{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:52:32Z","timestamp":1754157152270,"version":"3.41.2"},"reference-count":23,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2010,11,23]],"date-time":"2010-11-23T00:00:00Z","timestamp":1290470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>In this increasingly digital world, archivists have had to reconsider early definitions and measures of authenticity in order to ensure their applicability to the process of preserving digital records. This paper sets out to explore the complexities involved in defining and preserving the authenticity of digital files.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper draws on literature from the field to present a comprehensive overview of traditional definitions of authenticity and highlight the shifting nature of those definitions in the digital age. The discussion begins with a look at traditional archival understandings of authenticity as they relate to physical objects. The paper goes on to examine these challenges and efforts and includes a look at the resource demands and technology tools currently used to evaluate digital authenticity. The paper conducted extensive research on the subject to compile source materials and draw conclusions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>This paper highlights the inherent challenge of establishing and maintaining pertinent criteria for authenticity when archivists are, for the most part, electing to reformat and effectively change digital records in order to ensure their long\u2010term preservation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>This paper includes practical implications for redefining, measuring, and preserving the authenticity of digital records.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>This paper has social implications in that it asserts a need to question the well\u2010established understanding of what it means to be authentic.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper brings together a range of information and presents a comprehensive yet succinct view of the issues involved in defining and preserving digital authenticity, not otherwise found in the literature serving the archive community.<\/jats:p><\/jats:sec>","DOI":"10.1108\/07378831011096259","type":"journal-article","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T07:01:42Z","timestamp":1290841302000},"page":"595-604","source":"Crossref","is-referenced-by-count":3,"title":["Preserving authenticity in the digital age"],"prefix":"10.1108","volume":"28","author":[{"given":"Sharon","family":"Adam","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2021010421444109200_b1","unstructured":"American Bar Association (n.d.), Digital Signature Guidelines Tutorial, American Bar Association, Chicago, IL, available at: www.abanet.org\/scitech\/ec\/isc\/dsg\u2010tutorial.html (accessed November 27, 2009)."},{"key":"key2021010421444109200_b2","unstructured":"Conway, P. (2007), Preservation Leaflet: The Relevance of Preservation in a Digital World, Northeast Document Conservation Center, Andover, MA, available at: www.nedcc.org\/resources\/leaflets\/6Reformatting\/04Relevance OfPreservation.php (access September 15, 2009)."},{"key":"key2021010421444109200_b3","unstructured":"Duranti, L. (1998), \u201cDiplomatics: new uses for an old science, part 1\u201d, Archivaria, Vol. 28, pp. 7\u201027, available at: http:\/\/journals.sfu.ca\/archivar\/index.php\/archivaria\/issue\/view\/387\/showToc (accessed December 1, 2009)."},{"key":"key2021010421444109200_b4","unstructured":"Garrett, J. and Waters, D. (1996), \u201cPreserving digital information: report of the task force on archiving of digital information\u201d, The Commission on Preservation and Access and the Research Libraries Group, available at: www.clir.org\/pubs\/reports\/pub63watersgarrett.pdf (accessed November 20, 2009)."},{"key":"key2021010421444109200_b5","doi-asserted-by":"crossref","unstructured":"Gladney, H.M. and Bennett, J.L. (2003), \u201cWhat do we mean by authentic? What's the real McCoy?\u201d, D\u2010Lib Magazine, Vol. 9 Nos 7\/8, available at: www.dlib.org\/dlib\/july03\/gladney\/07gladney.html (accessed September 24, 2009).","DOI":"10.1045\/july2003-gladney"},{"key":"key2021010421444109200_b6","unstructured":"Hedstrom, M. (1998), \u201cDigital preservation: a time bomb for digital libraries\u201d, Computers and the Humanities, Vol. 31, pp. 189\u2010202, available at: http:\/\/deepblue.lib.umich.edu\/bitstream\/2027.42\/42573\/1\/10579_2004_Article_153071.pdf (accessed September 22, 2009)."},{"key":"key2021010421444109200_b7","unstructured":"Hunter, G.S. (2003), Developing and Maintaining Practical Archives, Neal\u2010Schuman Publishers, New York, NY."},{"key":"key2021010421444109200_b8","unstructured":"InterPARES (n.d.), Project Overview, available at: www.interpares.org\/ (accessed November 21, 2009)."},{"key":"key2021010421444109200_b9","unstructured":"InterPARES (2005), The Long\u2010term Preservation of Authentic Electronic Records: Findings of the InterPARES Project, Archilab, San Miniato."},{"key":"key2021010421444109200_b11","unstructured":"JHOVE (n.d.), JHOVE \u2013 JSTOR\/Harvard Object Validation Environment, available at: http:\/\/hul.harvard.edu\/jhove\/ (accessed November 30, 2009)."},{"key":"key2021010421444109200_b10","unstructured":"JISC (2006), Digital Preservation: Continued Access to Authentic Digital Assets, available at: www.jisc.ac.uk\/publications\/documents\/pub_digipreservationbp.aspx (accessed October 1, 2009)."},{"key":"key2021010421444109200_b12","unstructured":"Lynch, C.A. (1994), \u201cThe integrity of digital information: mechanics and definitional issues\u201d, Journal of the American Society for Information Science, Vol. 45 No. 10, pp. 737\u201044, available at: the Library Literature and Information Science Full Text database (accessed November 15, 2009)."},{"key":"key2021010421444109200_b13","doi-asserted-by":"crossref","unstructured":"MacNeil, H. and Mak, B. (2007), \u201cConstructions of authenticity\u201d, Library Trends, Vol. 56 No. 1, pp. 26\u201052, available at: the Library Literature and Information Science Full Text database (accessed November 13, 2009).","DOI":"10.1353\/lib.2007.0054"},{"key":"key2021010421444109200_b14","doi-asserted-by":"crossref","unstructured":"McRanor, S. (1996), \u201cA critical analysis of intrinsic value\u201d, The American Archivist, Vol. 59 No. 4, pp. 400\u201011, available at: the Library Literature and Information Science Full Text database (accessed December 1, 2009).","DOI":"10.17723\/aarc.59.4.hw1x8758l1u11671"},{"key":"key2021010421444109200_b15","unstructured":"Pearce\u2010Moses, R. (2005), \u201cA glossary of archival and records terminology\u201d, Society of American Archivists, available at: www.archivists.org\/glossary\/list.asp (accessed November 20, 2009)."},{"key":"key2021010421444109200_b16","unstructured":"PREMIS Editorial Committee (2008), Introduction and Supporting Materials from PREMIS Data Dictionary for Preservation Metadata, Library of Congress, Washington, DC, available at: www.loc.gov\/standards\/premis\/v2\/premis\u2010report\u20102\u20100.pdf (accessed November 29, 2009)."},{"key":"key2021010421444109200_b19","unstructured":"Rosenthal, D.S.H. (2010), \u201cLOCKSS: lots of copies keep stuff safe\u201d, paper presented at the National Institute of Standards and Technology Digital Preservation Interoperability Framework Workshop, Gaithersburg, MD, March, available at: http:\/\/lockss.stanford.edu\/locksswiki\/files\/NIST2010.pdf (accessed August 18, 2010)."},{"key":"key2021010421444109200_b17","doi-asserted-by":"crossref","unstructured":"Rothenberg, J. (1995), \u201cEnsuring the longevity of digital documents\u201d, Scientific American, Vol. 272 No. 1, pp. 42\u20107, available at: www.clir.org\/pubs\/archives\/ensuring.pdf (accessed September 22, 2009).","DOI":"10.1038\/scientificamerican0195-42"},{"key":"key2021010421444109200_b18","unstructured":"Rothenberg, J. (2000), \u201cUsing emulation to preserve digital documents\u201d, RAND\u2010Europe & Koninklijke Bibliotheek, available at: www.kb.nl\/pr\/publ\/usingemulation.pdf (accessed November 15, 2009)."},{"key":"key2021010421444109200_b20","doi-asserted-by":"crossref","unstructured":"Shoeb, M.Z.H. (2009), \u201cAccess management for digital repository\u201d, DESIDOC Journal of Library & Information Technology, Vol. 29 No. 4, pp. 21\u20107, available at: the Library Literature and Information Science Full Text database (accessed November 22, 2009).","DOI":"10.14429\/djlit.29.257"},{"key":"key2021010421444109200_b21","unstructured":"Smith, A. (1999), Why Digitize? Council on Library and Information Resources, available at: www.clir.org\/pubs\/reports\/pub80\u2010smith\/pub80.html (accessed October 25, 2009)."},{"key":"key2021010421444109200_b22","unstructured":"Thibodeau, K. (2002), \u201cOverview of technological approaches to digital preservation and challenges in coming years\u201d, Proceedings of the State of Digital Preservation: an International Perspective, Washington, DC, available at: www.clir.org\/PUBS\/reports\/pub107\/thibodeau.html (accessed September 22, 2009)."},{"key":"key2021010421444109200_b23","unstructured":"VeriSign, Inc. (2007), How to Best Secure Electronic Documents with Certified Digital Signatures, available at: www.verisign.com\/static\/DEV040008.pdf (accessed November 30, 2009)."}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/07378831011096259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831011096259\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831011096259\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:33:46Z","timestamp":1753400026000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/28\/4\/595-604\/261725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,23]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11,23]]}},"alternative-id":["10.1108\/07378831011096259"],"URL":"https:\/\/doi.org\/10.1108\/07378831011096259","relation":{},"ISSN":["0737-8831"],"issn-type":[{"type":"print","value":"0737-8831"}],"subject":[],"published":{"date-parts":[[2010,11,23]]}}}