{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:37:39Z","timestamp":1754156259178,"version":"3.41.2"},"reference-count":65,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2023,5,31]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This article explores the tension between the concept of a Designated Community (DC) as a foundational element in Trustworthy Digital Repository (TDR) certification and curators' uncertainty about how to interpret and apply this concept in practice.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This research employs a qualitative research design involving in-depth semi-structured interviews with stakeholders in the Trustworthy Digital Repository Audit and Certification (TRAC) process.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors' findings indicate that stakeholders in the audit and certification process viewed their uncertainty about how to apply the concept of a DC in the context of an audit as a source of risk for digital repositories and the repositories' collections.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This article brings new insights to digital preservation by applying social theories of risk to trustworthy digital repository audit and certification processes, with an emphasis on the concept of DC.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-07-2022-0161","type":"journal-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T09:41:45Z","timestamp":1669110105000},"page":"880-897","source":"Crossref","is-referenced-by-count":3,"title":["Designated Community: uncertainty and risk"],"prefix":"10.1108","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2064-5140","authenticated-orcid":false,"given":"Rebecca D.","family":"Frank","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7525-0635","authenticated-orcid":false,"given":"Laura","family":"Rothfritz","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,11,23]]},"reference":[{"issue":"3","key":"key2023053001435313600_ref001","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10502-021-09360-5","article-title":"Tacit attitudinal principles for evaluating digital preservation success","volume":"21","year":"2021","journal-title":"Archival Science"},{"issue":"4","key":"key2023053001435313600_ref002","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10502-015-9257-1","article-title":"Trusted by whom? TDRs, standards culture and the nature of trust","volume":"16","year":"2016","journal-title":"Archival Science"},{"issue":"2","key":"key2023053001435313600_ref003","doi-asserted-by":"publisher","first-page":"110","DOI":"10.2218\/ijdc.v10i2.346","article-title":"Scientific knowledge mobilization: co-evolution of data products and designated communities","volume":"10","year":"2015","journal-title":"International Journal of Digital Curation"},{"issue":"4","key":"key2023053001435313600_ref004","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1111\/j.1467-7717.2009.01104.x","article-title":"The politics of risk in the Philippines: comparing state and NGO perceptions of disaster management","volume":"33","year":"2009","journal-title":"Disasters"},{"issue":"1","key":"key2023053001435313600_ref005","doi-asserted-by":"publisher","first-page":"4","DOI":"10.2218\/ijdc.v5i1.140","article-title":"Designing digital preservation solutions: a risk management-based approach","volume":"5","year":"2010","journal-title":"International Journal of Digital Curation"},{"edition":"2nd ed.","volume-title":"Social Research Methods: Qualitative and Quantitative Approaches","year":"2013","key":"key2023053001435313600_ref006"},{"issue":"1","key":"key2023053001435313600_ref007","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2016.14505301038","article-title":"The power of imaginary users: designated communities in the OAIS reference model","volume":"53","year":"2016","journal-title":"Proceedings of the Association for Information Science and Technology"},{"key":"key2023053001435313600_ref008","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2016.14505301046","article-title":"Data curation profiling of biocollections","year":"2016"},{"key":"key2023053001435313600_ref009","doi-asserted-by":"crossref","unstructured":"Bountouri, L., Gratz, P. and Sanmartin, F. (2018), \u201cDigital preservation: how to Be trustworthy\u201d, in Ioannides, M. (Ed.), Digital Cultural Heritage, Springer, Cham, Vol.\u00a010605, pp.\u00a0364-374.","DOI":"10.1007\/978-3-319-75826-8_29"},{"issue":"1","key":"key2023053001435313600_ref010","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5334\/dsj-2020-023","article-title":"Alter-value in data reuse: non-designated communities and creative processes","volume":"19","year":"2020","journal-title":"Data Science Journal"},{"key":"key2023053001435313600_ref011","doi-asserted-by":"crossref","unstructured":"Burgess, A. (2015), \u201cSocial construction of risk\u201d, in Cho, H., Reimer, T. and McComas, K. (Eds), The Sage Handbook of Risk Communication, SAGE Publications, Thousand Oaks, CA, pp.\u00a056-68.","DOI":"10.4135\/9781483387918.n9"},{"journal-title":"CRL Certification Report on Portico Audit Findings","year":"2010","author":"Center for Research Libraries","key":"key2023053001435313600_ref012"},{"journal-title":"CRL Certification Report on the HathiTrust Digital Repository","year":"2011","author":"Center for Research Libraries","key":"key2023053001435313600_ref013"},{"journal-title":"CRL Certification Report on Chronopolis Audit Findings","year":"2012","author":"Center for Research Libraries","key":"key2023053001435313600_ref014"},{"journal-title":"CRL Certification Report on Scholars Portal Audit Findings","year":"2013","author":"Center for Research Libraries","key":"key2023053001435313600_ref015"},{"article-title":"CRL Certification Report on CLOCKSS Audit Findings, Center for Research Libraries, available at","year":"2014","author":"Center for Research Libraries","key":"key2023053001435313600_ref016"},{"journal-title":"CRL Certification Report on the Canadiana.Org Digital Repository","year":"2015","author":"Center for Research Libraries","key":"key2023053001435313600_ref017"},{"journal-title":"2018 Updated Certification Report on CLOCKSS","year":"2018","author":"Center for Research Libraries","key":"key2023053001435313600_ref018"},{"volume-title":"Final Report and Recommendations of the Data Rescue Project at the National Agricultural Library","year":"2020","key":"key2023053001435313600_ref019"},{"key":"key2023053001435313600_ref020","article-title":"CLOCKSS archive certified as trusted digital repository; garners top score in technologies","author":"CLOCKSS","year":"2014","journal-title":"CLOCKSS News"},{"volume-title":"Audit and Certification of Trustworthy Digital Repositories","year":"2011","author":"Consultative Committee for Space Data Systems","key":"key2023053001435313600_ref021"},{"volume-title":"Reference Model for an Open Archival Information System (OAIS)","year":"2012","author":"Consultative Committee for Space Data Systems","key":"key2023053001435313600_ref022"},{"key":"key2023053001435313600_ref023","unstructured":"CoreTrustSeal Standards and Certification Board (2019), \u201cCoreTrustSeal trustworthy data repositories requirements 2020-2022 (v02.00-2020-2022)\u201d, Zenodo, doi: 10.5281\/ZENODO.3638211."},{"issue":"2","key":"key2023053001435313600_ref024","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1086\/268657","article-title":"Generalization of Scott\u2019s index of intercoder agreement","volume":"45","year":"1981","journal-title":"Public Opinion Quarterly"},{"issue":"12","key":"key2023053001435313600_ref025","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0242525","article-title":"Certification information on trustworthy digital repository websites: a content analysis","volume":"15","year":"2020","journal-title":"PLoS ONE"},{"issue":"6","key":"key2023053001435313600_ref026","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1108\/JD-10-2019-0204","article-title":"Data managers\u2019 perspectives on OAIS designated communities and the FAIR principles: mediation, tools and conceptual models","volume":"76","year":"2020","journal-title":"Journal of Documentation"},{"issue":"2","key":"key2023053001435313600_ref027","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/15332748.2011.590744","article-title":"Measuring trust: standards for trusted digital repositories","volume":"9","year":"2011","journal-title":"Journal of Archival Organization"},{"key":"key2023053001435313600_ref028","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5334\/dsj-2017-022","article-title":"Developing criteria to establish trusted digital repositories","volume":"16","year":"2017","journal-title":"Data Science Journal"},{"year":"2018","key":"key2023053001435313600_ref065","article-title":"The social construction of risk in trustworthy digital repository audit and certification"},{"issue":"4","key":"key2023053001435313600_ref029","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1002\/asi.24247","article-title":"The social construction of risk in digital preservation","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"key2023053001435313600_ref030","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10502-021-09366-z","article-title":"Risk in trustworthy digital repository audit and certification","volume":"22","year":"2022","journal-title":"Archival Science"},{"volume-title":"Advanced Digital Preservation","year":"2011","key":"key2023053001435313600_ref031","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16809-3"},{"year":"2011","key":"key2023053001435313600_ref032","article-title":"Audit and certification process for digital repositories"},{"key":"key2023053001435313600_ref033","doi-asserted-by":"crossref","unstructured":"Gubrium, J.F. and Holstein, J.A. (Eds), (2001), Handbook of Interview Research, SAGE Publications, Thousand Oaks, CA, available at: https:\/\/dx.doi.org\/10.4135\/9781412973588 (accessed 17 May 2016).","DOI":"10.4135\/9781412973588"},{"key":"key2023053001435313600_ref034","unstructured":"Hilgartner, S. (1992), \u201cThe social construction of risk objects\u201d, in Short, J.F. Jr and Clarke, L. (Eds), Organizations, Uncertainties, and Risk, Westview Press, Boulder, CO, pp. 39-53."},{"journal-title":"Recommended versus Certified Repositories: Mind the Gap","year":"2017","key":"key2023053001435313600_ref035"},{"key":"key2023053001435313600_ref036","article-title":"Risk management - guidelines, standard No. ISO 31000:2018","author":"International Organization for Standardization Technical Committee","year":"2018","journal-title":"International Organization for Standardization"},{"issue":"2","key":"key2023053001435313600_ref037","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1080\/23257962.2014.942606","article-title":"Digital preservation and knowledge in the public archives: for whom?","volume":"35","year":"2014","journal-title":"Archives and Records"},{"issue":"1","key":"key2023053001435313600_ref038","doi-asserted-by":"publisher","first-page":"184","DOI":"10.2218\/ijdc.v10i1.360","article-title":"\u2018Designated Communities\u2019: through the lens of the web","volume":"10","year":"2015","journal-title":"International Journal of Digital Curation"},{"first-page":"87","article-title":"Becoming a certified trustworthy digital repository: the Portico experience","year":"2010","key":"key2023053001435313600_ref039"},{"issue":"2-3","key":"key2023053001435313600_ref040","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1177\/0170840608101478","article-title":"Moving beyond normal accidents and high reliability organizations: a systems approach to safety in complex systems","volume":"30","year":"2009","journal-title":"Organization Studies"},{"volume-title":"Characterization of Designated Communities of Geospatial Legacy Information and Their Application in Appraisal and Digital Preservation Decisions: A Case Study, Dissertation","year":"2017","key":"key2023053001435313600_ref041"},{"year":"2012","key":"key2023053001435313600_ref042","article-title":"A model for digital preservation repository risk relationships"},{"volume-title":"Inside Open Government Data Curation: Exploring Challenges to the Concept of a 'Designated Community' through a Case Study of the City of Toronto, Thesis","year":"2019","key":"key2023053001435313600_ref043"},{"issue":"3","key":"key2023053001435313600_ref044","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1108\/JD-02-2021-0041","article-title":"Preservation for diverse users: digital preservation and the \u2018Designated Community\u2019 at the Ontario Jewish Archives","volume":"78","year":"2022","journal-title":"Journal of Documentation"},{"issue":"1","key":"key2023053001435313600_ref045","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1146\/annurev.pu.10.050189.000523","article-title":"Communicating technological risk: the social construction of risk perception","volume":"10","year":"1989","journal-title":"Annual Review of Public Health, Annual Reviews"},{"journal-title":"Explanatory Notes on the Nestor Seal for Trustworthy Digital Archives","year":"2013","author":"nestor Certification Working Group","key":"key2023053001435313600_ref046"},{"journal-title":"Nestor Criteria: Catalogue of Criteria for Trusted Digital Repositories, Version 2","year":"2009","author":"nestor Working Group Trusted Repositories - Certification","key":"key2023053001435313600_ref047"},{"key":"key2023053001435313600_ref048","doi-asserted-by":"publisher","first-page":"31","DOI":"10.2481\/dsj.4.31","article-title":"Designating user communities for scientific data: challenges and solutions","volume":"4","year":"2006","journal-title":"Data Science Journal"},{"volume-title":"Normal Accidents: Living with High-Risk Technologies","year":"1999","key":"key2023053001435313600_ref050"},{"first-page":"291","volume-title":"UNT Libraries: TRAC Conformance Document","year":"2015","key":"key2023053001435313600_ref051"},{"key":"key2023053001435313600_ref052","doi-asserted-by":"crossref","unstructured":"Reilly, B.F. Jr and Waltz, M.E. (2013), \u201cTrustworthy data repositories: the value and benefits of auditing and certification\u201d, in Ray, J.M. (Ed.), Research Data Management : Practical Strategies for Information Professionals, Purdue University Press, Ashland, OH, pp.\u00a0109-126.","DOI":"10.2307\/j.ctt6wq34t.8"},{"key":"key2023053001435313600_ref053","unstructured":"RLG-NARA Digital Repository Certification Task Force (2007), Trustworthy Repositories Audit and Certification: Criteria and Checklist, Version 1.0, available at: http:\/\/www.crl.edu\/sites\/default\/files\/attachments\/pages\/trac_0.pdf (accessed 19 July 2014)."},{"key":"key2023053001435313600_ref054","unstructured":"Royal Society (Great Britain) and Study Group on Risk (1983), Risk Assessment: Report of a Royal Society Study Group, Royal Society, London."},{"volume-title":"Managing Information Risks: Threats, Vulnerabilities, and Responses","year":"2020","key":"key2023053001435313600_ref055"},{"issue":"3","key":"key2023053001435313600_ref056","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1086\/266577","article-title":"Reliability of content analysis: the case of nominal scale coding","volume":"19","year":"1955","journal-title":"Public Opinion Quarterly"},{"volume-title":"The Signal and the Noise: Why So Many Predictions Fail--But Some Don't","year":"2012","key":"key2023053001435313600_ref057"},{"issue":"4799","key":"key2023053001435313600_ref049","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1126\/science.3563507","article-title":"Perception of risk","volume":"236","year":"1987","journal-title":"Science, American Association for the Advancement of Science"},{"issue":"1","key":"key2023053001435313600_ref058","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/1539-6924.00285","article-title":"The precautionary principle versus risk analysis","volume":"23","year":"2003","journal-title":"Risk Analysis"},{"volume-title":"Thinking about Answers: the Application of Cognitive Processes to Survey Methodology","year":"1996","key":"key2023053001435313600_ref059"},{"key":"key2023053001435313600_ref060","doi-asserted-by":"crossref","unstructured":"Tversky, A. and Kahneman, D. (1982), \u201cJudgment under uncertainty: heuristics and biases\u201d, in Kahneman, D., Slovic, P. and Tversky, A. (Eds), Judgment under Uncertainty: Heuristics and Biases, Cambridge University Press, Cambridge, NY, pp.\u00a03-20.","DOI":"10.1017\/CBO9780511809477.002"},{"key":"key2023053001435313600_ref061","doi-asserted-by":"crossref","unstructured":"van Est, R., Walhout, B. and Brom, F. (2012), \u201cRisk and technology assessment\u201d, in Roeser, S., Hillerbrand, R., Sandin, P. and Peterson, M. (Eds), Handbook of Risk Theory: Epistemology, Decision Theory, Ethics, and Social Implications of Risk, Springer, Dordrecht, pp.\u00a01067-1091.","DOI":"10.1007\/978-94-007-1433-5_43"},{"volume-title":"The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA","year":"1996","key":"key2023053001435313600_ref062"},{"issue":"9\/10","key":"key2023053001435313600_ref063","doi-asserted-by":"publisher","DOI":"10.1045\/september2012-vermaaten","article-title":"Identifying threats to successful digital preservation: the SPOT model for risk assessment","volume":"18","year":"2012","journal-title":"D-lib Magazine"},{"issue":"4","key":"key2023053001435313600_ref064","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1108\/10650750710831466","article-title":"Digital curation","volume":"23","year":"2007","journal-title":"OCLC Systems and Services: International Digital Library Perspectives"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-07-2022-0161\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-07-2022-0161\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:34:36Z","timestamp":1753396476000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/79\/4\/880-897\/205689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":65,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,11,23]]},"published-print":{"date-parts":[[2023,5,31]]}},"alternative-id":["10.1108\/JD-07-2022-0161"],"URL":"https:\/\/doi.org\/10.1108\/jd-07-2022-0161","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2022,11,23]]}}}