Conference Paper

Approaches To Archiving Professional Blogs Hosted In The Cloud

Conference: 7th International Conference on Preservation of Digital Objects (iPRES 2010)


Early adopters of blogs will have made use of externally-hosted blog platforms, such as and, due, perhaps, to the lack of a blogging infrastructure within the institution or concerns regarding restrictive terms and conditions covering use of such services. There will be cases in which such blogs are now well-established and contain useful information not only for current readership but also as a resource which may be valuable for future generations. The need to preserve content which is held on such third-party services (“the Cloud’) provides a set of new challenges which are likely to be distinct from the management of content hosted within the institution, for which institutional policies should address issues such as ownership and scope of content. Such challenges include technical issues, such as the approaches used to gather the content and the formats to be used and policy issues related to ownership, scope and legal issues. This paper describes the approaches taken in UKOLN, an applied research department based at the University of Bath, to the preservation of blogs used in the organisation. The paper covers the technical approaches and policy issues associated with the curation of blogs a number of different types of blogs: blogs used by members of staff in the department; blogs used to support project activities and blogs used to support events.

Download full-text


Available from: Brian Kelly, Oct 01, 2015
71 Reads
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Purpose - The purpose of this paper is to provide a number of examples of how Web 2.0 technologies and approaches (Library 2.0) are being used within the library sector. The paper acknowledges that there are a variety of risks associated with such approaches. The paper describes the different types of risks and outlines a risk assessment and risk management approach which is being developed to minimise the dangers while allowing the benefits of Library 2.0 to be realised. Design/methodology/approach - The paper outlines various risks and barriers which have been identified at a series of workshops run by UKOLN (a national centre of expertise in digital information management based in the UK) for the cultural heritage sector. A risk assessment and risk management approach, which was initially developed to support use of Web 2.0 technologies at events organised by UKOLN, is described and its potential for use within the wider library community, in conjunction with related approaches for addressing areas such as accessibility and protection of young people, is described. Findings - Use of Library 2.0 approaches is becoming embedded across many libraries which seek to exploit the benefits which such technologies can provide. The need to ensure that the associated risks are identified and appropriate mechanisms implemented to minimise such risks is beginning to be appreciated. Practical implications - The areas described here should be of relevance to many library organisations which are making use of Library 2.0 services. Originality/value - The paper should prove valuable to policy makers and web practitioners within libraries who may be aware of the potential benefits of Library 2.0 but have not considered the associated risks.
    Program electronic library and information systems 01/2009; 43(3):311-327. DOI:10.1108/00330330910978608 · 0.65 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Following the initial excitement generated by Web 2.0 we are now seeing Web 2.0 concepts being adopted across the cultural heritage sector. Libraries, with their responsibilities for facilitating access to information resources and engaging with their user communities, have been early adopters of Web 2.0, and the term 'Library 2.0' is now becoming accepted. Similar approaches are happening in the museums and archives sectors, with the terms 'Museum 2.0' and 'Archives 2.0' gaining currency. But how should we ensure that the initial enthusiasms for use of Web 2.0 services and approaches become embedded within the organisation? And are cultural heritage organisations aware of the potential risks associated with making use of externally-provided services such as Facebook, YouTube and, including misuse of such services, associated legal concerns as well as the dangers of making use of services for which there may be no formal contractual agreements? In this paper the authors argue that the cultural heritage sector needs to recognise that use of Web 2.0 providers does not necessarily provide an environment in which safe, secure and reliable delivery of services to the user community can be guaranteed. But rather than seeking to replicate successful Web 2.0 services in-house, we feel that we are in an environment in which cultural heritage organisations need to take a risk management approach to the use of networked services. The paper describes a framework which is being developed which aims to ensure that institutions have considered the risks associated with use of Web 2.0 technologies and services and have identified strategies for dealing with potential risks in order to achieve the goal of balancing the risks and benefits in order to maximise the dividends to be gained by use of Web 2.0.
    Cultural Heritage Online 2009; 01/2009