School of Information and Library Science
University of North Carolina, Chapel Hill
INLS 465 – Understanding Information Technology for Managing Digital Collections
[Last Updated: 2010-03-25]

Spring 2010
Meeting Time: Monday, 3:15-5:45
Location: Manning 307
Credits: 3
Instructor: Cal Lee
Office: 212 Manning
Phone: 919-962-7024
E-Mail: callee [at] ils [dot] unc [dot] edu
Office Hours: Monday, 1:00-2:00, or by appointment
Course Web Site: http://blackboard.unc.edu/

COURSE DESCRIPTION

The fundamental motivation for this course is that anyone responsible for digital collections will have to understand and be conversant in various aspects of the associated information technologies, in order to evaluate the work of developers, delegate tasks, write appropriate requests for proposals (RFPs), and establish reasonable management and preservation policies.

COURSE OBJECTIVES

Upon completion of this course, you should be able to:

COURSE EXPECTATIONS

Special Needs: If you feel that you may need an accommodation for a disability or have any other special need, please make an appointment to discuss this with me. I will best be able to address special circumstances if I know about them early in the semester. My office hours and contact information are listed at the beginning of this syllabus.

COURSE REQUIREMENTS

  1. Complete required readings and participate in class discussions.

  2. Submit 10 of the 12 Weekly Assignments (skip two of them) to the Blackboard Assignments area by 5pm on Tuesday of the weeks they are due.

  3. In-Class Exam on Week 15 (April 19).

IMPORTANT NOTE ON PLAGIARISM

It is very important that you both attribute your sources and avoid excessive use of quotes (see separate handout called "In Your Own Words"). Be aware of the University of North Carolina policy on plagiarism. Your written work must be original. Ask if you have any doubts about what this means.

All cases of plagiarism (unattributed quotation or paraphrasing) of anyone else's work, whether from someone else's answers to homework or from published materials, will be officially reported and dealt with according to UNC policies (Instrument of Student Judicial Governance, Section II.B.1. and III.D.2, http://instrument.unc.edu).

EVALUATION

Participation in class discussions and exercises: 20%

Weekly Assignments: 50% (5% x 10 assignments)

Course Exam: 30%

The most important measures of your performance in this and all other classes at SILS will be your ability to engage in challenging materials with your fellow students; your reputation for insights and professionalism among your peers and with your instructor; your integration of course material with the other things you are learning both inside and outside the classroom; and your ability to apply what you’ve learned in your future career. However, the conventions of academia dictate that I also assign labels (called grades) to your work on assignments and for the course as a whole.

Based on UNC Registrar Policy for graduate-level courses (http://regweb.unc.edu/resources/rpm24.php), both assignment and semester grades will be H, P, L or F. Few students will obtain an "H," which signifies an exceptionally high level of performance (higher than an "A" in an A-F systems). The following is a more detailed breakdown:

H Superior work: complete command of subject, unusual depth, great creativity or originality
P+ Above average performance: solid work somewhat beyond what was required and good command of the material
P Satisfactory performance that meets course requirements (expected to be the median grade of all students in the course)
P- Acceptable work in need of improvement
L Unacceptable graduate performance: substandard in significant ways
F Performance that is seriously deficient and unworthy of graduate credit

According to UNC Registrar Policy, undergraduate grades are based on the following definitions:

A

Mastery of course content at the highest level of attainment that can reasonably be expected of students at a given stage of development. The A grade states clearly that the students have shown such outstanding promise in the aspect of the discipline under study that he/she may be strongly encouraged to continue.

B

Strong performance demonstrating a high level of attainment for a student at a given stage of development. The B grade states that the student has shown solid promise in the aspect of the discipline under study.

C

A totally acceptable performance demonstrating an adequate level of attainment for a student at a given stage of development. The C grade states that, while not yet showing unusual promise, the student may continue to study in the discipline with reasonable hope of intellectual development.

D

A marginal performance in the required exercises demonstrating a minimal passing level of attainment. A student has given no evidence of prospective growth in the discipline; an accumulation of D grades should be taken to mean that the student would be well advised not to continue in the academic field.

F

For whatever reason, an unacceptable performance. The F grade indicates that the student's performance in the required exercises has revealed almost no understanding of the course content. A grade of F should warrant an advisor's questioning whether the student may suitably register for further study in the discipline before remedial work is undertaken.

AB

Absent from final examination, but could have passed if exam taken. This is a temporary grade that converts to an F* after the last day of class for the next regular semester unless the student makes up the exam.

FA

Failed and absent from exam. The FA grade is given when the undergraduate student did not attend the exam, and could not pass the course regardless of performance on the exam. This would be appropriate for a student that never attended the course or has excessive absences in the course, as well as missing the exam.

IN

Work incomplete. This is a temporary grade that converts to F* at the end of eight weeks into the next semester unless the student makes up the incomplete work.

W

Withdrew passing. Entered when a student drops after the six-week drop period.

COURSE READINGS

The texts for the course are available for purchase from the UNC Student Stores in the Daniels Building (two buildings south of Manning).

Required Text:

SILS Reserves: Copies of the following books are available from the SILS Library on the first floor of Manning Hall (behind the SILS Library help desk):

For the weekly readings, the following labels indicate where specific course readings can be located:

B = Book for purchase

R = Reserves at SILS Library in Manning Hall

C = Course site on Blackboard (https://blackboard.unc.edu/), where copies of some readings are available (under Course Documents > Readings)

O = Online through UNC license. NOTE: Accessing these materials can require you either to use a computer with a UNC IP address or visit the associated sites through a UNC proxy server. See: Off-Campus Access, http://proxy.lib.unc.edu/setupinfo.html

W = Publicly accessible Web

Tools to Support Curation of Digital Collections - This class is not focused on specific applications. However, it is often helpful to know what software is available to support various activities that relate to the topics of the course. For a directory of tools, organized around a set of functions identified in the DigCCurr (Digital Curation Curriculum) Project, see: http://www.ils.unc.edu/callee/temp-dc-tools/digital-curation-tools.htm

Week 1 (January 11) - Part 0 - Overview, Structure and Rationale

Discussion of the structure of the class, the topics we'll cover, and why the topics are important to understand when managing digital collections.

Part 1 - Nature and Characteristics of Contemporary Information Technologies

Week 2 (January 18) - Technology - Definition, Characteristics and Social Dynamics

NO CLASS SESSION (Martin Luther King, Jr. Day).

Read:

W, R - Lessig, Lawrence. Code: Version 2.0. New York, NY: Basic Books, 2006. http://codev2.cc/ [Read: Code is Law (1-9), Regulating Code (61-80)]

C - Tenner, Edward. "Ever Since Frankenstein." In Why Things Bite Back: Technology and the Revenge of Unintended Consequences, 3-32. New York, NY: Knopf, 1996.

C - Winner, Langdon. "Do Artifacts Have Politics?" Daedalus 109, no. 1 (1980): 121-36.

Other Related Readings

Week 3 (January 25) - Technological Components: Historical Origins and Interoperability

  • Evolution of ICTs:
  • Interoperability
  • Read:

    B - Campbell-Kelly, Martin, and William Aspray. Computer: A History of the Information Machine. Second ed. Boulder, CO: Westview, 2004. [Read the whole book]

    Other Related Readings

    Week 4 (February 1) - General Overview of Computer Architecture

    Read:

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [Building Blocks and System Architecture (113-117)]

    B - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2007. [11-15 (Can you find all the errors on p.13?), 37-45, 66-71, 108-111]

    Other Related Readings

    Week 5 (February 8) - How to Read a Bit - Storage, Signal Detection and the Logic of Bits

    Read:

    O - Elerath, Jon. "Hard-Disk Drives: The Good, the Bad, and the Ugly." Communications of the ACM 52, no. 6 (2009): 38-45. http://doi.acm.org.libproxy.lib.unc.edu/10.1145/1516046.1516059

    R - Hillis, W. Daniel. The Pattern on the Stone: The Simple Ideas That Make Computers Work. 1st ed. New York: Basic Books, 1998. [Nuts and Bolts (1-19); Universal Building Blocks (21-38)]

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [125-127]

    C, R - Petzold, Charles. Code: The Hidden Language of Computer Hardware and Software. Redmond, WA: Microsoft Press, 1999. [Bit by Bit by Bit (69-85); Bytes and Hex (180-189)]

    W - Sawyer, Donald. “Persistent Preservation Challenge: Experience and Recommendations.” Presented at DigCCurr 2009: Digital Curation Practice, Promise and Prospects, Chapel Hill, NC, April 1-3, 2009. http://www.ils.unc.edu/digccurr2009/5d-sawyer.pdf

    B - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2007. [How Tablet PCs Set You Free (16-17); Data Storage (155-193); How Digital Cameras Capture Light (254-255)]

    Other Related Readings

    Week 6 (February 15) - Representation Information (Part 1)

    Read:

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [On data types (167-169)]

    W - Reference Model for an Open Archival Information System. Washington, DC: Consultative Committee for Space Data Systems. http://public.ccsds.org/publications/archive/650x0b1.pdf [Specifically: Information Definition (p.2-3 to 2-5); Logical Model for Archival Information up to section 4.2.1.4.2 (p.4-19 to 4-27)] - MAYBE UPDATED VERSION, IF AVAILABLE IN TIME.

    W - Rothenberg, Jeff. "Ensuring the Longevity of Digital Information." Washington, DC: Council on Library and Information Resources, 1999. http://www.clir.org/pubs/archives/ensuring.pdf [See specifically: "Old bit streams never die—they just become unreadable" and "It’s all in the program" (2-11)]

    B - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2007. [How Tablet PCs Read Your Handwriting (18-19); How Software Applications Do Your Work (119-143); How Digital Sound Tricks Your Ear (272-273); How a Digital Camera Squeezes Video Down to Size (282-283); How Prime Numbers Protect Prime Secrets (396-397); How Printers Work (406-409)]

    Other Related Readings

    Week 7 (February 22) - Representation Information (Part 2) - Text Encoding & Structure

    Read:

    C - Haralambous, Yannis, and P. Scott Horne. Fonts & Encodings. Sebastopol, CA: O'Reilly Media, 2007. [Introduction (1-17); Before Unicode (27-52 (skimming 29-50 to get an idea of the various types of encoding)); Characters, glyphs, bytes: An introduction to Unicode (53-93 (skimming 62-93 to get an idea of the complexity and scope of Unicode)); Properties of Unicode characters (95-125 (skim to become familiar with categories of character properties)); Fonts and Web Pages (315-366)]

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [Information Content (108-111); Data Sharing (415-423)]

    B - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2007. [How Word Processors Format Text (119-145); How Optical Character Recognition Works (218-219)]

    Other Related Readings

    Week 8 (March 1) - Identifiers for Digital Objects

    Read:

    W - Campbell, Douglas. "Identifying the Identifiers." Paper presented at the International Conference on Dublin Core and Metadata Applications, Singapore, August 27-31, 2007. http://www.dcmipubs.org/ojs/index.php/pubs/article/viewFile/34/16

    W - Hilse, Hans-Werner, and Jochen Kothe. Implementing Persistent Identifiers: Overview of Concepts, Guidelines and Recommendations. London: Consortium of European Research Libraries, 2006. http://nbn-resolving.de/urn:nbn:de:gbv:7-isbn-90-6984-508-3-8 [Pay particular attention to the following pages: 1-7, 40-48]

    W - Lyons, Susan. "Persistent Identification of Electronic Documents and the Future of Footnotes." Law Library Journal 97, no. 4 (2005): 681-94. http://www.aallnet.org/products/pub_llj_v97n04/2005-42.pdf

    Related Video of Possible Interest: Van de Sompel, Herbert, Robert Sanderson, and Michael Nelson. "Memento: Time Travel for the Web." Coalition for Networked Information Fall 2009 Membership Meeting, December 14-15, 2009, Washington, DC. http://vimeo.com/8365394 [See especially the first 15 minutes, in which Van de Sompel articulates the resource referencing problems being addressed by Memento.]

    Other Related Readings

    Week 9 (March 8) - NO CLASS (Spring Recess, March 5-15)

    Week 10 (March 15) - Operating Systems and File Systems

    Read:

    O, R- Carrier, Brian. "File System Analysis." In File System Forensic Analysis, 173-210. Boston, MA: Addison-Wesley, 2005. http://proquest.safaribooksonline.com.libproxy.lib.unc.edu/0321268172/ch08

    W, R - Farmer, Dan, and Wietse Venema. "File System Basics." In Forensic Discovery. Upper Saddle River, NJ: Addison-Wesley, 2005. http://www.porcupine.org/forensics/forensic-discovery/chapter3.html

    C, R - Garrido, José M., and Richard Schlesinger. Principles of Modern Operating Systems. Sudbury, MA: Jones and Bartlett Publishers, 2008. [Basic Concepts of Operating Systems (1-18); File Management (193-217)]

    Other Related Readings

    Week 11 (March 22) - Moving Bits around - Input/Output and Networks

    Read:

    C, R - Garrido, José M., and Richard Schlesinger. Principles of Modern Operating Systems. Sudbury, MA: Jones and Bartlett Publishers, 2008. [The I/O System (219-244)]

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [Networked Computing Infrastructure and The Internet (118-131); Two Host Architectures and Three-Tier Client-Server Architecture (140-148); Communication Services (345-368); Network Architecture and Protocols (517-538)] [345-368 is in a separate file through Blackboard, rather than the main book excerpt document]

    B, R - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2008. [How Curcuits Juggle Data (21-29); Input/Output Devices (204-217, 230-241); How the Internet Works (315-321, 333-337, 339-341, 344-345, 348-349, 361-365, 368-373, 384-385)]

    Other Related Readings

    Week 12 (March 29) - Making and Running Software - Essential Components

    Read:

    R - Hillis, Daniel. Pattern on the Stone. Science Masters. Perseus, 1999. [Programming, 39-59]

    C, R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [Programming an Application (325-344)]

    R - Petzold, Charles. Code: The Hidden Language of Computer Hardware and Software. Redmond, WA: Microsoft Press, 1999. [Languages High and Low (349-362)]

    B, R - White, Ron and Timothy Edward Downs. How Computers Work. 9th Edition. How It Works Series. Indianapolis, IN: Que, 2008. [How Programming Languages Work (95-103); Viruses (386-391)]

    Other Related Readings

    Week 13 (April 5) - Industry Patterns, Players, Relationships & Trends

    Read:

    C, O, R - Messerschmitt, David G. and Clemens Szyperski. Software Ecosystem: Understanding an Indispensable Technology and Industry. Cambridge, MA: MIT Press, 2005. [Software Supply Industry (171-197); Software Creation Industry (200-265)] http://www.netlibrary.com.libproxy.lib.unc.edu/AccessProduct.aspx?ProductId=100089

    O, R - Shapiro, Carl, and Hal Varian. "Recognizing Lock-In." In Information Rules, 103-134. Boston, MA: Harvard Business School Press, 1999. http://www.netlibrary.com.libproxy.lib.unc.edu/AccessProduct.aspx?ProductId=35060

    Other Related Readings

    Part 2 - Strategies and Approaches

    Week 14 (April 12) - Organizational and Conceptual Approaches

    Read:

    C, R - Axelrod, Robert, and Michael D. Cohen. Harnessing Complexity: Organizational Implications of a Scientific Frontier. New York, NY: The Free Press, 1999. [Introduction (1-31); Conclusion (152-160)]

    W - Lee, Cal. "Never Optimize: Building & Managing a Robust Cyberinfrastructure." History and Theory of Infrastructure: Distilling Lessons for New Scientific Cyberinfrastructures, Ann Arbor, MI, September 28 - October 1, 2006. http://icd.si.umich.edu/%7Ecknobel/?q=node/40" title="http://icd.si.umich.edu/~cknobel/?q=node/40

    Other Related Readings

    Week 15 (April 19) - Architectural and System Design Approaches (Part 1)

    Exam in class - covering all material through Week 13

    Read:

    C, O, R - Baldwin, Carliss Y., and Kim B. Clark. "What is Modularity?" Design Rules. Vol. 1: The Power of Modularity, 63-92. Cambridge, MA: MIT Press, 2000. http://site.ebrary.com.libproxy.lib.unc.edu/lib/uncch/Top?id=2001005

    C - Cargill, Carl F. "A History of Standards" and "A User Perspective on Technical Standardization." In Open Systems Standardization: A Business Approach, 14-25, 89-96. Upper Saddle River, NJ: Prentice Hall, 1997.

    Egyedi, Tineke. "Infrastructure Flexibility Created by Standardized Gateways: The Cases of XML and the ISO Container." Knowledge,Technology & Policy 14, no. 3 (2001): 41-54.

    B,R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [Modularity and Layering (157-189); Standardization (215-223); Application Architecture (293-324)] [215-223 and 293-324 not in main exerpt file in Blackboard]

    Other Related Readings

    Week 16 (April 26) - Architectural and System Design Approaches (Part 2)

    Read:

    C - Moore, Reagan W. "Building Preservation Environments with Data Grid Technology." American Archivist 69, no. 1 (2006): 139-58.

    C - Seacord, Robert, Daniel Plakosh, and Grace Lewis. "The Legacy Crisis," "Understanding the Legacy System," and "Recommendations." Modernizing Legacy Systems: Software Technologies, Engineering Processes and Business Practices, 1-17, 57-67, 303-308. New York, NY: Addison-Wesley, 2003.

    Other Related Readings


    Other Related Readings by Week:

    Week 2 (August 27) - Technology - Definition, Characteristics and Social Dynamics

    O - Bowker, Geoffrey C., and Susan Leigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge, MA: MIT Press, 1999. http://webcat.lib.unc.edu/record=b4005639

    W - Kling, Rob. "What Is Social Informatics and Why Does It Matter?" D-Lib Magazine 5, no. 1 (1999). http://www.dlib.org/dlib/january99/kling/01kling.html

    C - Sproull, Lee S., and Sara Kiesler. "Beyond Efficiency." and "A Two-Level Perspective on Technology." In Connections: New Ways of Working in the Networked Organization, 1-17 and 19-35. Cambridge, MA: MIT Press, 1991.

    Week 3 (September 3) - Technological Components: Historical Origins and Interoperability

    O - Abbate, Janet. Inventing the Internet. Cambridge, MA: MIT Press, 2000. http://webcat.lib.unc.edu/record=b4005077

    W - Besser, Howard. "Digital Longevity." In Handbook for Digital Projects: A Management Tool for Preservation and Access, edited by Maxine K. Sitts. Andover, MA: Northeast Document Conservation Center, 2000. http://www.gseis.ucla.edu/~howard/Papers/sfs-longevity.html

    Brown, Adrian. "Preservation." In Archiving Websites: A Practical Guide for Information Management Professionals, 82-126. London: Facet, 2006.

    W - Computer History Museum. "Timeline of Computer History." http://www.computerhistory.org/timeline/

    W - Digital Preservation and Technology Timeline. Cornell University Library. http://www.library.cornell.edu/iris/tutorial/dpm/timeline/index.html

    W - Kay, Russell. "35 Technologies that shaped the industry." Computerworld. September 30, 2002. http://www.computerworld.com/managementtopics/management/story/0,10801,74632,00.html

    W- McDonough, Jerome. "Structural Metadata and the Social Limitation of Interoperability: A Sociotechnical View of XML and Digital Library Standards Development." Paper presented at Balisage: The Markup Conference, August 12-15, 2008. http://www.balisage.net/Proceedings/vol1/html/McDonough01/BalisageVol1-McDonough01.html

    W - Moore, Reagan. "Towards a Theory of Digital Preservation." International Journal of Digital Curation 1, No. 3 (2008). http://www.ijdc.net/index.php/ijdc/article/viewFile/63/42

    C - Smith, Richard E. "A Historical Overview of Computer Architecture." Annals of the History of Computing 10, no. 4 (1989): 277-303.

    R - Tanenbaum, Andrew S. Structured Computer Organization. Fifth ed. Upper Saddle River, NJ: Prentice Hall, 2006. [Milestones in Computer Architecture, 13-26]

    O - Tzitzikas, Yannis. "Dependency Management for the Preservation of Digital Information." In Database and Expert Systems Applications, 582-92. Berlin: Springer, 2007.

    Week 4 (September 10) - General Overview of Computer Architecture

    R - Tanenbaum, Andrew S. Structured Computer Organization. Fifth ed. Upper Saddle River, NJ: Prentice Hall, 2006. [Chapter 2 (Computer Systems Organization): 51-134]

    Week 5 (September 17) - How to Read a Bit - Storage, Signal Detection and the Logic of Bits

    O - Bairavasundaram, Lakshmi N., Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Garth R. Goodson, and Bianca Schroeder. "An Analysis of Data Corruption in the Storage Stack." ACM Transactions on Storage 4, no. 3 (2008). http://doi.acm.org.libproxy.lib.unc.edu/10.1145/1416944.1416947

    O - Balkestein, Marjan, and Heiko Tjalsma. "The ADA Approach: Retro-Archiving Data in an Academic Environment." Archival Science 7, no. 1 (2007): 89-105.

    W - Brezinski, Dominique, and Tom Killalea. "Guidelines for Evidence Collection and Archiving." Request for Comments 3227. 2002. http://www.ietf.org/rfc/rfc3227.txt

    W - Brown, Adrian. “Selecting Storage Media for Long-Term Preservation.” London: The National Archives. June 19, 2003. http://www.nationalarchives.gov.uk/documents/selecting_storage_media.pdf

    W - Byers, Fred R. "Care and Handling of CDs and DVDs: A Guide for Librarians and Archivists." Washington, DC: National Institute of Standards and Technology, 2003. http://www.clir.org/pubs/abstract/pub121abst.html

    O - Carrier, Brian. "Computer Foundations." In File System Forensic Analysis, 17-45. Boston, MA: Addison-Wesley, 2005. http://proquest.safaribooksonline.com.libproxy.lib.unc.edu/0321268172/ch02 [See also "Hard Disk Data Acquisition" (47-66).]

    Cohen, Tyler, and Amber Schroader. Alternate Data Storage Forensics. Burlington, MA: Syngress, 2007. [Includes extraction of data from handheld devices, e-mail, routers, CD, DVD and MP3 files]

    Crowley, Paul, and Dave Kleiman. CD and DVD Forensics. Rockland, MA: Syngress, 2007.

    W - “Data Recovery.” Microsoft Help and Support. Jully 9, 2008. http://support.microsoft.com/kb/835840/EN-GB/

    W - del Pozo, Nicholas, Douglas Elford, and David Pearson. “Mediapedia: Managing the Identification of Media Carriers.” In Proceedings of DigCCurr2009: Digital Curation: Practice, Promise, and Prospects, edited by Helen R. Tibbo, Carolyn Hank, Christopher A. Lee, and Rachael Clemens, 76-78. Chapel Hill, NC: University of North Carolina, School of Information and Library Science, 2009. http://www.lulu.com/product/paperback/proceedings-of-digccurr2009-digital-curation-practice-promise-and-prospects/4994819 [See also the conference demo presentation: http://www.ils.unc.edu/digccurr2009/3d-pearson.pdf]

    C - Dobrustina, Svetlana A., Svetlana I. Ganicheva, Irina G. Tikhonova, Tatiana D. Velikova, and Pavel E. Zavalishin. "Influence of the External Factors on the Lifetime of Information Recorded on DVD±R." Restaurator 28 (2008): 29-43.

    C - Dollar, Charles M. "Appendix 5 – Media Life Expectancy Disposition Charts." In Authentic Electronic Records: Strategies for Long-Term Access, 215-222. Chicago, IL: Cohasset Associates, 1999.

    W - Elford, Douglas, Nicholas Del Pozo, Snezana Mihajlovic, David Pearson, Gerard Clifton, and Colin Webb. "Media Matters: Developing Processes for Preserving Digital Objects on Physical Carriers at the National Library of Australia." Paper presented at the 74th IFLA General Conference and Council, Québec, Canada, August 10-14, 2008. http://www.ifla.org/IV/ifla74/papers/084-Webb-en.pdf

    W - Farley, Jonathan. "An Introduction to New Media." Public Record Office, 1999. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=B4BF35F8F75DF38121B1C3120F0B6196?doi=10.1.1.39.6616&rep=rep1&type=pdf

    W - Farmer, Dan, and Wietse Venema. "Persistence of deleted file information." In Forensic Discovery. Upper Saddle River, NJ: Addison-Wesley, 2005. http://www.porcupine.org/forensics/forensic-discovery/chapter7.html

    W - Garfinkel, Simson L., and Abhi Shelat. "Remembrance of Data Passed: A Study of Disk Sanitization Practices." IEEE Security and Privacy 1 (2003): 17-27. http://www.computer.org/portal/cms_docs_security/security/v1n1/garfinkel.pdf

    Horowitz, Paul, and Winfield Hill. The Art of Electronics. 2nd ed. Cambridge, England: Cambridge University Press, 1989. [See especially Digital Electronics (471-564); Microcomputers (673-742); Microprocessors (743-826)]

    C - Iraci, Joe. "The Relative Stabilities of Optical Disc Formats." Restaurator 26, no. 2 (2005): 134-50.

    W - John, Jeremy Leighton. "Adapting Existing Technologies for Digitally Archiving Personal Lives: Digital Forensics, Ancestral Computing, and Evolutionary Perspectives and Tools." Paper presented at iPRES 2008: The Fifth International Conference on Preservation of Digital Objects, London, UK, September 29-30, 2008. http://www.bl.uk/ipres2008/presentations_day1/09_John.pdf

    R - Jones, Keith J., Richard Bejtlich, and Curtis W. Rose. Real Digital Forensics: Computer Security and Incident Response. Upper Saddle River, NJ: Addison-Wesley, 2006. [See especially: "Acquiring a Forensic Duplication" (161-204), "Common Forensic Analysis Techniques" (207-246), "Forensic Duplication and Analysis of Personal Digital Assistants" (515-570), “Forensic Duplication of USB and Compact Flash Memory Devices” (571-576), "Forensic Analysis of USB and Compact Flash Memory Devices" (577-594).]

    Kirschenbaum, Matthew G. Mechanisms: New Media and the Forensic Imagination. Cambridge, MA: MIT Press, 2008. [See especially 50-53, 58-67, 89-96]

    W - Kuphaldt, Tony. R. "Principles of Digital Computing." Lessons In Electric Circuits. Volume 4. http://www.ibiblio.org/kuphaldt/electricCircuits/Digital/DIGI_16.html

    W - Pharr, Matt, and Greg Humphreys. "Sampling and Reconstruction." In Physically Based Rendering: From Theory to Implementation, 279-367. Boston, MA: Morgan Kaufmann, 2004. http://graphics.stanford.edu/~mmp/chapters/pbrt_chapter7.pdf

    W - Puglia, Steve. “Creating Permanent and Durable Information: Physical Media and Storage Standards.” CRM: Cultural Resource Management 22, no. 2 (1999): 25-27. http://crm.cr.nps.gov/archive/22-2/22-02-10.pdf

    W - Rosenthal, David S.H. "Bit Preservation: A Solved Problem?" Paper presented at the Fifth International Conference on Preservation of Digital Objects (iPRES), London, UK, September 29-30, 2008. http://www.bl.uk/ipres2008/presentations_day2/43_Rosenthal.pdf

    W - Ross, Seamus, and Ann Gow. "Digital Archaeology: Rescuing Neglected and Damaged Data Resources." London: British Library, 1999. http://www.ukoln.ac.uk/services/elib/papers/supporting/pdf/p2.pdf

    W - Schmid, Patrick, and Achim Roos. "RAID Recovery: The Data Knight Kroll Ontrack to the Rescue!" February 14, 2007. http://www.tomshardware.com/2007/02/14/raid_recovery/

    W - Schroeder, Bianca, and Garth A. Gibson. "Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You?" Paper presented at the 5th USENIX Conference on File and Storage Technologies 2007. http://www.usenix.org/events/fast07/tech/schroeder/schroeder_html/index.html

    W - Smorul, Mike, Joseph JaJa, Fritz McCall, Susan Fitch Brown, Reagan Moore, Richard Marciano, Sheau-Yen Chen, Rick Lopez, and Robert Chadduck. "Recovery of a Digital Image Collection through the SDSC/UMD/NARA Prototype Persistent Archive." UMIACS Technical Report. 2003. https://wiki.umiacs.umd.edu/adapt/images/a/ab/UMIACS-TR-2003-105.pdf

    W - Smorul, Michael, Sangchul Song, and Joseph JaJa . “An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives.” In Proceedings of DigCCurr2009: Digital Curation: Practice, Promise, and Prospects, edited by Helen R. Tibbo, Carolyn Hank, Christopher A. Lee, and Rachael Clemens, 164-169. Chapel Hill, NC: University of North Carolina, School of Information and Library Science, 2009. http://www.lulu.com/product/paperback/proceedings-of-digccurr2009-digital-curation-practice-promise-and-prospects/4994819

    W - Song, S. and JaJa, J. "ACE: A Novel Software Platform to Ensure the Integrity of Long Term Archives". In Proceedings of Archiving 2007. 2007: IS&T, https://wiki.umiacs.umd.edu/adapt/images/5/51/Rad71E67.pdf

    R - Tanenbaum, Andrew S. Structured Computer Organization. Fifth ed. Upper Saddle River, NJ: Prentice Hall, 2006. [Chapter 3 (The Digital Logic Level): 135-230]

    W - Underwood, William E. "The Presidential Electronic Records Pilot System: Results of Laboratory Experiments and Use by Archivists." Georgia Tech Research Institute, 2003. http://perpos.gtri.gatech.edu/perpos/publications/TR2003-01.pdf

    W - Underwood, W.E. and S.L. Laib. “PERPOS: An Electronic Records Repository and Archival Processing System.” Paper presented at DigCCurr2007: An International Symposium on Digital Curation, Chapel Hill, NC, April 18-20, 2007. http://ils.unc.edu/digccurr2007/papers/underwood_paper_6-3.pdf [See also conference presentation: http://ils.unc.edu/digccurr2007/slides/underwood_slides_6-3.pdf]

    Woods, Kam, and Geoffrey Brown. "From Imaging to Access - Effective Preservation of Legacy Removable Media." In Archiving 2009: Preservation Strategies and Imaging Technologies for Cultural Heritage Institutions and Memory Organizations: Final Program and Proceedings, 213-18. Springfield, VA: Society for Imaging Science and Technology, 2009. [For discussion of ingesting and verifying CD-ROM disk images.]

    Wright, Craig, Dave Kleiman, and Shyaam Sundhar. "Overwriting Hard Drive Data: The Great Wiping Controversy." In Information Systems Security: 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008: Proceedings, edited by R. Sekar and A.K. Pujari, 243–57. Berlin: Springer, 2008.

    Week 6 (September 24) - Representation Information (Part 1)

    W - Becker, Christoph, Andreas Rauber, Volker Heydegger, Jan Schnasse, and Manfred Thaller. "Systematic Characterisation of Objects in Digital Preservation: The Extensible Characterisation Languages." Journal of Universal Computer Science 14, no. 18 (2008): 2936-52. http://www.jucs.org/jucs_14_18/systematic_characterisation_of_objects

    C - Born, Günter. The File Formats Handbook. London: International Thomson Computer Press, 1995. [Excerpts in Blackboard]

    W - Buckley, Robert. "JPEG 2000 - a Practical Digital Preservation Standard?" Digital Preservation Coalition, 2008. http://www.dpconline.org/docs/reports/dpctw08-01.pdf

    W - Buonora, Paolo, and Franco Liberati. "A Format for Digital Preservation of Images: A Study on JPEG 2000 File Robustness." D-Lib Magazine 14, no. 7/8 (2008). http://www.dlib.org/dlib/july08/buonora/07buonora.html

    W - Burton, Adrian. “Infrastructure and Services for Digital Collections: Automated Obsolescence Notification” Presented at DigCCurr2007: An International Symposium on Digital Curation, Chapel Hill, NC, April 18-20, 2007. http://ils.unc.edu/digccurr2007/slides/burton_slides_4-2.pdf

    W - Bussel, Sara van, and Frank Houtman. "Gap Analysis: A Survey of PA Tool Provision." PLANETS Project, 2009. http://www.planets-project.eu/docs/reports/PA2D3gapanalysis.pdf [See Appendix B for a list of file format migration tools.]

    O - Dappert, Angela, and Adam Farquhar. "Significance Is in the Eye of the Stakeholder." In Research and Advanced Technology for Digital Libraries: 13th European Conference. Ecdl 2009, Corfu, Greece, September 27 - October 2, 2009, Proceedings, edited by Maristella Agosti, José Borbinha, Sarantos Kapidakis, Christos Papatheodorou and Giannis Tsakonas, 297-308. Berlin: Springer, 2009.

    C - Davis, Pete, and Mike Wallace. Windows Undocumented File Formats: Working inside 16- and 32- Bit Windows. Lawrence, KS: R&D Books, 1997. [Excerpts available in Blackboard]

    Farid, Hany. "Digital Doctoring: How to Tell the Real from the Fake." Significance 3, no. 4 (2006): 162-66.

    W - Hedstrom, Margaret and Christopher A. Lee. "Significant properties of digital objects: definitions, applications, implications." In Proceedings of the DLM-Forum 2002, Barcelona, 6–8 May 2002. Luxembourg: Office for Official Publications of the European Communities, 2002. 218-227. http://www.ils.unc.edu/callee/sigprops_dlm2002.pdf

    W - Hedstrom, Margaret L., Christopher A. Lee, Judith S. Olson, and Clifford A. Lampe. "'The Old Version Flickers More': Digital Preservation from the User’s Perspective." American Archivist 69, no. 1 (2006): 159-87. http://www.ils.unc.edu/callee/dig-pres_users-perspective.pdf

    O - Heydegger, Volker. "Just One Bit in a Million: On the Effects of Data Corruption in Files." In Research and Advanced Technology for Digital Libraries: 13th European Conference. Ecdl 2009, Corfu, Greece, September 27 - October 2, 2009, Proceedings, edited by Maristella Agosti, José Borbinha, Sarantos Kapidakis, Christos Papatheodorou and Giannis Tsakonas, 315-26. Berlin: Springer, 2009.

    W - “Hidden data in JPEG files.” Netzreport. October 4, 2006. http://netzreport.googlepages.com/hidden_data_in_jpeg_files.html.

    R - Hillis, W. Daniel. The Pattern on the Stone: The Simple Ideas That Make Computers Work. New York, NY: Basic Books, 1998. [Memory: Information and Secret Codes, 91-106]

    Kientzle, Tim. Internet File Formats. Scottsdale, AZ: Coriolis Group Books, 1995.

    W - Knight, Gareth. "Framework for the Definition of Significant Properties." InSPECT Project. 2008. http://www.significantproperties.org.uk/documents/wp33-propertiesreport-v1.pdf

    Kussmann, Ralf. PC File Formats & Conversions. Grand Rapids, MI: Abacus, 1990.

    W - Lawrence, Gregory W., William R. Kehoe, Oya Y. Rieger, William H. Walters, and Anne R. Kenney. "Risk Management of Digital Information: A File Format Investigation." Washington, DC: Coalition on Library and Information Resources, 2000. http://www.clir.org/pubs/abstract/pub93abst.html

    W - McGarva, Guy, Steve Morris, and Greg Janée. "Preserving Geospatial Data." DPC Technology Watch Series. Digital Preservation Coalition, 2009. http://www.dpconline.org/docs/reports/dpctw09-01.pdf

    W - Pearson, David, and Colin Webb. "Defining File Format Obsolescence: A Risky Journey." International Journal of Digital Curation 3, no. 1 (2008): 89-106. http://www.ijdc.net/index.php/ijdc/article/view/76

    C, R - Petzold, Charles. Code: The Hidden Language of Computer Hardware and Software. Redmond, WA: Microsoft Press, 1999. [Fixed Point, Floating Point (335-348)]

    W - Sergeant, Derek, and Paul Wheatley. "Survey and Assessment of Sources of Information on File Formats and Software Documentation: Final Report of the Representation and Rendering Project." University of Leeds, 2003. http://www.jisc.ac.uk/uploaded_documents/FileFormatsreport.pdf

    Swan, Tom. Inside Windows File Formats. Indianapolis, IN: SAMS, 1993. [Covers Bitmap (.BMP), Icon (.ICO), Cursor (.CUR), Font (.FNT), Metafile (.WMF), Calendar (.CAL), Cardfile (.CRD), Clipboard Viewer (.CLP), Windows Write (.WRI), Group (.GRP), Program Information (.PIF), and Executable (.EXE) files]

    Taylor, Allen G. File Format Handbook, The Lance A. Leventhal Microtrend Series. San Marcos, CA: Microtrend Books, 1992.

    Walden, Jeff. File Formats for Popular PC Software: A Programmer's Reference. New York: J. Wiley, 1986.

    Walden, Jeff. More File Formats for Popular PC Software: A Programmer’s Reference. New York, NY: John Wiley & Sons, 1987.

    W - Woods, Kam, and Geoffrey Brown. "Migration Performance for Legacy Data Access." International Journal of Digital Curation 3, no. 2 (2008): 74-88. http://www.ijdc.net/index.php/ijdc/article/view/88

    Zhang, Allison B. File Formats on the Internet: A Guide for PC Users. Washington, DC: Special Libraries Association, 1996.

    Week 7 (October 1 - Representation Information (Part 2) - Text Encoding & Structure

    W - Aven, Pete. "Enriching word documents with <w:CustomXML>: Part 5 in a series on MarkLogic Server and Office 2007." Mark Logic TechBlog. December 18, 2007. http://xqzone.marklogic.com/columns/smallchanges/2008-01-08.xqy.

    W - Aven, Pete. “Excel-ing with XQuery: Part 2 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 4, 2007. http://xqzone.marklogic.com/columns/smallchanges/2007-12-04.xqy.

    W - Aven, Pete. “A Final ‘Word’: Part 6 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. January 22, 2008. http://xqzone.marklogic.com/columns/smallchanges/.

    W - Aven, Pete. “Office Logic.” Mark Logic TechBlog. November 27, 2007. http http://xqzone.marklogic.com/columns/smallchanges/2007-11-27.xqy.

    W - Aven, Pete. “Running (a.k.a. <w:r>-ing) with Word: Part 4 in a series on MarkLogic Server and Office 2007.” Mark Logic TechBlog. December 18, 2007. http://developer.marklogic.com/columns/smallchanges/2007-12-18.xqy.

    O - Byers, Simon. "Information Leakage Caused by Hidden Data in Published Documents." IEEE Security and Privacy 2, no. 2 (2004): 23-27.

    W - Chou, Carol C.H., and Andrea Goethals. "Document Metadata: Document Technical Metadata for Digital Preservation." 2009. http://www.fcla.edu/digitalArchive/pdfs/documentMD.pdf

    W - Fanning, Betsy A. "Preserving the Data Explosion: Using PDF." Silver Spring, MD: Digital Preservation Coalition and AIIM, 2008. http://www.dpconline.org/docs/reports/dpctw08-02.pdf

    W - Garfinkel, Simson L., and James Migletz. "The New XML Office Document Files: Implications for Forensics." 2009. http://simson.net/clips/academic/2009.IEEE.DOCX.pdf

    W - Jones, Jeffrey R. "Document Metadata and Computer Forensics." James Madison University, Department of Computer Science, 2006. http://www.infosec.jmu.edu/reports/jmu-infosec-tr-2006-003.php

    W - Kappel, Sherry. "The Ten Commandments for Comparison of a Legal Document in MS Word." Microsystems Engineering Company, 1999. http://www.dontworry.com/wp/legaldoc.html

    C, R - Petzold, Charles. Code: The Hidden Language of Computer Hardware and Software. Redmond, WA: Microsoft Press, 1999. [ASCII and a Cast of Characters (286-300)]

    W - Rice, Frank. “Introducing the Office (2007) Open XML File Formats.” May 2006. http://msdn2.microsoft.com/en-us/library/aa338205.aspx.

    W - “The Risks of Metadata and Hidden Information: Analysis of Microsoft Office Files from the Web Sites of the Fortune 100." Oracle, 2007. http://www.oracle.com/technologies/embedded/docs/OutsideIn-MetadataRisks.pdf

    W - “The Top Ten Hidden Data Threats.” ManTech International. http://www.stg.srs.com/eds/docdet/TopTen.shtml [Illustrates common cases of accidentally disclosing "hidden data" within files]

    W - Wittern, Christian. "Character Encoding." In A Companion to Digital Literary Studies, edited by Ray Siemens and Susan Schreibman, 564-76. Malden, MA: Blackwell, 2007. http://www.digitalhumanities.org/companion/DLS/

    Week 8 (October 8) - Identifiers for Digital Objects

    W - Case, Mike Casey, and Bruce Gordon. "Local Filenames." In Sound Directions: Best Practices for Audio Preservation, 52-58. Harvard University, 2007. http://www.dlib.indiana.edu/projects/sounddirections/papersPresent/sd_bp_07.pdf

    W - LCCN Permalink. http://lccn.loc.gov/

    W - Leach, Paul J., Michael Mealling, and Rich Salz. "A Universally Unique IDentifier (UUID) URN Namespace." Request for Comments 4122. Internet Society, 2005. http://www.ietf.org/rfc/rfc4122.txt

    W - Nicholas, Nick, Nigel Ward, and Kerry Blinco. "A Policy Checklist for Enabling Persistence of Identifiers." D-Lib Magazine 15, no. 12 (2009). http://www.dlib.org/dlib/january09/nicholas/01nicholas.html

    W - Puglia, Steven, Jeffrey Reed, and Erin Rhodes. "File Naming." In Technical Guidelines for Digitizing Archival Materials for Electronic Access:
    Creation of Production Master Files – Raster Images
    , 60. College Park, MD: U.S. National Archives and Records Administration. http://www.archives.gov/preservation/technical/guidelines.pdf

    W - Riecks, David. " Recommendations for Limitations on Image Filenaming." http://www.controlledvocabulary.com/imagedatabases/filename_limits.html

    W - Scherle, Ryan. "Filename Requirements for Digital Objects." http://wiki.dlib.indiana.edu/confluence/display/INF/Filename+Requirements+for+Digital+Objects

    Week 10 (March 15) - Operating Systems and File Systems

    Bic, Lubomir, and Alan C. Shaw. Operating Systems Principles. Upper Saddle, NJ: Prentice Hall, 2003. [See especially Part 3 - File Systems and Input/Output]

    Hansen, Per Brinch. Operating System Principles, Prentice-Hall Series in Automatic Computation. Englewood Cliffs, NJ: Prentice-Hall, 1973. [See especially: An Overview of Operating Systems (p.122) - for a historical perspective]

    Hansen, Per Brinch, ed. Classic Operating Systems: From Batch Processing to Distributed Systems. New York, NY: Springer, 2001. [See especially first chapter by Hansen]

    C, R - Silberschatz, Abraham, Peter Baer Galvin, Greg Gagne. Operating System Concepts. Seventh Edition. Hoboken, NJ: Wiley, 2005. [Excerpts in Blackboard are: Storage Structure (8-10); Caching (24-26); File-System Interface (373-409)]

    R - Tanenbaum, Andrew. Modern Operating Systems. 2nd Edition. Upper Saddle River, NJ: Prentice Hall, 2001. [Introduction (1-20, 34-63); File Systems (379-388, 393-399)]

    R - Tanenbaum, Andrew S. Structured Computer Organization. Fifth ed. Upper Saddle River, NJ: Prentice Hall, 2006. [Example Operating Systems (470-500)]

    W - Thomas, Susan, Renhart Gittens, Janette Martin, and Fran Baker. "Capturing directory structures." In Workbook on Digital Private Papers. 2007. http://www.paradigm.ac.uk/workbook/record-creators/capturing-directory-structures.html

    Week 11 (March 22) - Moving Bits around - Input/Output and Networks

    W - Brain, Marshall. "How Domain Name Servers Work." HowStuffWorks. http://www.howstuffworks.com/dns.htm/printable

    W - Brain, Marshall, and Tim Crosby. "How E-mail Works." HowStuffWorks. http://communication.howstuffworks.com/email.htm/printable

    W- Caplan, Priscilla. "Repository to Repository Transfer of Enriched Archival Information Packages." D-Lib Magazine 14, no. 11/12 (2008). http://www.dlib.org/dlib/november08/caplan/11caplan.html

    Derfler, Frank J., Jr. and Les Freed. How Networks Work. 7th Edition. How it Works Series. Indianapolis, IN: Que, 2004.

    W - Fielding, Thomas Ray. "Representational State Transfer (REST)." In Architectural Styles and the Design of Network-Based Software Architectures. PhD Dissertation. 2000. http://roy.gbiv.com/pubs/dissertation/rest_arch_style.htm

    Gralla, Preston. How the Internet Works. 8th Edition. How It Works Series. Indianapolis, IN: Que, 2006.

    W - Johnson, Brad C. "How Web Spoofing Works." SystemExperts Corporation. 1998. http://www.systemexperts.com/tutors/webspoof.pdf

    W - Schrenk, Michael. "Downloading Web Pages." In Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL, 21-34. San Francisco, CA: No Starch Press, 2007. http://www.nostarch.com/download/webbots_ch3.pdf

    W - Tyson, Jeff. "How Firewalls Work." HowStuffWorks. http://www.howstuffworks.com/firewall.htm/printable

    W - Tyson, Jeff. "How Internet Infrastructure Works." HowStuffWorks. http://computer.howstuffworks.com/internet-infrastructure.htm/printable

    W - "Internetworking Basics." In Internetworking Technology Handbook. Cisco Systems. http://www.cisco.com/en/US/docs/internetworking/technology/handbook/Intro-to-Internet.html

    Week 12 (March 29) - Making and Running Software - Essential Components

    W - Brain, Marshall. "How Computer Viruses Work." HowStuffWorks. http://www.howstuffworks.com/virus.htm/printable

    Eilam, Eldad. Reversing: Secrets of Reverse Engineering. Indianapolis, IN: Wiley, 2005.

    R - Jones, Keith J., Richard Bejtlich, and Curtis W. Rose. "An Introduction to Perl." In Real Digital Forensics: Computer Security and Incident Response, 625-636. Upper Saddle River, NJ: Addison-Wesley, 2006.

    R - Tanenbaum, Andrew S. Structured Computer Organization. Fifth ed. Upper Saddle River, NJ: Prentice Hall, 2006. [The Assembly Language Level (507-546)]

    Week 13 (April 5) - Industry Patterns, Players, Relationships & Trends

    W - Besek, June M., Jessica Coates, Brian Fitzgerald, Wilma Mossink, William G. LeFurgy, Adrienne Muir, Mary Rasenberger, and Christopher D. Weston. “Digital Preservation and Copyright: An International Study.” International Journal of Digital Curation 2, no.3 (2008): 103-111. http://www.ijdc.net/index.php/ijdc/article/viewFile/90/61

    W - Bibliography - National Obsolescence Centre. http://www.nocweb.org/Documents/Bibliography.htm

    W - Brain, Marshall. "How ASPs Work." HowStuffWorks. http://www.howstuffworks.com/asp.htm/printable

    Clegg, Helen and Susan Montomery. “How to write an RFP for information products.” Information Outlook 10, no.6 (June 2006): 23-33.

    W - Cyberinfrastructure Technology Watch. http://www.ctwatch.org/

    W - DigiCULT Technology Watch Reports. http://www.digicult.info/pages/techwatch.php

    W - Digital Curation Centre Technology Watch Papers. http://www.dcc.ac.uk/resource/technology-watch/

    W - Digital Preservation Coalition Technology Watch reports. http://www.dpconline.org/graphics/reports/

    C - David, Paul A. "Some New Standards for the Economics of Standardization in the Information Age." In Economic Policy and Technological Performance, edited by Partha Dasgupta and Paul Stoneman, 206-39. Cambridge: Cambridge University Press, 1987. [Source of orphan effect and "angry orphans."]

    Hanseth, Ole, and Kalle Lyytinen. "Theorizing About the Design of Information Infrastructures: Design Kernel Theories and Principles." Sprouts: Working Papers on Information Systems 4, no. 12 (2004): 208-41.

    JISC Technology and Standards Watch. http://www.jisc.ac.uk/index.cfm?name=techwatch_home

    W - Lavoie, Brian, Lorraine Eakin, Amy Friedlander, Francine Berman, Paul Courant, Clifford Lynch, and Daniel Rubinfeld. "Sustaining the Digital Investment: Issues and Challenges of Economically Sustainable Digital Preservation." Blue Ribbon Task Force on Sustainable Digital Preservation and Access, 2008. http://brtf.sdsc.edu/biblio/BRTF_Interim_Report.pdf

    W - Lyman, Peter, Hal R. Varian, Kirsten Swearingen, Peter Charles, Nathan Good, Laheem Lamar Jordan, and Joyojeet Pal. "How Much Information? 2003" http://www.sims.berkeley.edu/research/projects/how-much-info-2003/ [Executive Summary is at: http://www.sims.berkeley.edu/research/projects/how-much-info-2003/execsum.htm]

    R - Messerschmitt, David G. Understanding Networked Applications: A First Course. San Francisco, CA: Morgan Kaufmann, 2000. [204-215, 231-241 (Economics and Policy), 242-254 (economics of information)]

    Monteiro, Eric. "Scaling Information Infrastructure: The Case of Next Generation IP in Internet." The Information Society 14, no. 3 (1998): 229-45.

    W - Moore, Gordon E. "Cramming more components onto integrated circuits." Electronics 38, No. 8 (1965). http://download.intel.com/research/silicon/moorespaper.pdf

    W - Moore, Richard L., Jim D'Aoust, Robert McDonald, and David Minor. "Disk and Tape Storage Cost Models." In Archiving 2007: Final Program and Proceedings, May 21-24, 2007, Arlington, Virginia, 29-32. Springfield, VA: Society for Imaging Science and Technology, 2007. http://users.sdsc.edu/~mcdonald/content/papers/dt_cost.pdf

    Rogers, Everett M. Diffusion of Innovations. 4th ed. New York, NY: Free Press, 1995. [See especially: Elements of Diffusion, 1-35 - same chapter is available in the Fifth Edition (2003)]

    W - Singh, Pameet, and Peter Sandborn. "Obsolescence Driven Design Refresh Planning for Sustainment-Dominated Systems." Engineering Economist 51, No. 2 (2006): 115-139. http://www.enme.umd.edu/ESCML/Papers/EngEconMOCA.pdf

    O - Solomon, Rajeev, Peter A. Sandborn, and Michael G. Pecht. "Electronic Part Life Cycle Concepts and Obsolescence Forecasting." IEEE Transactions on Components and Packaging Technologies 23, no. 4 (2000).

    O - Stogdill, Ronald C. "Dealing with Obsolete Parts." IEEE Design & Test of Computers 16, no. 2 (1999): 17-25.

    W - Tuomi, Ilkka. "The Lives and Death of Moore's Law." First Monday 7, No. 11 (November 2002). http://firstmonday.org/issues/issue7_11/tuomi/index.html

    Week 14 (April 12) - Organizational and Conceptual Approaches

    R - Bantin, Philip C. “Transaction Processing Systems Constructed on the Relational Database Model.” In Understanding Data and Information Systems for Recordkeeping, 65-128. New York, NY: Neal-Schuman, 2008.

    W - Being Fluent with Technology. Washington, DC: National Research Council, 1999. http://books.nap.edu/openbook.php?isbn=030906399X [See Intellectual Capabilities for FITness (elaborated on p.21-27)]

    Bennett, K.H, M.Ramage, and M.Munro. "A Decision Model for Legacy Systems." IEE Proceedings - Software 146, no. 3 (1999): 153-159.

    C - Breakfield, Charles V., and Roxanne E. Burkey. "The Migration Process." In Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle, 145-201. Amsterdam: Digital Press, 2002.

    W - Conway, Paul. "Preservation in the Digital World." Washington, DC: Commission on Preservation and Access, 1996. http://www.clir.org/pubs/reports/conway2/

    R - Currall, James. "Security and the Digital Domain." In Record Keeping in a Hybrid Environment: Managing the Creation, Use, Preservation and Disposal of Unique Information Objects in Context, edited by Alistair G. Tough and Michael Moss, 47-68. Oxford: Chandos, 2006.

    O - Dalcher, Darren. "Design for Evolution: Fostering Continuity and Responding to Change." In Managing Corporate Information Systems Evolution and Maintenance, edited by Khaled M. Khan and Yan Zhang, 24-50. Hershey, PA: Idea Group, 2005. http://www.netlibrary.com.libproxy.lib.unc.edu/AccessProduct.aspx?ProductId=108377

    W - "DIRKS [Designing and Implementing Recordkeeping Systems]: A Strategic Approach to Managing Business Information." National Archives of Australia, 2003. http://www.naa.gov.au/records-management/publications/DIRKS-manual.aspx

    W - Glick, Kevin, and Eliot Wilczek. "Ingest Guide." Tufts University and Yale University, 2006. http://dca.lib.tufts.edu/features/nhprc/reports/ingest/index.html

    W - Glick, Kevin, and Eliot Wilczek. "Maintain Guide." Tufts University and Yale University, 2006. http://hdl.handle.net/10427/1286

    W - Green, Ann, Stuart Macdonald, and Robin Rice. "Policy-Making for Research Data in Repositories: A Guide." Edinburgh, UK: EDINA and University Data Library, University of Edinburgh, 2009. http://www.disc-uk.org/docs/guide.pdf

    Hanseth, Ole, Eric Monteiro, and Morten Hatling. "Developing Information Infrastructure Standards: The Tension between Standardisation and Flexibility." Science, Technology and Human Values 21, no. 4 (1996): 407-26.

    Hargadon, Andrew B., and Yellowlees Douglas. "When Innovations Meet Institutions: Edison and the Design of the Electric Light." Administrative Science Quarterly 46, no. 3 (2001): 476-501.[See especially their concept of "robust design"]

    W - Higgins, Sarah. “ISO 15489: Information and Documentation — Records Management.” Digital Curation Centre. 2007. http://www.dcc.ac.uk/resource/standards-watch/iso-15489/

    Lee, Christopher A. "Open Archival Information System (OAIS) Reference Model." In Encyclopedia of Library and Information Sciences, Third Edition, edited by Marcia J. Bates and Mary Niles Maack. Boca Raton, FL: CRC Press, 2009. [Share page proof, or published version if it’s ready in time for class]

    W - Lehman, Meir M. "Laws of Software Evolution Revisited." Paper presented at the European Workshop on Software Process Technology 1996. http://citeseer.ist.psu.edu/lehman96laws.html

    Lehman, M. Meir, and L. A. Belady, eds. Program Evolution: Processes of Software Change. London; Orlando: Academic Press, 1985. [See especially: Laws of Program Evolution - Rules and Tools for Programming Management - M.M. Lehman (247-274); Programs, Life Cycles and Laws of Software Evolution - M.M. Lehman 393-450]

    Mendling, Jan. "Process Modelling and Standardization." Paper presented at the ERPANET Workshop on Workflow, Budapest, Hungary, October 13-15, 2004. http://www.erpanet.org/events/2004/budapest/presentations/JanMendlingErpanet2004.pdf

    Muirhead, Graeme, ed. Planning and Implementing Successful System Migrations. London: Library Association Pub., 1997.

    Sieman, Barbara, Raymond Van Diessen, and Christopher A. Lee. “Component Business Model for Digital Repositories.” In Proceedings of the Fifth International Conference on Digital Preservation (iPres), London, England, September 29-30, 2008.

    Ulrich, William M. Legacy Systems: Transformation Strategies. Upper Saddle River, NJ: Prentice Hall, 2002.

    O - Vardigan, Mary, and Cole Whiteman. "OAIS Meets ICPSR: Applying the OAIS Reference Model to the Social Science Archive Context." Archival Science 7. No. 1 (2007): 73–87. http://www.springerlink.com.libproxy.lib.unc.edu/content/50746212r6g21326/fulltext.pdf

    Warren, Ian. The Renaissance of Legacy Systems: Method Support for Software System Evolution. London: Springer, 1999.

    W - Whiteman, Cole. "Mapping Processes in Motion: Visualizing the ICPSR Data Pipeline." Paper presented at New Skills for a Digital Era, Washington, DC, May 31 - June 2, 2006. http://rpm.lib.az.us/NewSkills/CaseStudies/11_Whiteman.pdf

    Week 15 (April 19) - Architectural and System Design Approaches (Part 1)

    O - Abbate, Janet. "The Internet in the Arena of International Standards." Inventing the Internet, 147-179. Cambridge, MA: MIT Press, 2000. http://webcat.lib.unc.edu/record=b4005077

    O - Bowker, Geoffrey C., and Susan Leigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge, MA: MIT Press, 1999. http://webcat.lib.unc.edu/record=b4005639 [Pages 13-16]

    Langlois, Richard N., and Paul L. Robertson. "Networks and Innovation in a Modular System: Lessons from the Microcomputer and Stereo Component Industries." Research Policy 21, no. 4 (1992): 297-313.

    W - Lee, Cal. "A Talk on Digital Preservation." May 31, 2007. Information in Life Series. http://www.youtube.com/watch?v=RHy9CW_vMp4

    O - Parnas, D.L. "On the Criteria to Be Used in Decomposing Systems into Modules." Communications of the ACM 15, no. 12 (1972): 1053-58. http://doi.acm.org/10.1145/361598.361623

    Simon, Herbert A. "The Architecture of Complexity: Hierarchic Systems." In The Sciences of the Artificial. 3rd ed. Cambridge, MA: MIT Press, 1996. [Concept of partially decomposable subsystems]

    W - West, Joel. "The Economic Realities of Open Standards: Black, White, and Many Shades of Gray." In Standards and Public Policy, edited by Shane M. Greenstein and Victor Stango, 87-121. Cambridge: Cambridge University Press, 2007. http://www.joelwest.org/Papers/West2006-WP.pdf

    Week 16 - Architectural and System Design Approaches (Part 2)

    C, R - Brodie, Michael L., and Michael Stonebraker. "Problems and Possibilities of Legacy IS Migration." In Migrating Legacy Systems: Gateways, Interfaces & the Incremental Approach, 1-39. San Francisco, CA: Morgan Kaufmann Publishers, 1995.

    Cooper, Brian F., and Hector Garcia-Molina. "InfoMonitor: Unobtrusively Archiving a World Wide Web Server." International Journal on Digital Libraries 5, no. 2 (2005): 106-19.

    Heuvel, Willem-Jan van den. Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective, Cooperative Information Systems. Cambridge, MA: MIT Press, 2007.

    Jacobson, Ivar. Software Reuse. Addison Wesley Lognman, Harlow, England, 1997.

    C - Langlois, Richard N., and Paul L. Robertson. "Networks and Innovation in a Modular System: Lessons from the Microcomputer and Stereo Component Industries." Research Policy 21, no. 4 (1992): 297-313.

    Rajasekar, Arcot, Michael Wan, Reagan Moore, Wayne Schroeder, Sheau-Yen Chen, Lucas Gilbert, Chien-Yi Hou, Richard Marciano, Paul Tooby, Antoine de Torcy, Bing Zhu, and Christopher Lee. integrated Rule-Oriented Data System. (Forthcoming)

    O - Reich, Victoria, and David Rosenthal. "Distributed Digital Preservation: Private LOCKSS Networks as Business, Social, and Technical Frameworks." Library Trends 57, no. 3 (2009): 461-75.

    W - RenaissanceWeb - http://www.comp.lancs.ac.uk/projects/renaissance/RenaissanceWeb/

    W - Rosenthal, David S. H., Thomas Lipkis, Thomas S. Robertson, and Seth Morabito. "Transparent Format Migration of Preserved Web Content." D-Lib Magazine 11, no. 1 (2005).

    Umar, Amjad. Application (Re)Engineering: Building Web-Based Applications and Dealing with Legacies. Upper Saddle River, NJ: Prentice Hall, 1997.


    I would like to express my gratitude to Jean-François Blanchette, Kelly Garrett, and Paul Resnick for making the materials from their courses (IS 270: Introduction to Information Technology at UCLA, and SI 540: Understanding Networked Computing at the University of Michigan) available. They have been extremely useful to me in preparation of this course.