Digital Forensics and Born-Digital Content in Cultural Heritage Collections. CLIR Publication No. 149.

Digital Forensics and Born-Digital Content in Cultural Heritage Collections examines digital forensics and its relevance for contemporary research. The applicability of digital forensics to archivists, curators, and others working within our cultural heritage is not necessarily intuitive. When the shared interests of digital forensics and responsibilities associated with securing and maintaining our cultural legacy are identified—preservation, extraction, documentation, and interpretation, as this report details—the correspondence between these fields of study becomes logical and compelling.

[1]  Michael Sheetz Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers , 2007 .

[2]  Michael Joyce Afternoon, A Story , 1990 .

[3]  Amber Schroader,et al.  Alternate Data Storage Forensics , 2007 .

[4]  Caroline Williams,et al.  Trusting Records: Legal, Historical and Diplomatic Perspectives , 2002, J. Documentation.

[5]  Donald H. Reiman Bibliography and the sociology of texts. (The Panizzi Lectures, 1985.). D. F. McKenzie , 1990 .

[6]  Elizabeth Diamond,et al.  The Archivist as Forensic Scientist: Seeing Ourselves in a Different Way , 1994 .

[7]  Jerome McGann,et al.  The Textual Condition , 2020 .

[8]  Michelle Light,et al.  Colophons and Annotations: New Directions for the Finding Aid , 2007 .

[9]  Susan Hamburger,et al.  The State of Digital Preservation: An International Perspective , 2003 .

[10]  Abhi Shelat,et al.  Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..

[11]  D. P. Bergeron,et al.  Dark Ages II: When the Digital Data Die , 2001 .

[12]  D. Greetham,et al.  The Pleasures of Contamination: Evidence, Text, and Voice in Textual Studies , 2010 .

[13]  Viktor Mayer-Schönberger,et al.  Delete: The Virtue of Forgetting in the Digital Age , 2009 .

[14]  Abraham Silberschatz,et al.  Operating System Concepts , 1983 .

[15]  Allyson Mower Working Together or Apart: Promoting the Next Generation of Digital Scholarship (review) , 2009 .

[16]  Matthew G. Kirschenbaum,et al.  Approaches to Managing and Collecting Born-Digital Literary Materials for Scholarly Use , 2009 .

[17]  Jack Wiles,et al.  The Best Damn Cybercrime and Digital Forensics Book Period , 2007 .

[18]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[19]  Steve Bunting,et al.  EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide , 2006 .

[20]  Brian D. Carrier,et al.  File System Forensic Analysis , 2005 .

[21]  George Eckel Inside Windows NT , 1993 .

[22]  Gary C. Kessler,et al.  Computer Forensics: Principles and Practices , 2006 .

[23]  Catherine C. Marshall,et al.  From writing and analysis to the repository: taking the scholars' perspective on scholarly archiving , 2008, JCDL '08.

[24]  Matthew G. Kirschenbaum,et al.  Mechanisms: New Media and the Forensic Imagination , 2007 .

[25]  Robert Slade Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .

[26]  Hal Abelson,et al.  Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion , 2008 .

[27]  Mark Pollitt,et al.  Advances in Digital Forensics , 2006 .

[28]  Michael A. Caloyannides Computer Forensics and Privacy , 2001 .

[29]  D. Levy Scrolling Forward: Making Sense of Documents in the Digital Age , 2001 .

[30]  Jerome P. McDonough,et al.  Preserving Virtual Worlds Final Report , 2010 .

[31]  Eleanor Lawrence,et al.  Future in the past , 1975, Nature.

[32]  R. Jones,et al.  Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 2003, Int. J. Law Inf. Technol..

[33]  Wally Wang,et al.  Steal This Computer Book: What They Won't Tell you About the Internet , 1998 .

[34]  D. Bearman Electronic Evidence: Strategies for Managing Records in Contemporary Organizations , 1994 .

[35]  D. Rubinfeld Sustainable Economics for a Digital Planet: Ensuring Long-term Access to Digital Information , 2010 .

[36]  John M. Silvester,et al.  The Social Life of Information: Brown, J.S., & Duguid, P. (2000). Cambridge, MA: Harvard Business School Publishing. ISBN 0-87584-762-5. 320 pages , 2000, Internet High. Educ..

[37]  Seamus Ross,et al.  The Data Audit Framework: a toolkit to identify research assets and improve data management in research led institutions , 2008, iPRES.

[38]  Clifford Stoll,et al.  The Cuckoo's Egg , 1989 .

[39]  Peter Gutmann,et al.  Secure deletion of data from magnetic and solid-state memory , 1996 .

[40]  Chris Davis,et al.  Hacking Exposed Computer Forensics: Secrets & Solutions , 2004 .

[41]  Sarah Higgins PREMIS Data Dictionary for Preservation Metadata , 2009 .

[42]  Elizabeth Shepherd Electronic Records in the Manuscript Repository , 2010, J. Assoc. Inf. Sci. Technol..

[43]  Seamus Ross,et al.  Digital Archaeology: Rescuing Neglected and Damaged Data Resources: A JISC/NPO Study within the Electronic Libraries (eLib) Programme on the Preservation of Electronic Materials , 1999 .

[44]  Albert Marcella,et al.  Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .

[45]  Mark A. Greene,et al.  More Product, Less Process: Revamping Traditional Archival Processing , 2007 .

[46]  Joe Nickell,et al.  Crime Science: Methods of Forensic Detection , 1998 .

[47]  Charles Petzold Code: The Hidden Language of Computer Hardware and Software , 1999 .

[48]  Bram Lohman,et al.  Emulation for digital preservation in practice: the results , 2007, iPRES.

[49]  Frederick R. Byers Care and handling of CDs and DVDs: A guide for librarians and archivists , 2003 .

[50]  John R. Garrett,et al.  Avoiding Technological Quicksand : Finding a Viable Technical Foundation for Digital Preservation , 2009 .

[51]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[52]  Luciana Duranti,et al.  Diplomatics: New Uses for an Old Science , 1998 .

[53]  L. Duranti From Digital Diplomatics to Digital Records Forensics , 2010 .

[54]  John Garrett,et al.  Preserving Digital Information. Report of the Task Force on Archiving of Digital Information. , 1996 .

[55]  Christine A. Finn Artifacts : an archaeologist's year in Silicon Valley , 2001 .

[56]  Catherine C. Marshall,et al.  Rethinking Personal Digital Archiving, Part 2: Implications for Services, Applications, and Institutions , 2008, D Lib Mag..

[57]  Miriam B. Kahn Disaster Response and Planning for Libraries 3rd ed. , 2012 .

[58]  Priscilla Finley,et al.  A Better Pencil: Readers, Writers, and the Digital Revolution , 2010 .

[59]  W. Noyes United Nations Educational, Scientific and Cultural Organization , 1946, International Organization.

[60]  Craig S. Wright,et al.  Overwriting Hard Drive Data: The Great Wiping Controversy , 2008, ICISS.

[61]  W. Daniel Hillis,et al.  The Pattern on the Stone: The Simple Ideas That Make Computers Work , 1999 .

[62]  Seamus Ross,et al.  Bringing Self-assessment Home: Repository Profiling and Key Lines of Enquiry within DRAMBORA , 2008, Int. J. Digit. Curation.

[63]  William Bradley Glisson Use of computer forensics in the digital curation of removable media , 2009 .

[64]  Carolyn Steedman,et al.  Dust: The Archive and Cultural History , 2001 .

[65]  Heather MacNeil,et al.  Trusting Records: Legal, Historical and Diplomatic Perspectives , 2000 .

[66]  F. Gerald Ham,et al.  Selecting and Appraising Archives and Manuscripts , 1993 .

[67]  Keith J. Jones,et al.  Real Digital Forensics: Computer Security and Incident Response , 2005 .

[68]  B. H. Leneyr Authenticity in a Digital Environment , 2012 .

[69]  Bill Nelson,et al.  Guide to Computer Forensics and Investigations , 2003 .

[70]  William Von Hagen Linux Filesystems , 2002 .

[71]  Catherine C. Marshall,et al.  Rethinking Personal Digital Archiving, Part 1: Four Challenges from the Field , 2008, D Lib Mag..

[72]  Ordway Hilton,et al.  Scientific Examination Of Questioned Documents , 1992 .

[73]  Dan Farmer,et al.  Forensic Discovery , 2004 .