Your SlideShare is downloading. ×
0
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
A model for incorporating e-resources into Trove, September 2010
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

A model for incorporating e-resources into Trove, September 2010

539

Published on

Describes the scope of Trove Stage 4 development - E-Journals and Authentication, also known as Re-Imagining Project: Open Borders.

Describes the scope of Trove Stage 4 development - E-Journals and Authentication, also known as Re-Imagining Project: Open Borders.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
539
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A MODEL FOR INCORPORATING E-RESOURCES INTO TROVE ERA MEMBERS FORUM 1 SEPTEMBER 2010 WARWICK CATHRO NATIONAL LIBRARY OF AUSTRALIA
  • 2. E-RESOURCES: BARRIERS TO ACCESS <ul><li>Users lack awareness of the e-resources provided by their libraries (especially for public /state / national libraries) </li></ul><ul><li>Consequently they are significantly under-used </li></ul><ul><li>Often there is no easy article-level discovery </li></ul><ul><li>A user-centric approach is needed </li></ul>
  • 3. NLA ASPIRATION <ul><li>Australian library users can easily discover and link through to those e-resources which they are entitled to access by virtue of their multiple library memberships </li></ul>
  • 4. NSLA OPEN BORDERS PROJECT [1] <ul><li>Increase the use of e-resources by making access easier </li></ul><ul><li>Adopt a common NSLA framework for access to e-resources via Trove </li></ul><ul><li>Contribute data (such as EZProxy addresses) to support authentication </li></ul>
  • 5.  
  • 6. PLANNED EXPANSION OF TROVE <ul><li>To commence in October 2010 </li></ul><ul><li>Aim to complete by April 2011 </li></ul><ul><li>Load APAIS, AMI and other indexing data </li></ul><ul><li>Load data for e-resources from partner vendors, starting with RMIT Publishing </li></ul>
  • 7. ACCESS AND AUTHENTICATION MODEL <ul><li>Vendors supply: </li></ul><ul><ul><li>article level metadata for inclusion in Trove </li></ul></ul><ul><ul><li>data about which articles are in which products are licensed by which libraries </li></ul></ul><ul><li>U sers of Trove are encouraged to register and to tell Trove which libraries are their libraries </li></ul><ul><li>Trove uses this vendor and user data to highly rank those articles which the user is entitled to access </li></ul><ul><li>The user is then landed on the vendor’s site where any remaining authentication and access to the full text are managed </li></ul>
  • 8. COMMENTS ON MODEL <ul><li>Requires collaboration from vendors </li></ul><ul><ul><li>To date, RMIT Publishing and Gale have agreed to participate </li></ul></ul><ul><li>Leverages off the efforts of vendors in maintaining article and subscription data </li></ul><ul><li>Vendors can be confident that access and authentication are under control </li></ul><ul><li>For some libraries, there will be difficulties in authenticating users that are off site </li></ul>
  • 9. AUTHENTICATION SCENARIOS <ul><li>Case 1: user’s library affiliations are unknown </li></ul><ul><li>Case 2: none of the user’s libraries subscribe to a wanted e-resource </li></ul><ul><li>Case 3: user can be IP-authenticated as having onsite access privileges </li></ul><ul><li>Case 4: user is offsite, user’s library has an EZproxy server or OpenURL resolver </li></ul><ul><li>Case 5: user is offsite, user’s library does not have an EZproxy server or OpenURL resolver </li></ul>
  • 10. CASES 1 AND 2 <ul><li>Case 1: user’s library affiliations are unknown, OR </li></ul><ul><li>Case 2: none of the user’s libraries subscribe to a wanted e-resource </li></ul><ul><li>Trove encourages the user to register their library affiliations (in Case 1) </li></ul><ul><li>Trove may be able to refer the user to a vendor’s “pay per view” page </li></ul><ul><li>Access to the PDF of the article will be provided after the user supplies valid credit card details </li></ul>
  • 11. CASE 3 <ul><li>User can be IP-authenticated as having onsite access privileges </li></ul><ul><li>If more than one of the user’s libraries have the e-resource, Trove asks the user to select a library </li></ul><ul><li>Trove refers the user to the vendor site, where the IP address of the library will be verified, and the user will be given access to the e-resource </li></ul><ul><li>There are caveats with respect to walk-in users and in determining whether a user is really onsite, especially for public libraries </li></ul>
  • 12. CASE 4 <ul><li>User is offsite, but user’s library has an EZproxy server or OpenURL resolver </li></ul><ul><li>The user finds an article and selects a library </li></ul><ul><li>Trove creates a link to the relevant EZproxy server, passing the article URL as a parameter </li></ul><ul><li>The user enters their credentials and the EZproxy server authenticates the user </li></ul><ul><li>The EZproxy server redirects the user to the article URL </li></ul><ul><li>The vendor site trusts the referrer, given that it can verify the address of the EZproxy server, and the user will be given access to the e-resource </li></ul>
  • 13. CASE 5 <ul><li>User is offsite, and user’s library does not have an EZproxy server or OpenURL resolver </li></ul><ul><li>User finds an article and selects a library </li></ul><ul><li>Trove provides user with a login screen and user enters the relevant credentials for the selected library </li></ul><ul><li>Trove “pretends to be a human being” and enters the login credentials at the real library login page </li></ul><ul><li>If this succeeds, Trove connects to the vendor’s site behind the scenes, obtains the e-resource and presents it to user </li></ul><ul><li>There are a number of security issues with this process </li></ul><ul><li>Complexities include the need for a directory of library login pages, maintained by NLA </li></ul>
  • 14. OPEN BORDERS PROJECT [2] <ul><li>Project Group met on 12 August and agreed to support Cases 1-4 </li></ul><ul><li>If possible, there will be a small pilot of Case 5 </li></ul><ul><li>NSLA has agreed to fund the work of collating and building the required authentication data </li></ul><ul><li>Still aiming for implementation by April 2011 </li></ul>
  • 15. CONCLUSIONS <ul><li>E-resources are under-used, especially in public libraries </li></ul><ul><li>There is a need for a user-centric approach to e-resource access </li></ul><ul><li>Trove, and the Open Borders Project, are opportunities to improve access </li></ul>
  • 16. YOUR QUESTIONS

×