Risk Area: Technical

Technological and operational limitations

Many institutions face significant resource limitations, both in staffing and technological infrastructure, which hinder their ability to digitise and manage open access collections. Operational challenges such as inadequate metadata, insufficient procedural workflows, and technical vulnerabilities are commonly cited as barriers to effectively securing and maintaining accessible digital collections.

“Open datasets must be refined from all personal and institutional secret information before publishing. Unrefined datasets will compromise technical-system vulnerabilities (e.g. IP and digital address info). Last but not least, wrong-indexed datasets may cause plagiarism."

Research Institution, Turkey

  • Limited resources for digitisation, digital preservation and open access management including insufficient funding, staffing, skills to maintain, and provide reliable access to digital collections.

  • Challenges with metadata quality and technological infrastructure, such as inconsistent or incomplete metadata, legacy systems, limited interoperability, and other technical constraints.

  • Vulnerabilities in securing and maintaining digital collections including risks related to cybersecurity, data loss, system failures, and the ongoing effort required to ensure continuity over time.

  • High-volume, automated scraping by AI bots generating sudden, swarming traffic that exceeds system design assumptions, overwhelms servers, degrades performance or causes outages, distorts analytics, and creates escalating infrastructure costs.

Use cases

Research data managers don’t make datasets open access, because inadequate or technically misleading data may spread rapidly and be misinterpreted. This can negatively impact the credibility of the research institution and result in difficulties securing future funding.

Digital archivists don’t make raw datasets open access, because unrefined data might contain sensitive personal or institutional information. This could lead to security breaches or exploitation of system vulnerabilities, affecting the safety and privacy of both the institution and its stakeholders.

Last updated