{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:10:37Z","timestamp":1776373837143,"version":"3.51.2"},"reference-count":12,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>There is a growing body of work investigating the needs and desires of collecting institutions as they adapt to the acquisition of born\u2010digital materials. The incorporation of digital forensics tools and techniques into digital curation workflows offers great promise for addressing the complexities bound up in ingesting and preserving digital objects at multiple levels of representation. This poster presents preliminary results from ongoing research conducted as part of the BitCurator project, a two\u2010year grant funded initiative to build, test, and analyze systems and software for incorporating digital forensics methods into collecting institutions' workflows. The project arose out of a perceived need in the library, archives, and museum (LAM) communities for better documentation, interfaces, and functionality in processing born\u2010digital archival materials.<\/jats:p>","DOI":"10.1002\/meet.14504901343","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Integrating digital forensics into born\u2010digital workflows: The BitCurator project"],"prefix":"10.1002","volume":"49","author":[{"given":"Martin","family":"Gengenbach","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Chassanoff","sequence":"additional","affiliation":[]},{"given":"Porter","family":"Olsen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"AIMS Working Group(2012).AIMS Born\u2010Digital Collections: An Inter\u2010Institutional Model for Stewardship. Retrieved from:http:\/\/wvvw2.lib.virginia.edu\/aims\/whitepaper\/AIMS_final.pdf"},{"key":"e_1_2_7_3_1","volume-title":"Taking our pulse: The OCLC Research survey of special collections and archives","author":"Dooley J. M.","year":"2010"},{"key":"e_1_2_7_4_1","first-page":"5","article-title":"Reliability and Authenticity: The Concepts and their Implications","volume":"39","author":"Duranti L.","year":"1995","journal-title":"Archivaria"},{"key":"e_1_2_7_5_1","first-page":"39","article-title":"From digital diplomatics to digital records forensics","volume":"68","author":"Duranti L.","year":"2009","journal-title":"Archivaria"},{"issue":"2","key":"e_1_2_7_6_1","article-title":"Digital records forensics: A new science and academic program for forensic readiness","volume":"5","author":"Duranti L.","year":"2010","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_2_7_7_1","unstructured":"Garfinkel S. &Cox D.(2009 February 9\u201311).Finding and archiving the internet footprint. Paper presented at the First Digital Lives Research Conference: Personal Digital Archives for the 21st Century London UK. Retrieved from:http:\/\/simson.net\/clips\/academic\/2009.BL.IntemetFootprintpdf."},{"key":"e_1_2_7_8_1","unstructured":"John J. L.(2008).Adapting existing technologies for digitally archiving personal lives: Digital forensics ancestral computing and evolutionary perspectives and tools. In Fifth International Conference on Preservation of Digital Objects London UK. Retrieved from:http:\/\/www.bl.uk\/ipres2008\/presentations_dayl\/09_John.Edf."},{"key":"e_1_2_7_9_1","volume-title":"Digital Lives \u2014 Personal Digital Archives for the 21st Century: An Initial Synthesis","author":"John J. L.","year":"2009"},{"key":"e_1_2_7_10_1","volume-title":"Digital forensics and born\u2010digital content in cultural heritage collections","author":"Kirschenbaum M.G.","year":"2010"},{"key":"e_1_2_7_11_1","volume-title":"Digital archaeology: Rescuing neglected and damaged data resources, a JISC\/NPO study within the electronic libraries (eLib) programme on the preservation of electronic materials","author":"Ross S.","year":"1999"},{"key":"e_1_2_7_12_1","unstructured":"Thibodeau K.(2002)Overview of Technological Approaches to Digital Preservation and Challenges in Coming Years. InThe State of Digital Preservation: An International Perspective 4\u201331: Council on Library and Information Resources. Retrieved from:http:\/\/www.clir.org\/pubs\/reports\/publ07\/thibodeau.html"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","unstructured":"Woods K Lee C.A. &Garfinkel S.(2011).Extending digital repository architectures to support disk image preservation and access. InProceedings of the 11th Annual International ACM\/IEEE Joint Conference on Digital Libraries(pp.57\u201366). New York NY: Association for Computing Machinery. Retrieved from:http:\/\/dx.doi.org\/10.1145\/1998076.1998088.","DOI":"10.1145\/1998076.1998088"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901343","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:32:30Z","timestamp":1760959950000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901343"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901343","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"value":"0044-7870","type":"print"},{"value":"1550-8390","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}