force. It is unlikely that there will be the time, will or resources to bring this information up to current standards. See also:
|
Local Network Storage
Local Network Storage
Materials routinely copied or backed up to locally managed data storage facilities and able to be restored under institutional service arrangements. |
||
Digital Species: Integrated Storage |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2019 |
Trend in 2023: No Change |
Previously: Vulnerable |
Imminence of Action Action is recommended as required, with periodic review every five years. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve | Inevitability Loss of material in this group could be entirely avoidable if provided the means to deploy proven tools and techniques. |
Examples Institutional or departmental network storage and institutional data centers based on technologies such as (NAS) Network Attached Storage, (RAID) Redundant Array of Independent Disks, (SAN) Storage Area Networks, JBOD (Just a bunch of disks), SPAN and related. |
||
‘Endangered’ in the Presence of Aggravating Conditions Encryption; lack of routine maintenance; lack of storage replication; over-dependence on a single supplier, technology or technician; insufficient documentation; single point of failure; political or commercial interference; failure of dependencies (e.g., power supply, controller software); overly aggressive compression; poor information security; lack of integrity-checking; lack of strategic investment; lack of warranty; unenforceable warranty, encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup to different technology; backup to diverse locations; documentation of assets; integrity checking; preservation planning; refreshment planning; export functionality; resilient to hacking; selection and appraisal criteria; version control; resilient funding; technology watch; enforceable warranty; disaster planning and documentation. |
||
2023 Review This entry was added in 2019 to ensure that the range of media storage is properly assessed and presented. The 2023 Council agreed with the current Vulnerable classification with overall risks remaining on the same basis as before (no change to the trend), while also noting a slight decrease in the effort needed to preserve and the imminence of action required when compared to the 2021 Jury review |
||
Additional Comments There has been a renewed interest in tape as offline storage is the only sure protection against advanced ransomware. See also:
|
Pension, Mortgage and Insurance Records
Pension, Mortgage and Insurance Records
Records of transactions for long-lived financial products and services contracted between individuals and corporations. These records typically contain or depend on significant amounts of personal information and outlast the infrastructure on which they were created. |
||
Group: Sensitive Data |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2017 |
Trend in 2023: No Change |
Previously: Vulnerable |
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve | Inevitability It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Applications, correspondence and ancillary records relating to pensions, mortgages and insurances and other contracts of long duration. This includes corporate databases, email, web archives and EDRMS, and may require some coordination of paper, microfiche, born-digital and digitized records. These records often include the scope and duration of the contract as well as any agreed changes during the lifetime of the product. It may also include evidence of mis-selling or other sharp practice, which only becomes apparent after the fact. This entry pertains to corporate records rather than personal records. |
||
‘Endangered’ in the Presence of Aggravating Conditions Lack of corporate preservation planning; lack of preservation within the procurement of corporate systems; companies conflating backup with preservation; loss of integrity and authenticity; loss of context and connections to provide meaning; lack of preservation capability within agencies; lack of preservation voice at executive level; poor planning and roadmap for corporate infrastructure; proliferation of legacy systems; slapdash procurement or migration of new systems; mergers and acquisitions leading to confusion of corporate systems; lack of compliance, audit or accountability at operational levels; encryption. |
||
‘Lower Risk’ in the Presence of Good Practice Backup and documentation; use of open formats and open source software; considered data management planning; licencing that enables preservation; preservation capability in designated repository; resilient to hacking; selection and appraisal in place; authenticity and integrity of records managed; resilient funding and recognition at executive level; technology watch; regular preservation audits; accreditation and participation in the professional preservation community. |
||
2023 Review This entry was added in 2017 but was outside the competence of the judges to assess at that time. It was assessed in 2019 with additional expertise invited to the panel to support this assessment and reviewed again in 2020. The 2021 Jury agreed with that 2019 assessment and subsequent 2020 review, which classified these digital materials as Vulnerable with no trend towards greater or reduced risk. The 2023 Council agreed with the Vulnerable classification with the overall risks remaining on the same basis as before (no change to the trend). |
||
Additional Comments The importance of retaining documentation in any kind of legal agreement offers this kind of material more protection than most but legal organizations may conflate backup with preservation and not always have consistent records management systems. See also:
|
Completed Investigations Based on Open Source Intelligence Sources
Completed Investigations Based on Open Source Intelligence Sources
Open source social media and web content that has been used to support the conclusions of crowd-sourced investigation and fact-checking in political or military conflict. |
||
Digital Species: Legal Data |
Trend in 2022: Trend towards greater risk |
Consensus Decision |
Added to List: 2019 |
Trend in 2023: No Change |
Previously: Endangered |
Imminence of Action Action is recommended within twelve months, detailed assessment is a priority. |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve | Inevitability It would require a major effort to prevent or reduce losses in this group, possibly requiring the development of new preservation tools or techniques. |
Examples Social media sources relating to recent conflicts. |
||
Critically Endangered in the presence of Aggravating Conditions Encryption; loss of authenticity; lack of preservation agency; limited or no digital preservation capability. |
||
‘Vulnerable’ in the Presence of Good Practice Offline backup captured by a journalist or investigating authority; materials presented and documented in court; court able to deliver preservation; authenticity protected. |
||
2023 Review This entry was added in 2019 and subsequently split into three elements by the Jury, relating to current, recent and historic sources. This entry relates to materials used in evidence in completed investigations, as well as those presented to courts or other investigatory agencies. Social media companies have a policy to take down or suppress content that they consider propaganda for terrorist groups. This has had the unintended consequence of deleting or suppressing content used in open source investigation or fact-checking for journalistic or judicial purposes, which may impede refutation or prosecution. However, a new generation of cloud-based services now allows investigators to copy and stabilize content to private accounts in the process of investigating it, so the ethical requirements of social media companies and the integrity of the investigation are both served. The 2020 Jury noted that such content remains at risk. The presentation of data to a court or prosecuting authority, or the publication through news media, implies the introduction of a long-term preservation function. The 2021 Jury agreed with this assessment and Endangered classification but changed the 2021 trend towards greater risk in light of recent developments in crowd-sourced investigations and fact-checking. The 2022 Taskforce agreed on a trend towards even greater risk based on the increased significance of crowd-sourced investigations and fact-checking in light of ongoing global conflicts that include (but are not limited to) those in Ukraine. The 2023 Council agreed with the Endangered classification with the overall risks remaining on the same basis as before (no change to the trend), noting that some of the description and language used in the entry may be confusing. For example, one might think if investigations are complete that surely the parts used as evidence or published in articles are captured elsewhere and presumably preserved there? While this may be the case, presuming long term preservation may lead to future loss in instances where this is not true. Here, risks can overlaps with those found in 'Evidence in Court' and 'Proceedings in Court' entries, which themselves indicate that standard records management processes within designated agencies should be able to take care of the preservation of materials like this but, given that it is likely to involve complex types of data, such agencies may not be equipped to deliver preservation effectively. |
||
Additional Comments The 2023 Council additionally recommend further scoping of the entry with input from those working with these materials directly, to help explain the unique challenges as well as examples where content has been lost due to deletion by social media companies and/or legal retention periods where certain content may not fall under the scope of records for long-term or permanent retention. Case Studies or Examples:
See also:
|
Documents, correspondence and other records created in the course of contractual dealings between individuals and agencies, especially where the subjects are of long duration and may be subject to legal scrutiny at undefined points in the distant future. |
||
Digital Species: Formats |
Trend in 2022: Material improvement |
Consensus Decision |
Added to List: 2017 |
Trend in 2023: No Change |
Previously: Endangered |
Imminence of Action Action is recommended within five years, detailed assessment within three years. |
Significance of Loss The loss of tools or services within this group would have a global impact. |
Effort to Preserve | Inevitability It would require a small effort to preserve materials in this group, requiring the application of proven tools and techniques. |
Examples Gmail, Hotmail, Yahoo Mail, Outlook, and email in all its forms including individual messages, threads of conversation, mailboxes, email servers and file attachments. |
||
‘Critically Endangered’ in the Presence of Aggravating Conditions Conflicting and unmanaged IPR; use of personal accounts for professional work and vice versa; proliferation and duplication of attachments; email not recognized as a record; absent, unworkable or inconsistent records management; dependence on free cloud-based services; lack of migration path; lack of preservation planning; perverse incentives to delete; encryption. |
||
‘Vulnerable’ in the Presence of Good Practice Application of appraisal and selection tools; timely transfer to preservation facility or archive; commitment to transparency; preservation policy; working preservation plan; clear migration path; widespread recognition of email as a record. |
||
2023 Review This entry was added in 2017, but the Jury did not have the capacity to assess it in detail. It was reviewed and assessed in 2019, including highlights to significant developments, including the recommendations of the Email Preservation Taskforce and the development of the ePADD software. Email presents many preservation challenges, from scale through core technologies, attachments, privacy and intellectual property rights. Because this entry intersects with many others, the aggravating conditions associated with email should be considered in conjunction where relevant. The 2021 Jury discussed the continued developments in email preservation tools and techniques as well as the growing number of archives preserving email content. At the same time, issues with providing access to preserved email content have arisen. Ongoing records management policies towards corporate or business email need to be better embedded to stop the loss of important email content, and more awareness is needed around the potential of personal email. While record-keeping legislation and mandates direct retention periods, email document decisions taken by government officials at local, regional and national levels are not always well maintained, if at all; a loss could impact people’s lives along with their ability to assert rights. For these reasons, there was a 2021 trend towards reduced risk, but the Endangered classification remained. The 2022 Taskforce agreed on a trend towards reduced risk based on material improvement over the last year with applied examples of good practice, including (but not limited to) approaches to creating a PDF format for the preservation of email, and improvements to existing software, tools and workflows supporting complex email preservation. The 2023 Council agreed with the Endangered classification and noted a decrease in the imminence of action and effort to preserve. |
||
Additional Comments The 2023 Council also recommended noting areas of overlap with the ‘Cloud-based Services and Communications Platforms’ entry as it pertains to the saving and preservation of email in cloud-based services such as Microsoft Sharepoint). Email is hugely important as it has been so pervasive as a communication mechanism for society. Some methods used and responsibility adopted for collecting at the business and public body level (again will differ globally), but this will be a fraction of the communities that use it, and few will be set up for the long-term care of this data. Case Studies or Examples:
See also:
|
Semi-Published Research Data
Semi-Published Research Data
Data sets produced in the course of research and shared between researchers, such as by posting to a website or portal but without preservation capability or commitment. Typically the data remains in the hands of the researchers who have the job of maintaining it. |
||
Digital Species: Research Outputs |
Trend in 2022: Material improvement |
Consensus Decision |
Added to List: 2019 |
Trend in 2023: No Change |
Previously: Endangered |
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on people and sectors around the world. |
Effort to Preserve It would require a major effort to prevent or reduce losses in this group, possibly requiring the development of new preservation tools or techniques. |
Examples Departmental web servers; project wikis; GitHub repositories. |
||
‘Critically Endangered’ in the Presence of Aggravating Conditions Originating researcher no longer active or changed research focus; staff on temporary contracts; dependence on single student or staff member; weak or fluid institutional commitment to subject matter; weak institutional commitment to data sharing; complicated or contested intellectual property; encryption; limited or dysfunctional data management planning; web capture challenges that means unlikely to be picked up by automatic crawlers. |
||
Vulnerable in the Presence of Good Practice Data in preparation for transfer to specialist repository; robust data management planning; documented and managed professionally using data stewards. |
||
This 2019 entry was previously introduced in 2017 under ‘Research Data,’ though without explicit reference to semi-published research data. In 2019, the Jury split the ‘Research Data’ entry into a range of contexts for research outputs, including this addition. The entry draws attention to represent ‘self-help’ data sharing which is to be encouraged as a means to facilitate open science but should not be confused with long-term preservation. The 2021 Jury agreed with the Endangered classification, noting problems with the volume of data being produced but not being kept in a meaningful way. Research data is complex and has specific requirements for documentation that may only be known to subject matter experts. However, data creators (e.g., researchers) are not necessarily well laced to sustain data in the long term. There were also a few significant changes to the entry in the 2021 Bit List.
The 2022 Taskforce agreed on a trend towards reduced risk based on material improvement over the last year that have not only offered examples of good research data management and preservation practices but also suggest a significant shift towards culture of change and collaboration across different research communities and stakeholders. These include (but are not limited to) improvements and initiatives by the European Open Science Cloud (EOSC), Science Europe, Research Data Alliance (RDA), Digital Curation Centre (DCC) and related projects on the preservation of research data and outputs. The 2023 Council agreed with the Endangered classification. |
||
Additional Comments There is a positive trend of increased research data management activity and engagement by libraries and data centres, which should help to ensure that more research datasets are properly deposited in data repositories, rather than left in a 'semi-published' state. Offering and minting researchers Digital Object Identifiers for datasets deposited at specialist repositories will encourage data citation and increase research impact of individual researchers, which traditionally relied more on publishing papers than datasets.
See also:
|
3D Digital Engineering Drawings
3D Digital Engineering Drawings
3D digital engineering models produced as part of building or engineering design processes. The production of such drawings has progressed from a digital analogue of paper to complex digital environments such as BIM (Building Information Modelling) which combine original drawings, libraries of compound objects, and links to external data sets such as about the performance of materials and maintenance of parts. |
||
Digital Species: Engineering Data |
Trend in 2022: No Change |
Consensus Decision |
Added to List: 2017 |
Trend in 2023: No Change |
Previously: Endangered |
Imminence of Action Action is recommended within three years, detailed assessment within one year. |
Significance of Loss The loss of tools, data or services within this group would impact on many people and sectors. |
Effort to Preserve | Inevitability It would require a major effort to prevent or reduce losses in this group, possibly requiring the development of new preservation tools or techniques. |
Examples Building Information Management (BIM), Computer Aided Design (CAD), Product Data Management in engineering and architecture. |
||
‘Critically Endangered’ in the Presence of Aggravating Conditions Lack of preservation mandate or collecting institution; lack of preservation capability in data owner; irregularities in supply chains; complex or long data supply chains; dependencies on proprietary software or formats; lack of persistent identifiers; poorly managed IPR; temporary joint-venture companies; poor records management; poor regulatory compliance; encryption. |
||
‘Vulnerable’ in the Presence of Good Practice Well managed data infrastructure; preservation from the point creation; carefully managed IPR; persistent identifiers; well managed records management processes; recognition of preservation requirements at highest levels; strategic investment in digital preservation; host clearly identified; participation in the digital preservation community. |
||
2023 Review This entry was first submitted in 2017 when the Jury lacked the capacity to consider it in detail. In 2019 it was assessed with additional expertise co-opted, with the decision to remain a very broad category, including major one-off construction and engineering projects, a long tail of more minor building programmes, and large volume but homogeneous production processes in engineering. The 2021 Jury agreed with its Endangered status. The key consideration is that the lifecycle of the products and the data that describes them vastly exceeds the short life cycles of the infrastructures on which they are designed. This challenge is compounded by supply chains that may involve many different stages of production, as well as the delivery of large projects through transitory joint ventures companies that have no residual mechanism or capacity to preserve the data thereafter. Although there have been advancements in the development of new preservation tools and techniques for these materials, there are recent examples of the loss of 3D architectural drawings; these have had a huge impact, especially at the local level, as well as significant impacts on infrastructure, travel, and how people interact with built environments throughout the world. The 2021 trend moved towards greater risk to reflect this. The 2023 Council agreed with the Endangered classification and seconded the trend reported last time; risks continue on the same basis as before with no significant trends towards even greater or reduced risk. Most of the complexities of the format and issues remain the same, such as reliance on proprietary software and complex or unknown copyright with the datasets. Moving forwards, it was highlighted by the Council that there needs to be a greater focus and understanding on the long term preservation of these outputs within the sector. |
||
Additional Comments Data in this category enables the safety and security of critical infrastructure, but the responsibility to maintain data is unclear, nor are retention periods clear. Although examples of good practice exist, the extent to which there are working solutions at large seems doubtful, and it is surprising that there are not more diverse success stories to report. Case Studies or Examples:
See also:
|