Digitisation, Access and Identity Management

1,529 views

Published on

Presentation given at the JISC Digitisation Conference.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,529
On SlideShare
0
From Embeds
0
Number of Embeds
33
Actions
Shares
0
Downloads
70
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Digitisation, Access and Identity Management

  1. 1. Connecting People to Resources The importance of access and identity management to digitisation
  2. 2. Why is access and identity management important to digitisation? Why digitise?
  3. 3. Borrowing from Simon Tanner (1)… <ul><li>Digitisation democratises access to the arts </li></ul>Copyright: Getty Images from the Education Image Gallery
  4. 4. Borrowing from Simon Tanner (2)… <ul><li>Digitisation safeguards cultural artifacts under risk of destruction </li></ul>Copyright: Getty Images from the Education Image Gallery
  5. 5. Borrowing from Simon Tanner (3)… <ul><li>Digitisation nurtures notions of ‘home and family’ by dealing with diaspora, displacement and cultural identity </li></ul>Copyright: Getty Images from the Education Image Gallery
  6. 6. Access and identity are at the heart of digitisation Safeguarding Access and Nurturing Identity
  7. 7. JISC Programmes and Access to Digitised Materials Digitisation Preservation Presentation Access Management
  8. 8. Safeguarding Access and Nurturing Identity
  9. 9. Digitisation Disasters
  10. 10. “ How do we make a lot of stuff useful to a lot of people?” (with thanks to Chris Batt) Safeguarding Access and Nurturing Identity A Universal Right to Knowledge Connecting People to Resources Stuff and people accessing stuff need managing
  11. 11. Why do I need to manage access? … free at the point of use <ul><li>Administrative – repositories / deposit </li></ul><ul><li>Restricted rights on materials – attribute management </li></ul><ul><li>Presentation </li></ul>Copyright: Getty Images from the Education Image Gallery
  12. 12. Why do I need to manage access?...digitising but not delivering <ul><li>Who is responsible for rights management? </li></ul><ul><li>Who is responsible for metadata creation? </li></ul><ul><li>What experience do you want the end user to have? </li></ul>
  13. 13. It’s all about presentation, presentation, presentation
  14. 14. It’s all about me: web 2.0 and digitisation
  15. 15. Web 2.0 is Identity 2.0
  16. 16. It’s all about me
  17. 17. But do you know who I am? See team blog for more information on identity use online: http://involve.jisc.ac.uk/wpmu/jam/
  18. 18. Trusted Access Connecting People to Resources Trust in authenticity and value of resource Trust is a two way relationship
  19. 19. Trusted access can be as invisible to end-users as pure running water
  20. 20. <ul><li>JISC Access Management Team: [email_address] </li></ul><ul><li>www.jisc.ac.uk/federation </li></ul><ul><li>[email_address] </li></ul>

×