digitisation, access and identity management

20
Joint Information Systems Committee Connecting People to Resources The importance of access and identity management to digitisation

Upload: jiscam

Post on 15-Nov-2014

2.293 views

Category:

Business


0 download

DESCRIPTION

Presentation given at the JISC Digitisation Conference.

TRANSCRIPT

Page 1: Digitisation, Access and Identity Management

Joint Information Systems Committee

Connecting People to ResourcesThe importance of access and identity management to digitisation

Page 2: Digitisation, Access and Identity Management

Joint Information Systems Committee

Why is access and identity management important to digitisation?

Why digitise?

Page 3: Digitisation, Access and Identity Management

Joint Information Systems Committee

Borrowing from Simon Tanner (1)…

Digitisation democratises access to the arts

Copyright: Getty Images from the Education Image Gallery

Page 4: Digitisation, Access and Identity Management

Joint Information Systems Committee

Borrowing from Simon Tanner (2)…

Digitisation safeguards cultural artifacts under risk of destruction

Copyright: Getty Images from the Education Image Gallery

Page 5: Digitisation, Access and Identity Management

Joint Information Systems Committee

Borrowing from Simon Tanner (3)…

Digitisation nurtures notions of ‘home and family’ by dealing with diaspora, displacement and cultural identity

Copyright: Getty Images from the Education Image Gallery

Page 6: Digitisation, Access and Identity Management

Joint Information Systems Committee

Access and identity are at the heart of digitisation

Safeguarding Access and Nurturing Identity

Page 7: Digitisation, Access and Identity Management

Joint Information Systems Committee

JISC Programmes and Access to Digitised Materials

Digitisation

PreservationPresentation

Access Management

Page 8: Digitisation, Access and Identity Management

Joint Information Systems Committee

Safeguarding Access and Nurturing Identity

Page 9: Digitisation, Access and Identity Management

Joint Information Systems Committee

Digitisation Disasters

Page 10: Digitisation, Access and Identity Management

Joint Information Systems Committee

“How do we make a lot of stuff useful to a lot of people?” (with thanks to Chris Batt)

Safeguarding Access and Nurturing Identity

A Universal Right to Knowledge

Connecting People to Resources

Stuff and people accessing stuff need managing

Page 11: Digitisation, Access and Identity Management

Joint Information Systems Committee

Why do I need to manage access? … free at the point of use

Administrative – repositories / deposit

Restricted rights on materials – attribute management

Presentation

Copyright: Getty Images from the Education Image Gallery

Page 12: Digitisation, Access and Identity Management

Joint Information Systems Committee

Why do I need to manage access?...digitising but not delivering

Who is responsible for rights management?

Who is responsible for metadata creation?

What experience do you want the end user to have?

Page 13: Digitisation, Access and Identity Management

Joint Information Systems Committee

It’s all about presentation, presentation, presentation

Page 14: Digitisation, Access and Identity Management

Joint Information Systems Committee

It’s all about me: web 2.0 and digitisation

Page 15: Digitisation, Access and Identity Management

Joint Information Systems Committee

Web 2.0 is Identity 2.0

Page 16: Digitisation, Access and Identity Management

Joint Information Systems Committee

It’s all about me

Page 17: Digitisation, Access and Identity Management

Joint Information Systems Committee

But do you know who I am?

See team blog for more information on identity use online: http://involve.jisc.ac.uk/wpmu/jam/

Page 18: Digitisation, Access and Identity Management

Joint Information Systems Committee

Trusted Access

Connecting People to Resources

Trust in authenticity and value of resource

Trust is a two way relationship

Page 19: Digitisation, Access and Identity Management

Joint Information Systems Committee

Trusted access can be as invisible to end-users as pure running water

Page 20: Digitisation, Access and Identity Management

Joint Information Systems Committee

JISC Access Management Team: [email protected]

www.jisc.ac.uk/federation

[email protected]