Policy Aware Content Reuse on the Web

Slides:



Advertisements
Similar presentations
OAI from 50,000 Feet OAI develops and promotes interoperability solutions that aim to facilitate the efficient dissemination of content. Begun in 1999.
Advertisements

1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Project 1 Introduction to HTML.
Microsoft Office Open XML Formats Brian Jones Lead Program Manager Microsoft Corporation.
HTML 1 Introduction to HTML. 2 Objectives Describe the Internet and its associated key terms Describe the World Wide Web and its associated key terms.
8/17/2015CS346 PHP1 Module 1 Introduction to PHP.
Databases & Data Warehouses Chapter 3 Database Processing.
Web Development & Design Foundations with XHTML Chapter 11 Key Concepts.
Chapter 1 Introduction to HTML, XHTML, and CSS
Interoperability Scenario Producing summary versions of compound multimedia historical documents.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
Chapter 7 Web Content Mining Xxxxxx. Introduction Web-content mining techniques are used to discover useful information from content on the web – textual.
10/5/2015CS346 PHP1 Module 1 Introduction to PHP.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
Module 9 Configuring Messaging Policy and Compliance.
Support.ebsco.com My EBSCOhost Tutorial Tutorial.
HTTPA (Accountable Hyper Text Transfer Protocol) PhD Proposal Talk Oshani Seneviratne DIG, MIT CSAIL May 31, 2011.
Meta Tagging / Metadata Lindsay Berard Assisted by: Li Li.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
Design engineering Vilnius The goal of design engineering is to produce a model that exhibits: firmness – a program should not have bugs that inhibit.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
Validator Website to Validate URI License Violations Validator – Only requires the URI of the site to check A bad case of content reuse This work by Oshani.
THE SEMANTIC WEB By Conrad Williams. Contents  What is the Semantic Web?  Technologies  XML  RDF  OWL  Implementations  Social Networking  Scholarly.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
HTML Concepts and Techniques Fifth Edition Chapter 1 Introduction to HTML.
Website Design, Development and Maintenance ONLY TAKE DOWN NOTES ON INDICATED SLIDES.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
A centre of expertise in digital information managementwww.ukoln.ac.uk UKOLN is supported by: This work is licensed under a Attribution- NonCommercial-ShareAlike.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
HTML PROJECT #1 Project 1 Introduction to HTML. HTML Project 1: Introduction to HTML 2 Project Objectives 1.Describe the Internet and its associated key.
Harnessing the Deep Web : Present and Future -Tushar Mhaskar Jayant Madhavan, Loredana Afanasiev, Lyublena Antova, Alon Halevy January 7,
Advanced Higher Computing Science
Search Engine Optimization
Information Retrieval in Practice
ArcGIS for Server Security: Advanced
Using LORO A presentation created by Anna Calvi
Interact 2: Options for organising and presenting content
Objective % Select and utilize tools to design and develop websites.
Business Directory REST API
Using E-Business Suite Attachments
Database System Concepts and Architecture
Chapter 1 Introduction to HTML.
Java Beans Sagun Dhakhwa.
Project 1 Introduction to HTML.
Objective % Select and utilize tools to design and develop websites.
Tutorial 7 Working with Multimedia
Objective % Explain concepts used to create websites.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Submitted By: Usha MIT-876-2K11 M.Tech(3rd Sem) Information Technology
Module 1 Introduction to PHP 11/30/2018 CS346 PHP.
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
THREE TIER MOBILE COMPUTING ARCHITECTURE
Microsoft Excel 2007 – Level 2
Testing RESTful Web APIs
2/24/2019 6:15 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Internet Basics and Information Literacy
Chapter 17 - Component-based software engineering
5.00 Apply procedures to organize content by using Dreamweaver. (22%)
Information Retrieval and Web Design
Copyright & Fair Use What You Need to Know!.
how users and data producers interact on WIS
Cross Site Request Forgery (CSRF)
Presentation transcript:

Policy Aware Content Reuse on the Web Oshani Seneviratne Decentralized Information Group, MIT The Problem Reusing content saves resources and fosters creativity. However, reusing a particular piece of content without honoring the license expressed with it may violate the original content creator’s rights. There are several reasons this situation might happen. The person who is reusing the content may be: too lazy to check for the licenses hidden in the XHTML weary of the multi-step operations required to embed the license metadata ignorant as to what each of the licenses mean At the same time, the original content creator would also be interested in knowing whether someone has violated his or her license terms. The Solution Build Policy Aware Systems, such as: Validators to tell users what information is missing or inaccurate Seamlessly integrate metadata by detecting and assisting in embedding the license information Notify users if their content is used in an inappropriate manner Background Extracting License Metadata Policies are pervasive in web applications as they play a crucial role in enhancing security, privacy and usability of services offered on the Web. Use of Creative Commons licenses is the widely accepted method of expressing rights of the original content creators when it comes to digital multimedia content on the Web. The Digital Rights Management alternative is often too prohibitive, and has a central point of control, thus a central point of failure from a policy perspective. Therefore rather than applying an enforcement model, the focus is on building a framework based on open standards and protocols which enables users to reuse content in a policy aware manner with ease. 1. Through APIs which expose the licenses For e.g. Flickr allows users to specify the license associated with their images. These license information can then be queried through the Flickr API. 2. Through RDFa (Resource Description Framework in Attributes) Creative Commons licenses can be expressed in machine readable form using RDFa. The content creator and consumer can use RDFa for rights expression and rights/policy compliance respectively. A simple scenario which illustrates a rights violation is given below. HOW much of a Problem IS THIS? Flickr has over 100 million Creative Commons Licensed images. Given a sample of web pages which embed such images, how many of these are properly attributed as specified in their licenses? Screenshots of the results from the experiment An experiment was conducted to check this: Samples of sites were randomly generated from the Technorati cosmos (which can be used to retrieve sites linking to a given base URI, in this case, a Flickr Farm URI). Then attribution was checked for each of the embedded images in those sites. The results from 3 samples are as follows: A bad case of content reuse Sample 1 (67 sites, 426 images) Properly attributed images = 28 Misattributed images = 333 Misattribution = 78 % Sample 2 (70 sites, 241 images) Properly attributed images = 8 Misattributed images = 194 Misattribution = 80 % Sample 3 (70 sites, 466 images) Properly attributed images = 6 Misattributed images = 439 Misattribution = 94 % Results of the experiment summarized flickrCC attribution License violations validator Semantic clipboard Architecture of the Semantic Clipboard and the Interactions between each of the modules The components of the FlickrCC License Violations Validator GOAL Check whether a particular site has any embedded Flickr images which are not properly attributed as specified in the Creative Commons license. COMPONENTS Spider: This is essentially a site crawler which will search for all the links embedded in the given seed site using a Breadth First search algorithm to determine any embedded images. This crawler avoids straying outside of the site, but instead simply dig down into a single web page. If it detects any embedded Flickr images, this will extract the photo id from the Flickr URI. Using this photo id, all the information related to the photo could be obtained through the Flickr API. License Checker: If a photo has a CC license attached, according to the CC 2.5 specification, regardless of the purpose for what it is used for, the photo should be given proper attribution. This module also checks to which Flickr user this photo belongs to, by querying the Flickr API using the photo id, and then construct the Flickr user URI to check for attribution. Notification System: This will pretty-print and report the images which are missing attributions in a Web interface. The user can then use the missing information in his or her own work to be license compliant. User Checker (optional): This module can be used to send actual notifications to the original content creators for any violations, if the system is linked to some user base. GOAL Enable transfer of content between Web applications with minimal effort in a policy aware manner, i.e. when content is copied, license metadata is also copied and pasted appropriately in the target application. COMPONENTS RDFa Extractor: Extracts all the semantic information in the form of RDF attributes embedded in the HTML page the user browses. RDF Store: Indexes and stores all the RDF attributes from the pages that the user has visited in a given browser session. Semantic Clipboard: Acts as the control panel to co-ordinate the copy and paste operations. Database: Implemented using the Firefox SQLite ‘Storage Connection’ API, and persists data across browser sessions. Validator Website to Validate URI License Violations Validator – Only requires the URI of the site to check Install Tabulator and Try it Out! http://dig.csail.mit.edu/2007/tab More Information http://dig.csail.mit.edu/2009/Clipboard Composer: Reasons whether the content can be used based on the source and the destination license terms. Prepares the content and the license metadata in a suitable manner in to be pasted right in to the target DOM. Try it out! http://oshani.mit.edu/cc_ validator.py More Information http://dig.csail.mit.edu/2008/WSRI-Exchange All of these components are implemented in the Tabulator, a Semantic Web Browser which can be installed as a Firefox Extension. Semantic Clipboard can be turned on/off through a menu option. When using the application, content can be collected from a variety of sources. Once the user selects the content to be reused, it will be made persistant in a database. A browser based editor is used to demo how an application could call the Clipboard for the content, and embed it with the license metadata or warn if the target document’s license is incompatible with the source license . Policies Content Reuse contributions Future work Assess the level of violations with regards to other types of licenses such as ‘no commercial use’, ‘share alike’ and ‘no derivatives’ Assess the level of license violations on other types of media Extend to licenses embedded in free-floating content Explore new and efficient ways of license violations detection Improve the User Interfaces of the CC license violations validator and the Semantic Clipboard Assessment on the level of policy-awareness on the Web Provide a platform to use the data exposed on the Semantic Web A License Violations Validator for Flickr images: to check for any license violations use the information given by the validator to be policy-compliant Semantic Clipboard: to detect reusable content while browsing seamlessly integrate such content along with their metadata Please send your comments to oshani@csail.mit.edu This work by Oshani Seneviratne is licensed under Creative Commons Attribution - Non Commercial - Share Alike 3.0 license.