Résumés
Abstract
This exploratory study is based on semi-structured interviews with digital preservationists working in Canada. The goal was to understand how participants are reviewing sensitive personal information in their digital materials and identify the challenges they face in this work. Findings include a summary of current practices in place (e.g., risk profiling, using software tools for triage, and consultation with donors and/or community), and a list of challenges (e.g., IT or systems infrastructure, scale, barriers to access for software tools, and funding restrictions). The implications of these findings are that Canadian memory workers require time, staff, support, and training, while developers of assistive-software tools for this work should address tool limitations and prioritize user-friendly interfaces. Grant funding stipulations should also be revised to allow for diverse access options, while investment in controlled access repositories would enable responsible online access to complex collections.
Keywords:
- preservation,
- sensitive information,
- privacy,
- digital
Résumé
Cette étude exploratoire se base sur des entretiens semi-dirigés avec des préservateurs numériques travaillant au Canada. Le but est de comprendre comment les participants examinent les informations personnelles sensibles dans le matériel numérique et d’identifier les défis auxquels ils font face dans leur travail. Les résultats comprennent un sommaire des pratiques courantes qui sont en place (par exemple, profilage des risques, utilisation de logiciels pour le triage, consultation avec des donateurs et/ou la communautés) et une liste des défis (par exemple, les TI ou l’infrastructure des systèmes, l’ampleur, les obstacles à l’accessibilité des logiciels et les limites de financement). Les implications de ces résultats sont que les travailleurs canadiens de la mémoire nécessitent du temps, du personnel, du soutien et de la formation, tandis que les développeurs de logiciels d'assistance pour ce travail devraient se concentrer sur les limites des outils et donner la priorité à des interfaces conviviales. Les conditions des agences subventionnaires devraient également être révisées afin de permettre diverses options d’accès tandis que les investissements dans des dépôts à accès contrôlé permettraient un accès en ligne responsable à des collections complexes.
Mots-clés :
- préservation,
- informations sensibles,
- confidentialité,
- numérique
Veuillez télécharger l’article en PDF pour le lire.
Télécharger
Parties annexes
Bibliography
- Artefactual. (2020). Make rights actionable on digital objects. AtoM documentation (Version 2.6).
- Arroyo-Ramírez, E., Bolding, K., Butler, D., Coburn, A., Dietz, B., Farrell, J., Helms, A., Henke, K., Macquarie, C., Peltzman, S., Tyndall Watson, C., Taylor, A., Venlet, J., & Walker, P. (2020, February). Levels of born-digital access. Digital Library Federation.
- Baker, D., Butler, D., Clemens, A., Velazquez Fiddler, C., Gentry, S., Riddlesperger, L., Wachtel, J., Williams, C., & Wiser, J. (2023, December 26). An exploration of access systems: A framework for access systems for born-digital archival materials. The Digital Library Federation Born-Digital Access Working Group.
- Barrett, C. (2017, May 16). Digital forensics tools and methodologies in archival repositories [research seminar presentation]. Faculty of Computer Science, Dalhousie University.
- Caswell, M., & Cifor, M. (2016). From human rights to feminist ethics: Radical empathy in the archives. Archivaria, 81, 23-43.
- Chavez, C. (2008). Conceptualizing from the inside: Advantages, complications, and demands on insider positionality. The Qualitative Report, 13(3), 474-494.
- Cifor, M. (2016). Affecting relations: Introducing affect theory to archival discourse. Archival Science, 16(1): 7-31.
- Coghlan, D., & Brannick, T. (2005). Doing action research in your own organization (2nd ed.). SAGE.
- Dataverse Project. (2022, June 13). Dataset + file management. User guide. Dataverse.org.
- Emerson, R., Fretz, R., & Shaw, L. (2011). Writing ethnographic fieldnotes (2nd ed.). University of Chicago Press.
- Faulder, E., Annand, S., DeBauche, S., Gengerbach, M., Irwin, K., Musson, J., Peltzman, S., Tasker, K., Jackson, L. U., & Waugh, D. (2018). Digital processing framework. Cornell’s Digital Repository.
- Feldman, M., Bell, J. & Berger, M. (2003). Gaining access: A practical and theoretical guide for qualitative researchers. AltaMira Press.
- Garcia-Spitz, C., & Geraci, N. (2021). Negotiating online access: Perspectives on ethical issues in digital collections. In E. Arroyo-Ramírez, J. Jones, S. O’Neill, & H. Smith (Eds.), Radical empathy in archival practice [special issue], Journal of Critical Library and Information Studies, 3(2), 1-20.
- Goldman, B., & Pyatt, T. D. (2013). Security without obscurity: Managing personally identifiable information in born-digital archives. Library & Archival Security, 26(1-2), 37–55.
- Greene, M.A., & Meissner, D. (2005). More product, less process: Revamping traditional archival processing. American Archivist, 68(2), 208-263.
- Harris, V. (2014). Antonyms of our remembering. Archival Science, 14(3-4), 215-229.
- Hurley, G., & Shearer, K. (2019, November 29). Final report of the survey on digital preservation capacity and needs at Canadian memory institutions, 2017-18. Canadian Association of Research Libraries.
- Hutchinson, T. (2017, December 14). Protecting privacy in the archives: Preliminary explorations of topic modeling for born-digital collections [Paper presentation]. Proceedings of the 2017 IEEE International Conference on Big Data, 2251-2255.
- Hutchinson, T. (2018, December 10-13). Protecting privacy in the archives: Supervised machine learning and born-digital records [Paper presentation]. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), 2696-2701.
- Hutchinson, T. (2020). Natural language processing and machine learning as practical toolsets for archival processing. Records Management Journal, 30(2), 155–174.
- Kaczmarek, J., & West, B. (2018). Email preservation at scale: Preliminary findings supporting the use of predictive coding [Paper presentation]. iPres 2018 Proceedings.
- Kim, E. T. (2019, January 30). The Passamaquoddy reclaim their culture through digital repatriation. The New Yorker.
- Lassere, M. (2021). Translating bits: Maintaining (born-)digital heritage. Brodsky Series for Advancement of Library Conservation, Lecture 15. Syracuse University.
- Lassere, M. (2020, May 18). The archeology of maintenance: The role of information maintenance in sustaining digital archives [Plenary session]. Best Practices Exchange.
- Lassere, M., & Whyte, J. (2021). Balancing care and authenticity in digital collections: A radical empathy approach to working with disk images. Journal of Critical Library and Information Studies, 3(2), 1-25.
- Lee, C. A., & Woods, K. (2012, September 26-28). Automated redaction of private and personal data in collections. Proceedings of the Memory of the World in the Digital Age: Digitization and Preservation International Conf, 298-313.
- Lofland, L., & Lofland, J. (2006). Analyzing social settings. Wadsworth Publishing Company.
- McCracken, K., & Hogan, S.-S. (2021). Residential school community archives: Spaces of trauma and community healing. Journal of Critical Library and Information Studies, 3(2), 1-17.
- Moran, R. (2016). Indigenous people should decide on matters of access to archival information. International Journal of Circumpolar Health, 75.
- National Centre for Truth and Reconciliation. (2021, Mar 29). NCTR launches a new website and archive database.
- Office of the Privacy Commissioner of Canada (2023). Summary of privacy laws in Canada.
- Post, C., Chassanoff, A., Lee, C., Rabkin, A., Zhang, Y., Skinner, K., & Meister, S. (2019, June 2-6). Digital curation at work: modeling workflows for digital archival materials [Paper presentation]. Proceedings of the 2019 ACM/IEEE Joint Conference on Digital Libraries, 39-48.
- Ryan, G. W., & Bernard, H. R. (2003). Techniques to identify themes. Field Methods, 15(1), 85-109.
- Schneider, J., Chan, C., Edwards, G., & Hangal, S. (2017). ePADD: Computational analysis software facilitating screening, browsing, and access for historically and culturally valuable email collections. D-Lib Magazine, 23(5/6).
- Sloyan, V. (2016). Born-digital archives at the Wellcome Library: Appraisal and sensitivity review of two hard drives. Archives and Records, 37(1), 20-36.
- Stanley, L., & Wise, S. (1993). Breaking out again: Feminist ontology and epistemology (2nd rev. ed.). Routledge.
- Taylor, J. (2011). The intimate insider: Negotiating the ethics of friendship when doing insider research. Qualitative Research, 11(1), 3-22.