geert-jan van bussel the theoretical framework for the 'archive-as-is'. an organization oriented view on archives - part ii information value chain, three models were crucial: [1] the model of the knowledge value chain of Holsapple and Singh (2001), [2] the recordkeeping model of Peter Horsman (1999, 2001), and [3] the InterPARES Chain of Preservation (Jansen 2015). The value chain allows EIM to: 1. provide proper control of the performance of business processes; 2. provide trusted information; 3. assist in the realisation of the governance and compliance efforts of organizations; 4. provide legal readiness; 5. provide in the protection of sensitive records; and 6. assist in the construction of trusted archives. The information value chain can be used by EIM to identify possible risks for the organization and to take proper actions if breaches of laws and regulations take place (Bearman, 2006; Van de Pas and Van Bussel, 2015ab). Tables 1 and 2 give an overview of the information value chain. 4.5. The behavioural component of the 'Archive-as-Is': Organizational Behaviour (E) From a psychoanalytical point of view, Ihanus (2007) recognizes three phases of archival registrations: archivalization, archivization, and archiving. Archivalization has been defined by Eric Ketelaar (2000a, p. 329; 2001, p. 132-133)) as 'the conscious or unconscious choice (determined by social and cultural factors) to consider something worth archiving'. Ketelaar refers to the social psychologist Geert Hofstede (1997, p. 5), who defined 'culture' as 'the software of the mind', the 'collective programming of the mind which distinguishes the members of one group or category of people from another'. Humans do have, according to Hofstede, the ability to deviate from this programming, but it is clear that it affects the way employees are acting and thinking in business processes. This mental programming affects the way people intuitively consider something 'worth keeping' - or not. After archivalization, a more conscious choice is made about archivization (in the archives in liquid times Information Definition Defining the four dimensions of information, the two archival principles and the five requirements of information access within organizational policies, procedures, rules, and systems. Activity 1 Configure Configuring policies, procedures, rules, and systems to implement the four dimensions of information, the two archival principles, and the five requirements of information access, using requirements of all activities of the information value chain. Information Acquisition Generating and/or acquiring records (and/or archives) from internal and external sources to make it suitable for subsequent use within specifically set procedures and conditions. Activity 2 Generate/receive Creating and receiving records (and/or archives). Activity 3 Identify Identifying records (and/or archives) and adding context. Activity 4 Capture Capturing records (and/or archives) in defined and configured information and archiving systems Activity 5 Store Store records (and/or archives) in information and archiving systems and making them suitable for subsequent use Information Processing Processing and analysing records (and/or archives) in business processes to get work done and using/re-using them for reference, performance, accountability, and evidence, and for economic and historical reasons. Activity 6 Process Using and manipulating records (and/or archives) within case management in business processes for reference, performance, accountability, evidence, and/or economic reasons. Activity 7 Distribute Distributing records for use within organizations. Activity 8 Structure Adding relevant structures to records (and/or archives) that help users in quickly finding and identifying them. Activity 9 Publish The external and/or internal publication of records (and/or archives), according to procedures and legal obligations. Activity 10 Analyse Analysing records (and/or archives) for knowledge gathering or manage ment decisions based on defined or random queries or analysing tools using various (defined or random) algorithms Activity 11 Use/re-use Using and re-using records (and/or archives) for reference, performance, accountability, and evidence, and for economic and historical reasons. Information Archiving Archiving records (and/or archives) based on the four dimensions of information, the two archival principles, and the five requirements of information access. Activity 12 Contextualize Continuously adding new metadata to capture changes in situational and environmental contexts. Activity 13 Appraise Defining the relevance of records (and/or archives). Activity 14 Select Selecting records (to retain or to destroy). Activity 15 Retain Retaining records until the end of their retention period or indefinitely. Activity 16 Dispose Destroying records that have lost their relevance at the end of their retention period. Activity 17 Preserve Using preservation tools and techniques to retain records (and/or archives) indefinitely (or for a very long time). Activity 18 Secure Using information security measures and technologies to secure records (and/or archives). Information Auditing Auditing records (and/or archives) according to the four dimensions of information, the two archival principles, and the five requirements of information access. Activity 19 Audit Audit records (and/or archives) according to arranged requirements. Table 1. Primary processes of the information value chain and their activities 58 Information Leadership Information Coordination Information Control Information Measurement Information Maintenance Establishing management conditions, ethics, and circumstances that enable and facilitate EIM. Managing dependencies to ensure that EIM processes and resources are used adequately at appropriate times. Ensuring that information professionals and resources are available in sufficient quantity and quality, of course subject to security requirements. Assessing values of resources, information professionals, and their deployment. Ensuring that the original condition of assets or resources within the information infrastructure are conserved as nearly, and as long, as possible, are compensated for normal wear and tear, and are renewed when necessary. Table 2. Secondary processes of the information value chain 59

Periodiekviewer Koninklijke Vereniging van Archivarissen

Jaarboeken Stichting Archiefpublicaties | 2017 | | pagina 31