Advanced Customisation
Using Advanced customisation, you can modify the underlying Bayesian Network for your model by changing the probability tables for any of the nodes in it. Most importantly it gives you control over the nodes for which you do not provide data when you answer the questions in the simple Create a model process. These nodes are conditional on the earlier nodes, so you will see multiple entries in the tables. Some may not be relevant depending how you have set nodes higher in the network. For example, if your archive holds 100% Born Digital material then changing rows in tables for the nodes descending which relate to Digitised and Surrogate material will have no effect on the final risk scores for your model.
Edit nodes
Flow diagram of the DiAGRAM Bayesian network
The diagram shows the nodes of the Bayesian network and how probabilities flow through network from the root nodes downwards, finally outputting scores for renderability and intellectual control
VBackground-1
Solid
Page-1
Sheet.1
Digital Object
Digital Object
Sheet.2
Operating Environment
Operating Environment
Sheet.7
Technical Skills
Technical Skills
Sheet.8
File Format
File Format
Dynamic connector.11
Sheet.12
Information Management
Information Management
Sheet.15
System Security
System Security
Sheet.16
Checksum
Checksum
Sheet.6
Storage Medium
Storage Medium
Sheet.5
Physical Disaster
Physical Disaster
Sheet.4
Replication and Refreshment
Replication and Refreshment
Sheet.17
Storage Life
Storage Life
Dynamic connector
Dynamic connector.19
Dynamic connector.20
Sheet.21
Obsolescence
Obsolescence
Dynamic connector.22
Sheet.24
Tools to Render
Tools to Render
Dynamic connector.26
Dynamic connector.27
Dynamic connector.28
Dynamic connector.29
Sheet.30
Content Metadata
Content Metadata
Sheet.31
Conditions of Use
Conditions of Use
Sheet.32
Integrity
Integrity
Sheet.33
Identity
Identity
Dynamic connector.34
Dynamic connector.35
Dynamic connector.36
Dynamic connector.37
Dynamic connector.38
Dynamic connector.39
Dynamic connector.40
Sheet.44
Renderability
Renderability
Sheet.45
Intellectual Control
Intellectual Control
Sheet.46
Bit Preservation
Bit Preservation
Sheet.47
Technical Metadata
Technical Metadata
Dynamic connector.48
Dynamic connector.49
Dynamic connector.50
Dynamic connector.51
Dynamic connector.52
Dynamic connector.53
Dynamic connector.54
Dynamic connector.56
Dynamic connector.57
Node relationships
The image describes the relationships between the nodes that make up the dependency structure of Bayesian network model. The nodes in the diagram of the model are arranged into five rows, the first being the inputs, the last being the outputs.
The first row includes the following nodes, each of which relates to the input questions of the create a model process.
Each node has one or more child nodes and subsequent grandchild nodes, the relationship of which describes the conditional probability structure of the model.
Operating Environment, your archive's policy on the storage location of your digital material
(child: Storage Life).
Replication and Refreshment, your archive's policies on making copies and regularly moving digital material on to newer versions of the storage media
(child: Storage Life).
Physical Disaster, the risk of a flood at your archive's primary storage location. For this first version of the tool, we will only consider a flood as a physical disaster
(child: Storage Life).
Storage Medium, the type of media on which your digital material is stored such as USB hard drives, CDs or the Cloud
(children: Storage Life, Obsolescence).
Technical Skills, bespoke digital preservation skills such as awareness of technological trends, detailed knowledge of storage media, hardware and software, skills to perform file format migration, skills to find emulating software etc?
(children: Obsolescence, Tools to Render, Technical Metadata).
Digital Object, the proportion of your archive made up of born-digital, digitised and surrogate files
(children: File Format, Conditions of Use, Content Metadata).
Information Management, internal systems and support for coherent information management and documentation of preservation actions. This is needed to ensure integrity and provenance of the digital object
(children: Integrity, Identity).
System Security, a secure system can protect data from deletion or modification from any unauthorized party, and it ensures that when an authorized person makes a change that should not have been made, the damage can be reversed. Definition from Forcepoint
(child: Integrity).
Checksum, a unique numerical signature derived from a file that can be used to compare copies (definition from the DPC handbook.). A checksum is needed to ensure integrity of the digital object
(child: Integrity).
The second row contains just one node: File Format. A file format is a standard way that information is encoded for storage in a computer file. It tells the computer how to display, print, and process, and save the information. It is dictated by the application program which created the file, and the operating system under which it was created and stored (definition from Wikipedia). The file format can be described as ubiquitous if it is widely known and used by non-specialists. If the file format is not proprietary, it can be described as open. The availability of tools and software to render a digital object depends on the file format
(
parent: Digital Object;
child: Tools to Render
).
The third row contains seven nodes:
Storage Life, the length of time for which the physical storage device is expected to store the digital object's bit stream. The end of storage life can be described as the point at which you can no longer store or retrieve data due to hardware defects or malfunction
(
parents: Operating Environment, Replication and Refreshment, Physical Disaster, Storage Medium;
child: Bit Preservation
).
Obsolescence, essential equipment, hardware or software required to access the bit stream becoming out of date or unusable. For example, hardware no longer being produced or essential software to access the media no longer supported
(
parents: Storage Medium, Technical Skills;
child: Bit Preservation
).
Tools to Render, availability of tools and software to render the digital material and the expertise to use them
(
parent: Technical Skills;
child: Renderability
).
Technical Metadata, technical information that describes how a file functions and that enables a computer to understand it at the bit level, so that it can be rendered in a way that is faithful to its original content. Definition adapted from NEDCC - Fundamentals of AV Preservation - Chapter 4
(
parent: Technical Skills;
child: Renderability
).
Conditions of Use, knowing of the conditions of use and any restrictions on the digital material, including the legal status, copyright, who owns the intellectual property and Freedom of Information restrictions
(
parent: Digital Object;
child: Intellectual Control
).
Content Metadata, describes the intellectual entity through properties such as author and title, and supports discovery and delivery of digital content. It may also provide an historic context, by, for example, specifying which print-based material was the original source for a digital derivative (source provenance). It also includes provenance information of who has cared for the digital object and what preservation actions have been performed on it. This definition is adapted from the Digital Preservation Metadata Standards publication
(
parent: Digital Object;
child: Identity
).
Integrity, the assurance that the bit-stream is identical to when it was added to the archive
(
parents: Information Management, System Security, Checksum;
child: Bit Preservation
).
The fourth row contains just two nodes.
Bit Preservation, a term used to describe a very basic level of preservation of digital resource files as they were received from the depositor (literally preservation of the bits forming that form a digital resource). Activities may include maintaining onsite and offsite backup copies, virus checking, fixity-checking, and periodic refreshment to new storage media
(
parents: Storage Life, Obsolescence, Integrity;
child: Renderability
).
Identity, knowing what the material is and where it is from. Specifically… Can you locate the file? Is it sufficiently described for you to know this is what you want? Can you understand its context within the archive? Can you find other versions of the file which were created by preservation actions? Can you find the provenance of the file?
(
parents: Information Management, Content Metadata;
child: Intellectual Control
).
The fifth and final row of the network diagram contains two nodes, the outputs of the model.
Renderability, the object is a sufficiently useful representation of the original file
(
parents: Tools to Render, Technical Metadata, Bit Preservation
).
Intellectual Control, having full knowledge of the material content, provenance and conditions of use
(
parents: Conditions of Use, Identity
).
Select a node above or from the dropdown to edit it below.
Node:
None
Operating Environment
Replication and Refreshment
Physical Disaster
Storage Medium
Technical Skills
Digital Object
Information Management
System Security
Checksum
File Format
Storage Life
Obsolescence
Tools to Render
Technical Metadata
Conditions of Use
Content Metadata
Integrity
Bit Preservation
Identity
Log of changes
No nodes have been changed.
What next?
Results This will show you the probability (as a percentage) of having adequate intellectual control and the renderability of your digital records.
Create another advanced model If you want to create another advanced model this link will take you back to the start of this process.