Information Technology Reference
In-Depth Information
Following this there is a Section for recommendations, detailing overall standards
or procedures which should be followed. Then there is a Section detailing each key
event that triggers the capture of evidence about the event, specifically one needs to
at least name the event, provide a description, a description of information on what
triggers the event and an order identifier, so it is possible to specify the order of
events in a sequence. Following that is the protocols Section; there is a sequence of
protocols for each event; a protocol has a description, its own recommendations and
a sequence of steps.
Internally each step can have its own recommendations, a sequence of actual
PDI data fields to capture and details the type of actor performing the PDI evidence
capture. Additionally a PDI data field can be given an importance rating depending
on how critical the protocol document creator feels the field is to capture. It is also
possible to specify that additional documents or files are required.
The following few images give a view of a prototype tool which guides a curator
through the process of capturing evidence and then allowing a user to display the
evidence.
Capturing PDI
The capture screen (Fig. 13.8 ) details the step to execute, with the project owners
recommendations. The capture is made in a text box, the capturer can rate their
Fig. 13.8 Authenticity management tool
Search WWH ::




Custom Search