Connecting People to Resources The importance of access and identity management to digitisation
Why is access and identity management important to digitisation? Why digitise?
Borrowing from Simon Tanner (1)… Digitisation democratises  access  to the arts  Copyright: Getty Images from the Education Image Gallery
Borrowing from Simon Tanner (2)… Digitisation  safeguards  cultural artifacts under risk of destruction  Copyright: Getty Images from the Education Image Gallery
Borrowing from Simon Tanner (3)… Digitisation nurtures notions of ‘home and family’ by dealing with diaspora, displacement and cultural  identity   Copyright: Getty Images from the Education Image Gallery
Access and identity are at the heart of digitisation   Safeguarding Access and Nurturing Identity
JISC Programmes and Access to Digitised Materials Digitisation Preservation Presentation Access Management
Safeguarding Access and Nurturing Identity
Digitisation Disasters
“ How do we make a lot of stuff useful to a lot of people?” (with thanks to Chris Batt) Safeguarding Access and Nurturing Identity A Universal Right to Knowledge Connecting People to Resources Stuff and people accessing stuff need managing
Why do I need to manage access? … free at the point of use Administrative – repositories / deposit Restricted rights on materials – attribute management  Presentation  Copyright: Getty Images from the Education Image Gallery
Why do I need to manage access?...digitising but not delivering Who is responsible for rights management? Who is responsible for metadata creation?  What experience do you want the end user to have?
It’s all about presentation, presentation, presentation
It’s all about me: web 2.0 and digitisation
Web 2.0 is Identity 2.0
It’s all about me
But do you know who I am? See team blog for more information on identity use online:  http://involve.jisc.ac.uk/wpmu/jam/
Trusted Access Connecting People to Resources Trust in authenticity and value of resource Trust is a two way relationship
Trusted access can be as invisible to end-users as pure running water
JISC Access Management Team:  [email_address] www.jisc.ac.uk/federation [email_address]

Digitisation, Access and Identity Management

  • 1.
    Connecting People toResources The importance of access and identity management to digitisation
  • 2.
    Why is accessand identity management important to digitisation? Why digitise?
  • 3.
    Borrowing from SimonTanner (1)… Digitisation democratises access to the arts Copyright: Getty Images from the Education Image Gallery
  • 4.
    Borrowing from SimonTanner (2)… Digitisation safeguards cultural artifacts under risk of destruction Copyright: Getty Images from the Education Image Gallery
  • 5.
    Borrowing from SimonTanner (3)… Digitisation nurtures notions of ‘home and family’ by dealing with diaspora, displacement and cultural identity Copyright: Getty Images from the Education Image Gallery
  • 6.
    Access and identityare at the heart of digitisation Safeguarding Access and Nurturing Identity
  • 7.
    JISC Programmes andAccess to Digitised Materials Digitisation Preservation Presentation Access Management
  • 8.
    Safeguarding Access andNurturing Identity
  • 9.
  • 10.
    “ How dowe make a lot of stuff useful to a lot of people?” (with thanks to Chris Batt) Safeguarding Access and Nurturing Identity A Universal Right to Knowledge Connecting People to Resources Stuff and people accessing stuff need managing
  • 11.
    Why do Ineed to manage access? … free at the point of use Administrative – repositories / deposit Restricted rights on materials – attribute management Presentation Copyright: Getty Images from the Education Image Gallery
  • 12.
    Why do Ineed to manage access?...digitising but not delivering Who is responsible for rights management? Who is responsible for metadata creation? What experience do you want the end user to have?
  • 13.
    It’s all aboutpresentation, presentation, presentation
  • 14.
    It’s all aboutme: web 2.0 and digitisation
  • 15.
    Web 2.0 isIdentity 2.0
  • 16.
  • 17.
    But do youknow who I am? See team blog for more information on identity use online: http://involve.jisc.ac.uk/wpmu/jam/
  • 18.
    Trusted Access ConnectingPeople to Resources Trust in authenticity and value of resource Trust is a two way relationship
  • 19.
    Trusted access canbe as invisible to end-users as pure running water
  • 20.
    JISC Access ManagementTeam: [email_address] www.jisc.ac.uk/federation [email_address]