The Role of Evidence in Establishing Trust in Repositories



The Role of Evidence in Establishing Trust in Repositories

http://www.dlib.org/dlib/july06/ross/07ross.html


<http://www.erpanet.org/events/2004/antwerpen/index.php> and in particular the report of
that meeting

<http://www.erpanet.org/events/2004/antwerpen/Workshop Antwerpen report.pdf>.

11. <http://www.rlg.org

12. <http://www.oclc.org>.

13. <http://www.archives.gov>.

14. <http://www.crl.edu>.

15. <http://www.crl.edu/content.asp?l1=13&l2=58&l3=142>.

16. <http://www.kb.nl/>.

17. <http://www.icpsr.umich.edu/>.

18. <http://www.portico.org/>.

19. <http://www.lockss.org/>.

20. Kompetenznetzwerk Langzeitarchivierung,
<
http://www.langzeitarchivierung.de/index.php>.

21. <http://nestor.cms.hu-berlin.de/tiki/tiki-index.php?page=Working+Group+on+Trusted
+Repositories+Certification+%28nestor%29
>

22. See the paper by Dobratz, S, A Schoger, and S Strathmann, 2006, 'Repository Evaluation
and Certification' offered at the
JCDL Workshop on Digital Curation and Institutional
Repositories
, 15 June 2006, Chapel Hill, North Carolina

<http://www.ils.unc.edu/tibbo/JCDL2006/Dobratz-JCDLWorkshop2006.pdf>.

23. <http://www.dini.de/>.

24. See for example, 'Elektronisches Formular zur Beantragung des DINI-Zertifikats fur
Dokumenten- und Publikationsserver <
http://www.dini.de/dini/zertifikat/>.

25. It might even be worth asking about 'the way' in which checklist criteria are satisfied.

26. Committee of Sponsoring Organizations of the Treadway Commission (COSO),
<
http://www.coso.org/publications.htm>.

27. COBIT, <http://www.isaca.org/cobit/>, a reference framework for measuring
performance, ascertaining success factors and using maturity models for benchmarking. It
was released by the IT Governance Institute (ITGI).

28. ITIL, created by the UK's Office of Government Commerce, is a library of best practice
processes for IT service management. (see ISO/IEC 20000)

<http://www.itgovernance.co.uk/page.itil>.

29. See for instance,

<http://www.iso.org/iso/en/iso9000-14000/understand/selection use/selection use.html>.

30. ISO/IEC 17799:2005: Information technology - Security techniques - Code of practice
for information security management,

<http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetaiKCSNUMBER
=39612&ICS1=35&ICS2=40&ICS3=>.

11 of 13


01/08/2006 17:25




More intriguing information

1. The name is absent
2. Institutions, Social Norms, and Bargaining Power: An Analysis of Individual Leisure Time in Couple Households
3. Weak and strong sustainability indicators, and regional environmental resources
4. The Prohibition of the Proposed Springer-ProSiebenSat.1-Merger: How much Economics in German Merger Control?
5. Who runs the IFIs?
6. A Classical Probabilistic Computer Model of Consciousness
7. Making International Human Rights Protection More Effective: A Rational-Choice Approach to the Effectiveness of Ius Standi Provisions
8. The name is absent
9. The name is absent
10. The name is absent