Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment.
Sally Vermaaten, Brian Lavoie, Priscilla Caplan. D-Lib Magazine. September/October 2012.
A successful digital preservation strategy accounts for and lessens the impact of various threats to the digital materials over time. Typologies
of threats are practical tools that can aid in the development of
preservation strategies. This paper proposes
the Simple Property-Oriented Threat (SPOT) Model for Risk Assessment. It defines six essential properties of successful digital
preservation.
- Available for long-term use.
- Identity allows an object to be discovered and retrieved.
- Persistence means objects are intact and can be read from the storage media.
- Renderability is that the object can be used and retain the significant characteristics.
- Understandable by its intended users.
- Authenticity in that it is what it purports to be.
This model is intended to provide a framework to carry out a risk assessment on the repository contents. Use of the model can help repositories
identify previously unaddressed threats, perform ongoing monitoring of
key threats, and demonstrate that a repository complies with accepted
standards by appropriately managing risks.
Digital preservation threats can be divided into
two categories:
- threats to archived digital content, and
- threats to the
custodial organization itself.
The SPOT Model is intended to be a practical
tool for repository managers to help identify the sources of risk and develop strategies to mitigate
these risks over time. It can be a
checklist for identifying threats.