Piracy in the Library: When Internet Natives Go Bad
-
Upload
john-mcdonald -
Category
Documents
-
view
393 -
download
2
description
Transcript of Piracy in the Library: When Internet Natives Go Bad
![Page 1: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/1.jpg)
Piracy in the Library:When Internet Natives Go
Bad
John McDonaldCalifornia Institute of
TechnologyMarch 27, 2006
![Page 2: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/2.jpg)
What does a pirate look like?
![Page 3: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/3.jpg)
Or, more like this?
![Page 4: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/4.jpg)
Library Sloop?
![Page 5: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/5.jpg)
Security of licensed content
Online publishing led to licensing of academic research materials
Licenses adapted from database & software models
Clauses focused on explicit definitions of users and usage
Who (authorized users)
What (licensed content)
When (term and renewal)
Where (jurisdiction)
How (technical aspects)
And Why…(as in)… Restrictions on Use Prohibited users
Prohibited use
![Page 6: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/6.jpg)
Prohibited Uses
Usual prohibited uses (…or duh!)
altering, recompiling, reselling, publishing or republishing, making persistent local copies, altering copyrights or changing publisher or authors names, etc.
Common breaches (…or what seems logical to the publisher but not to our users)
Systematic or programmatic copying or downloading.
Downloading by volume (too much or too much from the same issue)
Allowing unauthorized users to access content
![Page 7: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/7.jpg)
Case Studies: Intentional Piracy
Open Proxy
Are ne’er-do-wells accessing licensed content?
Data Harvesting
Why screen-scrape an online dictionary?
Sequential/Excessive Downloads
Who needs 1,083 articles from one journal?
Systematic/Automated Downloads
Why would someone use a program to download content?
![Page 8: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/8.jpg)
Case Studies: Accidental PiracyJSTOR Open Proxy
1st instance: misconfigured server
2nd instance: virus
Data Harvesting
Acquiring “Data as data”
Sequential/Excessive Downloads
Traveling / Sabbatical / Graduation
Systematic/Automated Downloads
Crossword puzzle assistance
Mozilla plugin (PDF capture)
![Page 9: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/9.jpg)
Problems for libraries
Most security issues are reactive in nature
Incomplete information communicated to library
Inconsistent instructions among publishers
Unknown trigger events and breach cure procedures
Rare / inconsistent follow-up
![Page 10: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/10.jpg)
Improving Content Security Libraries
Pro-active enforcement of license terms Improve technical infrastructure for compliance Reactive enforcement processIdentify users & breaches when notifiedCommunicate with publishers
PublishersImprove technical infrastructureDefine trigger eventsCommunicate to subscribersInvestigate – may lead to new views on content
![Page 11: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/11.jpg)
Why should we care?
Provide seamless access to information with a minimum of intermediation
Negotiate clear and explicit licenses
Provide information according to license terms
Reduce impact of misuse by one on the potential use by others
Ensure that our usage metrics are accurate representations of usage.
![Page 12: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/12.jpg)
Why should you care?
Protect content
Develop new content & revenue streams
Understand new information consumers
Usage enhances your content
If you don’t, then they are smart enough to do whatever they want...
![Page 13: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/13.jpg)
Do they care?
They might value your content for a reason you don’t
Creative commons and educational use is a de-facto standard in academia
Interchangeable nature of content
Immediacy trumps everything
![Page 14: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/14.jpg)
Keep track of it, or . . .
![Page 15: Piracy in the Library: When Internet Natives Go Bad](https://reader035.fdocuments.us/reader035/viewer/2022062708/558a3484d8b42a0a3c8b46d1/html5/thumbnails/15.jpg)
It might be taken & re-purposed!