|
|
|
-
recognizing and assess risks.
|
|
preservation
planning == a response to known and unknown risks posed by the promise to
provide access over time to digital objects.
|
|
|
|
Risk-based
assessment methods - widely used in software project management, security
threat analysis and business planning.
|
|
I used -
my expertise in security threat analysis models,
|
|
a number
of project management risk-based methods,
|
|
ideas
developed by Cornell University’s Prism project,
|
|
various
other papers
|
|
|
|
–
identified about 70 risk factors.
|
|
DRM,
encryption, lost commercial viability, unique support across industry
|
|
|
|
Transition
– it is a combination of opinion polling (as in politics) and risk aversion
(as in investing)
|