for records in a digital environment. Instead of a positivist approach, MacNeil (2016) proposed that diplomatics as an analytical method should be based on a more interpretivist approach. This also means a shift in the way the word authenticity is used. It does not reflect an "objective truth" but "an understanding that reflects fairly the various perspectives of participants in that setting" (p. 755). Even though innovative processes of authentication are implemented, and whatever positivist or interpretivist background is used, the idea behind them remains that the authenticator is an external informational agent that validates the record and makes the judgement of authenticity. External judgement of weak authenticity The second interpretation of authenticity as a property of records is of referential nature. Weak authenticity is concerned with the question whether records are a sound representation of the history of for example a person, a city, an organisation or a country. This interpretation is often linked with political issues. The authenticator controls the creation, the appraisal, the disposal and the distribution of records. The authenticator therefore controls the sources, the evidence, upon which historical research is based. In the past decades weak authenticity, and the power of the authenticator, have become an important subject of research. As McKemmish and Gilliland (2016) have written: "The greater diversity and the expanding research front reflect in part the impact of the so-called 'archival turn' first evident in postmodern and postcolonial discourses in disciplines like anthropology, literature and history. It has encouraged researchers in archival science to contemplate the societal implications and effects of archives and recordkeeping. Critical theory provides a framework for theorizing about both the role of the Archive in social conditions and forces such as colonialism, oppression, marginalization and abuse of human rights, and the part that it might play in postcolonial, post-trauma and post-conflict societies. Increasingly the Archive is being explored as a contested, political space, a societal concept associated with the promotion of asymmetrical power, grand narratives, nationalism, surveillance, and the omission, diminution or silencing of alternate narratives Interdisciplinary areas such as race and ethnicity, gender and ion, and Indigenous and studies, are also addressing the role of the Archive (p. 86) An example of an authenticator is the archival institute that selects and manages records of a city. Every institute will have its appraisal policy, and a lot of them will try to collect data and records from every part of society. In this case the archivist is the gatekeeper, classifying records as fit for purpose. The issues can be highly political as is clear from the citation above. The authenticator can deliberately contribute to inequality, for example when property rights of indigenous communities in Africa and in Northern America are not recorded in a way that the ruling class view as reliable and thus authentic (Faulkhead and Thorpe, 2016). Records can also contribute to inequality when for example abuses of power by for example military invaders or domestic oppressors are not recorded and captured.8 Another, less politically loaded, example is the use of records for city marketing. The historical museum of the city where I live, creates a very positive view of the history of the city (with keywords like tolerant, entrepreneurial and creative) and shows records and artefacts to illustrate this. For this purpose, it is quite inconvenient that the museum contains a lot of records and artefacts about events that the city cannot be proud of, like the city's contribution to slave trade until the nineteenth century. This is dealt with in one short sentence at the end of the statement about the "DNA of Amsterdam". Records are put in the context of city branding,9 or to put it less mildly: in the context of outright propaganda and distortion of historical truth for financial benefits. However, the notion that for this kind of authentication you need sources that have proved to be reliable and genuine, remains an important matter. Weak authenticity needs records with strong authenticity. Internal judgement of weak authenticity This is a postmodernist, constructivist subject. The link with strong authenticity is practically absent. This kind of authentication only contributes to what the authenticator wants to see confirmed in authenticating himself. If it looks or sounds like a record, and if contributes to the identity the authenticator wishes for himself, it is OK. If the authenticator gets a feeling of his own authenticity by using the record, it is fine. Authenticity, when authorized from the inside, does not need authentication from the outside. Anything that strengthens the idea that one comes closer to himself, will do. This is the realm of consumerist behaviour as described by Gilmore and Pine (2007). It is a postmodernist realm where values like truth, reliability and proof are always "subjective" and are always dependant on "metanarratives". This is also the realm of contemporary discussions about fake news, filter bubbles and possibilities of manipulating digital texts, photos, videos and animations. It is therefore a highly relevant subject that needs further exploration. Internal judgement of strong authenticity The three ways of authentication that are described above radically differ from each other. The first is traditionally linked to diplomatics. The second poses questions to the function of records in society. The third is concerned with weak authenticity when strong authenticity is irrelevant. All these types of authentication have been researched. The fourth possibility is that of the record claiming, accepting or rejecting its own strong authenticity. These records are part of an environment that does not allow for an outside authenticator, because they are part of a hyperobject that is too vast to control by any individual or group, machine or network. Digital records might beyond the control we were used to in the analog environment. Laws, regulations and standards will only partially help. Getting a grip on a hyperobject is a self-contradictory goal. Therefore, the only realistic authentication process of digital records might be internal. The octopus should be archives in liquid times 8 See for example the work of witness.org, accessed 29-09-2017 260 frans smit records, hyperobjects and authenticity 9 See http://hart.amsterdammuseum.nl/nl/page/3 5365/amsterdam-dna-tijdlijn, accessed 03-06-2017 261

Periodiekviewer Koninklijke Vereniging van Archivarissen

Jaarboeken Stichting Archiefpublicaties | 2017 | | pagina 132