Skip to main content

Authenticity

  • Chapter
  • First Online:
Advanced Digital Preservation
  • 2863 Accesses

Abstract

Much has been written about Authenticity . However in order to create tools which can be relied upon and which are practical we must achieve the following

authenticity (plural authenticities)

 1. The quality of being genuine or not corrupted from the original.

  I hereby certify that this is an authentic copy.

 2. Truthfulness of origins, attributions, commitments, sincerity, and intentions.

  The painting was not authentic after all; it was just a copy.

 3. (obsolete) The quality of being authentic (of established authority).

  (Wiktionary definition from http://en.wiktionary.org/wiki/authenticity downloaded 14 Aug 2010)

Authenticity is a fundamental issue for the long-term preservation of digital objects: the relevance of authenticity as a preliminary and central requirement has been investigated by many international projects. Some focused on long-term preservation of authentic digital records in the e-government environment, and in scientific and cultural domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Drambora http://www.repositoryaudit.eu/

  2. van der Hoeven J, van Wijngaarden H (2005) Modular emulation as a long-term preservation strategy for digital objects. Paper presented at the International Web Archiving Workshop (IWAW’05), Vienna, Austria, 2005. Available from http://www.iwaw.net/05/papers/iwaw05-hoeven.pdf

  3. Handle System web site http://www.handle.net/

  4. DOI (Digital Object Identifier system) http://www.doi.org/

  5. PURL (Persistent Uniform Resource Locators) http://purl.org

  6. Archival Resource Key (ARK ) http://www.ietf.org/internet-drafts/draft-kunze-ark-09.txt

  7. N2T (Name-To-Thing resolver) http://n2t.info/

  8. UNESCO , Convention concerning the protection of the world cultural and natural heritage, 17th Session General Conference, 16 November 1972, Paris

    Google Scholar 

  9. Garrett J, Waters D (eds) (1996). Preserving Digital Information, Report of the Task Force on Archiving of Digital Information commissioned by The Commission on Preservation and Access and The Research Libraries Group. Available from http://www.ifla.org/documents/libraries/net/tfadi-fr.pdf

  10. CRL,(2007) Retrieved from http://www.crl.edu/content.asp?l1=13&l2=58&l3=162&l4=92

  11. Dale R (2007) Mapping of Audit & Certification Criteria for CRL Meeting (15-16 January 2007). Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/TRAC -Nestor-DCC-criteria_mapping.doc

  12. Giaretta D (2008) Comparison of OAIS and the Chicago Meeting 10 points. Available from http://wiki.digitalrepositoryauditandcertification.org/bin/view/Main/ComparisonOaisAndChicago10Points

  13. nestor Working Group Trusted Repositories – Certification, (2006), Catalogue of Criteria for Trusted Digital Repositories. English version retrieved from http://edoc.hu-berlin.de/series/nestor-materialien/8en/PDF/8en.pdf

  14. National Science Foundation Cyberinfrastructure Council (NSF, 2007), Cyberinfrastructure Vision for 21st Century Discovery. Retrieved from http://www.nsf.gov/pubs/2007/nsf0728/nsf0728.pdf

  15. Open Archival Information System (OAIS ) – Reference Model, ISO 14721:2003, (2003). Available from http://public.ccsds.org/publications/archive/650x0b1.pdf or later version

  16. RLG-OCLC (2002) Report on Trusted Digital Repositories: Attributes and Responsibilities. Available from http://www.oclc.org/programs/ourwork/past/trustedrep/repositories.pdf

  17. Ross S., Bütikofer N, McHugh A (2006), DCC Comments on RLG/NARA Audit and Certification Checklist. Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/Ross_McHugh_Buetikofer_comments_RLGNARA_AUDIT_ver2.pdf

  18. TRAC (2007), Trustworthy Repositories Audit & Certification: Criteria and Checklist. Available from http://www.crl.edu/PDF/trac.pdf

  19. Buneman OP, Khanna S, Tan W-C. On the Propagation of Deletions and Annotations through Views. Proceedings of 21st ACM Symposium on Principles of Database Systems.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Giaretta .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Giaretta, D. (2011). Authenticity . In: Advanced Digital Preservation. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16809-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16809-3_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16808-6

  • Online ISBN: 978-3-642-16809-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics