SlideShare uma empresa Scribd logo
1 de 12
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining Copyright 2.0 Content 1.0:  printed, physical, library  Usage 1.0:  browse, read, use, store  Content 2.0:  print, audio, visual ; analog or digital Usage 2.0:  search, repurpose, store, manipulate, manage
Defining Digital Natives ,[object Object],[object Object]
Who are Digital Natives? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Usage 2.0 + Content 2.0
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Usage 2.0 + Content 2.0
Copyright Issues for Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Issues for Libraries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Issues for Publishers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developments in Copyright ,[object Object],[object Object],[object Object],[object Object],[object Object]
What should you do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources Prensky, Marc (2005/06). Listen to the Natives. Educational Leadership, v. 63 : 4 , p.8-13.  http://www.ascd.org/authors/ed_lead/el200512_prensky.html Section 108 Study Group.  http://www.section108.gov/ Stanford Copyright & Fair Use:  http://fairuse.stanford.edu Claremont Copyright:  http://copyright.claremont.edu Creative Commons:  http://creativecommons.org/  UCLA Copyright Infringement Project http://cip.law.ucla.edu/

Mais conteúdo relacionado

Mais procurados

Creative Commons for Tertiary Education
Creative Commons for Tertiary EducationCreative Commons for Tertiary Education
Creative Commons for Tertiary EducationMattMcGregor
 
Educational Technology 2
Educational Technology 2Educational Technology 2
Educational Technology 2EN NA
 
Creative commons for Schools
Creative commons for SchoolsCreative commons for Schools
Creative commons for SchoolsMattMcGregor
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentationguest3d7966
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technologyAnirudh Damani
 
Gender And The Digital Divide
Gender And The Digital DivideGender And The Digital Divide
Gender And The Digital Divide2548233
 
Overview of tech trends presentation.
Overview of tech trends presentation.Overview of tech trends presentation.
Overview of tech trends presentation.Gerry Davis
 
Libraries Bridging the Digital Divide
Libraries Bridging the Digital DivideLibraries Bridging the Digital Divide
Libraries Bridging the Digital DivideBobbi Newman
 
Med122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleMed122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleRob Jewitt
 
Digital media and you
Digital media and youDigital media and you
Digital media and youAnkur Sharma
 
Bunnellr elt7007
Bunnellr elt7007Bunnellr elt7007
Bunnellr elt7007rbunnell9
 
The internet and_the_arts_4.22.08
The internet and_the_arts_4.22.08The internet and_the_arts_4.22.08
The internet and_the_arts_4.22.08tchoubar
 
Internet Basics and Information
Internet Basics and InformationInternet Basics and Information
Internet Basics and InformationNishant P
 
Notes on From Myspace To Hip Hop
Notes on From Myspace To Hip HopNotes on From Myspace To Hip Hop
Notes on From Myspace To Hip HopSusan Geiger
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Mediajohntk01
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 

Mais procurados (20)

Creative Commons for Tertiary Education
Creative Commons for Tertiary EducationCreative Commons for Tertiary Education
Creative Commons for Tertiary Education
 
Educational Technology 2
Educational Technology 2Educational Technology 2
Educational Technology 2
 
Red Etech
Red EtechRed Etech
Red Etech
 
Creative commons for Schools
Creative commons for SchoolsCreative commons for Schools
Creative commons for Schools
 
L5 yem introduction
L5 yem introductionL5 yem introduction
L5 yem introduction
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentation
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
 
Gender And The Digital Divide
Gender And The Digital DivideGender And The Digital Divide
Gender And The Digital Divide
 
Overview of tech trends presentation.
Overview of tech trends presentation.Overview of tech trends presentation.
Overview of tech trends presentation.
 
Libraries Bridging the Digital Divide
Libraries Bridging the Digital DivideLibraries Bridging the Digital Divide
Libraries Bridging the Digital Divide
 
Med122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the moduleMed122 2014 week 1 intro to the module
Med122 2014 week 1 intro to the module
 
Digital media and you
Digital media and youDigital media and you
Digital media and you
 
Bunnellr elt7007
Bunnellr elt7007Bunnellr elt7007
Bunnellr elt7007
 
The internet and_the_arts_4.22.08
The internet and_the_arts_4.22.08The internet and_the_arts_4.22.08
The internet and_the_arts_4.22.08
 
Internet Basics and Information
Internet Basics and InformationInternet Basics and Information
Internet Basics and Information
 
Notes on From Myspace To Hip Hop
Notes on From Myspace To Hip HopNotes on From Myspace To Hip Hop
Notes on From Myspace To Hip Hop
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Media
 
Post Digital Divide
Post Digital DividePost Digital Divide
Post Digital Divide
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 

Destaque

Sherlock: The Summon Experience at Claremont
Sherlock: The Summon Experience at ClaremontSherlock: The Summon Experience at Claremont
Sherlock: The Summon Experience at ClaremontJohn McDonald
 
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...Usage Statistics & Information Behaviors: understanding User Behavior with Qu...
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...John McDonald
 
Usage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsUsage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsJohn McDonald
 
Tiered Pricing Models: The Effect on Library Budgets
Tiered Pricing Models: The Effect on Library BudgetsTiered Pricing Models: The Effect on Library Budgets
Tiered Pricing Models: The Effect on Library BudgetsJohn McDonald
 
OpenURL Linking: the Academic Library Experience
OpenURL Linking: the Academic Library ExperienceOpenURL Linking: the Academic Library Experience
OpenURL Linking: the Academic Library ExperienceJohn McDonald
 
veryDisco: The Evolution of Discovery at Claremont
veryDisco: The Evolution of Discovery at ClaremontveryDisco: The Evolution of Discovery at Claremont
veryDisco: The Evolution of Discovery at ClaremontJohn McDonald
 
Copyright issues in a library digital environment
Copyright issues in a library digital environmentCopyright issues in a library digital environment
Copyright issues in a library digital environmentFe Angela Verzosa
 

Destaque (8)

Sherlock: The Summon Experience at Claremont
Sherlock: The Summon Experience at ClaremontSherlock: The Summon Experience at Claremont
Sherlock: The Summon Experience at Claremont
 
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...Usage Statistics & Information Behaviors: understanding User Behavior with Qu...
Usage Statistics & Information Behaviors: understanding User Behavior with Qu...
 
Usage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsUsage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next Steps
 
Tiered Pricing Models: The Effect on Library Budgets
Tiered Pricing Models: The Effect on Library BudgetsTiered Pricing Models: The Effect on Library Budgets
Tiered Pricing Models: The Effect on Library Budgets
 
OpenURL Linking: the Academic Library Experience
OpenURL Linking: the Academic Library ExperienceOpenURL Linking: the Academic Library Experience
OpenURL Linking: the Academic Library Experience
 
bX at Claremont
bX at ClaremontbX at Claremont
bX at Claremont
 
veryDisco: The Evolution of Discovery at Claremont
veryDisco: The Evolution of Discovery at ClaremontveryDisco: The Evolution of Discovery at Claremont
veryDisco: The Evolution of Discovery at Claremont
 
Copyright issues in a library digital environment
Copyright issues in a library digital environmentCopyright issues in a library digital environment
Copyright issues in a library digital environment
 

Semelhante a Copyright 2.0: Issues for Digital Natives

Semelhante a Copyright 2.0: Issues for Digital Natives (20)

Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Vikki Windsor Web 2.0
Vikki Windsor Web 2.0Vikki Windsor Web 2.0
Vikki Windsor Web 2.0
 
2009 Feb 17 Public Broadcasters
2009 Feb 17  Public Broadcasters2009 Feb 17  Public Broadcasters
2009 Feb 17 Public Broadcasters
 
Pew Internet: The New News Media-scape
Pew Internet: The New News Media-scapePew Internet: The New News Media-scape
Pew Internet: The New News Media-scape
 
Copyright Issues in Higher Education
Copyright Issues in Higher EducationCopyright Issues in Higher Education
Copyright Issues in Higher Education
 
The New Information Ecology
The New Information EcologyThe New Information Ecology
The New Information Ecology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Fair Use & Critical Commons
Fair Use & Critical CommonsFair Use & Critical Commons
Fair Use & Critical Commons
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
ACRL
ACRLACRL
ACRL
 
Digital footprints
Digital footprintsDigital footprints
Digital footprints
 
MIL_MET7_Presentation.pptx
MIL_MET7_Presentation.pptxMIL_MET7_Presentation.pptx
MIL_MET7_Presentation.pptx
 
Week 13 Issues
Week 13 IssuesWeek 13 Issues
Week 13 Issues
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
 
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Copyright And Fairuse
Copyright And FairuseCopyright And Fairuse
Copyright And Fairuse
 

Mais de John McDonald

Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...
Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...
Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...John McDonald
 
Springer Symposium on Scholarly Communications
Springer Symposium on Scholarly CommunicationsSpringer Symposium on Scholarly Communications
Springer Symposium on Scholarly CommunicationsJohn McDonald
 
Making the Data Work: Telling your story with Usage Statistics
Making the Data Work: Telling your story with Usage StatisticsMaking the Data Work: Telling your story with Usage Statistics
Making the Data Work: Telling your story with Usage StatisticsJohn McDonald
 
Transforming the Library
Transforming the LibraryTransforming the Library
Transforming the LibraryJohn McDonald
 
Collaboration in Information Technology Services
Collaboration in Information Technology ServicesCollaboration in Information Technology Services
Collaboration in Information Technology ServicesJohn McDonald
 
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...John McDonald
 
What OCLC Data Analysis Reveals About SCELC Libraries
What OCLC Data Analysis Reveals About SCELC LibrariesWhat OCLC Data Analysis Reveals About SCELC Libraries
What OCLC Data Analysis Reveals About SCELC LibrariesJohn McDonald
 
SerialsSolutions Visit
SerialsSolutions VisitSerialsSolutions Visit
SerialsSolutions VisitJohn McDonald
 
Communication Strategies for Pushing the Boundaries of Collaboration
Communication Strategies for Pushing the Boundaries of CollaborationCommunication Strategies for Pushing the Boundaries of Collaboration
Communication Strategies for Pushing the Boundaries of CollaborationJohn McDonald
 
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...John McDonald
 
Tipping the Cow: Reorganizing Staff to Support Electronic Resources
Tipping the Cow: Reorganizing Staff to Support Electronic ResourcesTipping the Cow: Reorganizing Staff to Support Electronic Resources
Tipping the Cow: Reorganizing Staff to Support Electronic ResourcesJohn McDonald
 
Niso usage data forum 2007
Niso usage data forum 2007Niso usage data forum 2007
Niso usage data forum 2007John McDonald
 
Size Matters: Engaging Your Users Where They Are @
Size Matters: Engaging Your Users Where They Are @Size Matters: Engaging Your Users Where They Are @
Size Matters: Engaging Your Users Where They Are @John McDonald
 
Oberlin Group Library Statistics
Oberlin Group Library StatisticsOberlin Group Library Statistics
Oberlin Group Library StatisticsJohn McDonald
 
Statistics for Librarians: How to Use and Evaluate Statistical Evidence
Statistics for Librarians: How to Use and Evaluate Statistical EvidenceStatistics for Librarians: How to Use and Evaluate Statistical Evidence
Statistics for Librarians: How to Use and Evaluate Statistical EvidenceJohn McDonald
 
NISO Webinar on Usage Data: An Overview of Recent Usage Data Research
NISO Webinar on Usage Data: An Overview of Recent Usage Data ResearchNISO Webinar on Usage Data: An Overview of Recent Usage Data Research
NISO Webinar on Usage Data: An Overview of Recent Usage Data ResearchJohn McDonald
 
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...John McDonald
 
OpenURL Resolver: The Perfect Librarian
OpenURL Resolver: The Perfect LibrarianOpenURL Resolver: The Perfect Librarian
OpenURL Resolver: The Perfect LibrarianJohn McDonald
 
Consortia Level Collection Evaluation
Consortia Level Collection EvaluationConsortia Level Collection Evaluation
Consortia Level Collection EvaluationJohn McDonald
 

Mais de John McDonald (20)

Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...
Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...
Discovery or Displacement?: A Large Scale Longitudinal Study of the Effect of...
 
Springer Symposium on Scholarly Communications
Springer Symposium on Scholarly CommunicationsSpringer Symposium on Scholarly Communications
Springer Symposium on Scholarly Communications
 
Making the Data Work: Telling your story with Usage Statistics
Making the Data Work: Telling your story with Usage StatisticsMaking the Data Work: Telling your story with Usage Statistics
Making the Data Work: Telling your story with Usage Statistics
 
Transforming the Library
Transforming the LibraryTransforming the Library
Transforming the Library
 
Collaboration in Information Technology Services
Collaboration in Information Technology ServicesCollaboration in Information Technology Services
Collaboration in Information Technology Services
 
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...
Ebook Availability Revisited: A Quantitative Analysis of the 2012 Ebook Aggre...
 
What OCLC Data Analysis Reveals About SCELC Libraries
What OCLC Data Analysis Reveals About SCELC LibrariesWhat OCLC Data Analysis Reveals About SCELC Libraries
What OCLC Data Analysis Reveals About SCELC Libraries
 
SerialsSolutions Visit
SerialsSolutions VisitSerialsSolutions Visit
SerialsSolutions Visit
 
Communication Strategies for Pushing the Boundaries of Collaboration
Communication Strategies for Pushing the Boundaries of CollaborationCommunication Strategies for Pushing the Boundaries of Collaboration
Communication Strategies for Pushing the Boundaries of Collaboration
 
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...
Fear Factor, Amazing Race, or Survivor: Threats & Opportunities for Libraries...
 
Tipping the Cow: Reorganizing Staff to Support Electronic Resources
Tipping the Cow: Reorganizing Staff to Support Electronic ResourcesTipping the Cow: Reorganizing Staff to Support Electronic Resources
Tipping the Cow: Reorganizing Staff to Support Electronic Resources
 
Niso usage data forum 2007
Niso usage data forum 2007Niso usage data forum 2007
Niso usage data forum 2007
 
Size Matters: Engaging Your Users Where They Are @
Size Matters: Engaging Your Users Where They Are @Size Matters: Engaging Your Users Where They Are @
Size Matters: Engaging Your Users Where They Are @
 
Oberlin Group Library Statistics
Oberlin Group Library StatisticsOberlin Group Library Statistics
Oberlin Group Library Statistics
 
Statistics for Librarians: How to Use and Evaluate Statistical Evidence
Statistics for Librarians: How to Use and Evaluate Statistical EvidenceStatistics for Librarians: How to Use and Evaluate Statistical Evidence
Statistics for Librarians: How to Use and Evaluate Statistical Evidence
 
NISO Webinar on Usage Data: An Overview of Recent Usage Data Research
NISO Webinar on Usage Data: An Overview of Recent Usage Data ResearchNISO Webinar on Usage Data: An Overview of Recent Usage Data Research
NISO Webinar on Usage Data: An Overview of Recent Usage Data Research
 
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...
Changing the Structure of Scholarly Publishing: Open Access, Open Archives, a...
 
OpenURL Resolver: The Perfect Librarian
OpenURL Resolver: The Perfect LibrarianOpenURL Resolver: The Perfect Librarian
OpenURL Resolver: The Perfect Librarian
 
COUNTER Update
COUNTER UpdateCOUNTER Update
COUNTER Update
 
Consortia Level Collection Evaluation
Consortia Level Collection EvaluationConsortia Level Collection Evaluation
Consortia Level Collection Evaluation
 

Copyright 2.0: Issues for Digital Natives

  • 1.
  • 2. Defining Copyright 2.0 Content 1.0: printed, physical, library Usage 1.0: browse, read, use, store Content 2.0: print, audio, visual ; analog or digital Usage 2.0: search, repurpose, store, manipulate, manage
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Resources Prensky, Marc (2005/06). Listen to the Natives. Educational Leadership, v. 63 : 4 , p.8-13. http://www.ascd.org/authors/ed_lead/el200512_prensky.html Section 108 Study Group. http://www.section108.gov/ Stanford Copyright & Fair Use: http://fairuse.stanford.edu Claremont Copyright: http://copyright.claremont.edu Creative Commons: http://creativecommons.org/ UCLA Copyright Infringement Project http://cip.law.ucla.edu/

Notas do Editor

  1. Here is a picture of some Pasadena area speed bumps. Notice that they are USED…
  2. Back in 1999, I attended the very popular and very important ARL Workshop On Licensing Electronic Information Resources. During that workshop, as we were told about the importance of negotiating certain aspects of licenses, I began to wonder if it was all that necessary. Surely, no publisher would sue a library or vice versa. I even raised my hand and asked, “Has any publisher sued any library over failure to comply with negotiated license terms?” The answer was resoundingly “Not yet!”, but everyone was sure it was coming. I wasn’t so sure though and remain unconvinced. But the time since then has presented many instances of Internet security-related litigation, especially copyright infringement litigation, and thanks to the RIAA and Napster, even lawsuits levied against providers, middlemen, and even end-users. But nothing yet in libraries, and that’s a good thing. As a community, we usually tackle and resolve our issues before the need to litigate even develops. And that’s what this panel discussion is about. How do we continue to work like this in an increasingly distributed digital environment? How do we make sure the concerns of information providers are met realistically and consistently yet ensure that libraries can still continue to legitimately serve the needs of their users? What processes can we develop that allow information producers, providers, vendors, and libraries to effectively work together and enforce the licenses that we’ve negotiated. The background on security issues for licensed online content stem from license adapted from database and software vendors whose models didn’t really adapt to academic research materials and the mission of research libraries. Over the course of the years, as an industry, we’ve come to some basic understanding on most license clauses, including Who, What, When, Where, How…and mysteriously absent is the Why…as in, Why do we need licenses for online content? Well, the why is implied through the Restrictions on Use clauses in our licenses. Of course, information providers wanted to protect their copyright and make sure that providing information in a new format would not result in negative impact on their businesses. So most licenses included clauses outlining prohibited users and prohibited types of usage. And, in some licenses, clauses outlining the consequences of violating prohibited usage.
  3. Most prohibited uses outlined in our licenses seem logical and based on common sense. Things like altering, recompiling, reselling, publishing or republishing, making persistent local copies, altering copyrights or changing publisher or authors names, etc. Most prohibited uses outlined in our licenses are either so unusual that they’re unlikely to ever occur, too difficult to accomplish by the average or even above-average user, or aren’t likely to happen since the potential users would lack a clear motivation to do such a thing. Everyone loves some type of music and music is expensive to acquire, and sharing it is easy so there’s a clear motivation to do just that. But not everyone really cares about that article on copper oxides or contribution of backyard grills to air pollution. But we’ve all still seen some violations of prohibited uses and to me, the major prohibited uses that seem to come up in these instances fall into about 3 categories: systematic copying or downloading, downloading by volume, or allowing unauthorized users to access content. And these things to occur and I’ll outline some examples of occurrences at Caltech along these lines. What I’m really interested in is working out a process to stop these common breaches from occurring and getting libraries and publishers on the same page when needing to communicate about these instances. Let’s take a quick look at a few license examples and some recent violations of prohibited uses that have come up and what we need to rectify these things.
  4. Most prohibited uses outlined in our licenses seem logical and based on common sense. Things like altering, recompiling, reselling, publishing or republishing, making persistent local copies, altering copyrights or changing publisher or authors names, etc. Most prohibited uses outlined in our licenses are either so unusual that they’re unlikely to ever occur, too difficult to accomplish by the average or even above-average user, or aren’t likely to happen since the potential users would lack a clear motivation to do such a thing. Everyone loves some type of music and music is expensive to acquire, and sharing it is easy so there’s a clear motivation to do just that. But not everyone really cares about that article on copper oxides or contribution of backyard grills to air pollution. But we’ve all still seen some violations of prohibited uses and to me, the major prohibited uses that seem to come up in these instances fall into about 3 categories: systematic copying or downloading, downloading by volume, or allowing unauthorized users to access content. And these things to occur and I’ll outline some examples of occurrences at Caltech along these lines. What I’m really interested in is working out a process to stop these common breaches from occurring and getting libraries and publishers on the same page when needing to communicate about these instances. Let’s take a quick look at a few license examples and some recent violations of prohibited uses that have come up and what we need to rectify these things.
  5. And as librarians, why do we care about these issues? First and foremost, we want to provide information to our users and not violate our licenses. We want to negotiate licenses that are clear about what we are required to do and not be hit by surprises during the life of the contract. We don’t want one user to impact the potential use by others We want to provide seamless access to information with a minimum of intermediation We want to ensure that our usage metrics are accurate representations of usage. That’s what I think is important on this topic, but let’s hear from a number of publishers and another librarian about their perspectives. First up is…
  6. Why should you really care? And there are content providers in this audience whose companies essentially don’t care – it’s more expensive and laborious to protect their content than to let everyone use it at any time. B ut you do need to protect your content since it’s essentially all you usually have to sell. Paying attention to the use (and mis-use) of the product provides valuable insight into the content, the interface, and potential new types of content production and the associated potential revenue. It’s also important to understand your new consumers and how they potentially will be utilizing the content you provide in the future. Usage enhances your content, so you want to promote usage while still protecting that content from mis-use.
  7. You have to ask yourself if our new consumers, the Internet Natives, really care about your content and the integrity of your property. First, they might value that content in a different way for for a different purpose than you value it or intend it to be used. They’ve grown up in an environment with liberal re-use of material for educational and academic purposes is commonplace. In addition, your content might be important to them at the time, but if they can’t get it or do what they want with it, they will go somewhere else. And they need it immediately and will use it immediately and often ephemerally, so the stakes are different in acquiring that content.