Rights / Business Models in the NSDL Columbia University David Millman April, 2001.

Slides:



Advertisements
Similar presentations
Standard License Expression CNI Meeting Arlington, VA April 4, 2006 Christopher McKenzie John Wiley & Sons, Inc.
Advertisements

Ted Koppel The Library Corporation
1 2 nd Shanghai, 19/02/06 Architecture for Next Generation Grids Kostas Tserpes, NTUA Shanghai, 20th of February 2006.
Why self-archive? Elizabeth Harbord Head of Collection Management.
Access management for repositories: challenges and approaches for MAMS James Dalziel Professor of Learning Technology and Director, Macquarie E-Learning.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Creating a Winning E-Business Second Edition
OPEN ACCESS 101 WHAT EVERY FACULTY, RESEARCHER, AND STUDENT SHOULD KNOW Yuan Li Scholarly Communications Librarian Princeton University Library.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Protecting Your Scholarship: Copyrights, Publication Agreements, and Open Access Harvard University Office for Scholarly Communication May 11, 2009 Kenneth.
6/17/2015Lars Björnshauge1 The Next Generation of IRs – enabling closer cooperation & networking International Workshop on institutional repositories and.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
1 An introduction to the NSDL William Y. Arms Cornell University.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
Institutional Perspective on Credit Systems for Research Data MacKenzie Smith Research Director, MIT Libraries.
WORLD BANK Publications The reference of choice on development The Promise, and Challenge, of Implementing Open Access at the World Bank Carlos Rossel.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Digital Rights Management on the Web Dr Renato Iannella IPR Systems Chief Scientist 10th World-Wide Web.
Secure Electronic Transaction (SET)
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
UVa Library Research Data Services
Lifecycle Metadata for Digital Objects November 22, 2004 Usage and Rights Management Metadata.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Access Through Collective Services. Why Services ? RROs are well placed to provide:  Access to broad repertoires of content  Through controlled channels.
Use & Access 26 March Use “Proof of Concept” Model for General Libraries & IS faculty Model for General Libraries & IS faculty Test bed for DSpace.
The National Science Digital Library & Shibboleth.
Shibboleth at Columbia Update David Millman R&D July ’05
Author(s): David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
DIGITAL SIGNATURE.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Symposium on Global Scientific Data Infrastructures Panel Two: Stakeholder Communities in the DWF Ann Wolpert, Massachusetts Institute of Technology Board.
Digitization – Basics and Beyond workshop Interoperability of cultural and academic resources New services for digitized collections Muriel Foulonneau.
Towards a Unified Authentication, Authorisation and Accounting Infrastructure Patrick Kirk Chief Technical Officer (YHGfL) Lifelong Learning Infrastructure.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
Millman—Nov 04—1 An Update on Digital Libraries David Millman Director of Research & Development Academic Information Systems Columbia University
NSDL & Access Management David Millman Columbia University Jan ‘02.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Governmental Advisory Committee Public Safety Working Group 1.
NDSR Boston webinar: Provide module Presenter: Nancy Y McGovern December 2015.
Institutional Repositories July 2007 DIGITAL CURATION creating, managing and preserving digital objects Dr D Peters DISA Digital Innovation South.
Authentication - an overview of Hybrid Library requirements Jonathan Eaton eLib Concertation Day - Authentication 10th March 1999 Project HeadLine.
Infrastructure Breakout What capacities should we build now to manage data and migrate it over the future generations of technologies, standards, formats,
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Shibboleth for Middle Schools James Burger -
The Policy Side of Federations Kenneth J. Klingenstein and David L. Wasley Tuesday, June 29, CAMP Shibboleth Implementation Workshop.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Digital Repository DDUB Learning and Research Resources Center (CRAI) University of Barcelona 2016.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Paolo Budroni, University of Vienna
Geo Rights Management (GeoRM) Hats and Doors?
GEOSS Data Sharing Principles
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Federated Digital Rights Management
Creating a Culture of Open Data in Academia
The Next Generation of IRs – enabling closer cooperation & networking
Educational Technology Standards
Presentation transcript:

Rights / Business Models in the NSDL Columbia University David Millman April, 2001

Millman–4/1—2 w Some Recent History ’96 Sept. – NSF ‘terms and conditions’ ’98 April – NSF/DLF/CRIA–Enabling Access in Dig Libs ’98 April – Lynch, White Paper (Cross-Org Access Mgt) ’99 Nov. – DLF Authentication technical architecture ’00 Dec. – EPIC IP Policy Roundtable Internet2 “Shibboleth” authN/authZ technology

Millman–4/1—3 w NSF/DLF/CRIA Workshop simplicity privacy good faith trusted intermediaries reasonable terms Key properties for the design and adoption of systems that enable access for users while respecting the rights and interests of authors and publishers

Millman–4/1—4 w EPIC Roundtable w/ Columbia Law School solicit comments & perspective –librarians –scientists –attorneys –disseminators –publishers

Millman–4/1—5 w EPIC Roundtable Questions –What are the necessary/desirable components of a digital rights management system for an author? For publishers? For users? –What type of information and/or tracking would authors or other copyright owners want the system to provide with respect to their work? –To what extent is technological protection appropriate to ensure that users have valid access to the system and comply with any restrictions placed on the material by authors or other copyright owners? –To what extent is the technological protection appropriate to ensure that user are accessing the authentic version of the content? –How can a digital rights management system for educational materials provide an appropriate level of protection for authors and at the same time accommodate users’ privileges, such as fair use? –What incentives would publishers have to participate in such a digital rights management system? What incentives would the system have to include them? –What effect would authors’ participation in the NSDL rights management system have on their potential ability to publish their work through more traditional channels?

Millman–4/1—6 w EPIC Roundtable integrity payment Two issues emerged as being of primary importance in the creation of a digital rights management system

Millman–4/1—7 w Integrity—authentication of digital materials context of creation provenance, handling independent authority “signatures” see Authenticity in a Digital Environment ( CLIR, May 2000)

Millman–4/1—8 w Payment—various models per use license debit account academic credit granularity / packaging matrix

Millman–4/1—9 w Pricing Models... institutional license institutional debit account indiv package per use $ citation use in classroom

Millman–4/1—10 w Pricing Models... institutional license institutional debit account indiv package per use $ citation use in classroom subject area data type educator’s selection supported

Millman–4/1—11 w Pricing Models... institutional license institutional debit account indiv package per use $ citation use in classroom subject area data type educator’s selection supported user metadata tracking use content metadata

Millman–4/1—12 w charge for services? no charge for content? or also...

Millman–4/1—13 w Identity and Privacy Management communities of use aggregation authorities –proxies –certificate authorities –trust/policy agreements reporting services

Millman–4/1—14 w A Possible Architecture community identity aggregator authority community identity aggregator authority NSDL portal other service

Millman–4/1—15 w