dr. v.j. suseela indira gandhi memorial library university of hyderabad impact of license agreements...

Click here to load reader

Upload: clare-davis

Post on 02-Jan-2016

215 views

Category:

Documents


1 download

TRANSCRIPT

Impact of License Agreements on the Use of E-Resources in Indian Universities

Dr. V.J. SuseelaIndira Gandhi Memorial LibraryUniversity of HyderabadImpact of License Agreements on The Use of E-Resources in Indian Universities

E-Publishing ActivitiesPublishers Initiatives Users PreferencesCost Benefit Calculations Librarys SubscriptionsConsortia Formations

Innumerable E-Resources are availabile to Academic Community in UniversitiesFactors Facilitating Online Access

( Online Access Issues in Indian Universities) Influencing Factors Subscription or renewal delaysDiscontinuing subscriptionNo perpetual accessBack up is not assuredChanges in the distribution of access and content by the publishers Merger of publishers Change of license terms in Societies/publishersChanges in campus network structure and IP addressesIP RestrictionsIP AuthenticationsLegal AgreementsIP blocks for violating fair use terms stipulated by the publishers / vendors.

Paper Discusses AboutThe contours of online accessThe legal provisions The access models presently operated by the publishers or aggregators citing the case of University of Hyderabad And suggest an appropriate model relevant exclusively for university environment. MultidisciplinaryMultiple levels of awarenessMultiple levels of usersFloating populationMeans of Online AccessLibrarys direct subscriptions Activation of institution licenses with print subscriptions Consortia subscriptions for their member libraries.Trial AccessSubscription for free access to the data / documentsOpen accessLegal Agreements ContainNames, addresses and signature of both licensee and licensor with sealPeriod of licenseNumber of licenses or usersIP rangeSubscription price Terms &conditions of distribution of online access and Fair-useOther service termsElectronic Resources - Legal ProvisionsAccess to Electronic Resources is governed under Legal Provisions Creative Commons US Copyright Law The Digital Millennium Copyright Act (DMCA)Impose 2 types of restrictions on its usage Authorized users for e-resources Students faculty and staff of a subscribing institutionThe responsibility of the individual users to ensure that e-resources are used for personal, educational and research purposes only.

UGC Infonet INFLIBNET Consortium AccessGuidelines for Fair UseIt should be ensured that the resource is used for educational and research purposes and not for commercial purposes.Using e-resources for scholarly, educational or scientific research, teaching, private study and clinical purposes, but Using e-resources for commercial gain is not permittedViewing, downloading, copying, printing and saving a copy of search results, but use of robots or intelligent agents to do systematic, bulk or automatic downloading is prohibited. Systematic or programmatic downloading, retention, and printing are prohibited,

UGC Infonet INFLIBNET Consortium Access Guidelines for Fair UseElectronic distribution of content is also restricted. A print copy of an article from an electronic journal can be included it in class/course pack, but multiple copies cannot be made for wide circulation. Providing electronic links on web pages to the Library's licensed resources is permitted but not the posting of PDF of an article on the website. Researcher can use and cite the source of information.The Case of University of HyderabadInfonet Consortium Resources to UOH The High Levels of UsageYearBSODFull TextDatabasesNo of full textE-ResourcesUsage of full textresources200482163923101559200582174129142174200692174720108138200781164993139436200882175406196175200982175737252149201082186157362660201183198129669253201283198129669810Infonet Consortium Resources to UOH (Database-wise Usage)Excessive Usage and IP Blocks ReasonsFloating Population, Multidisciplinary Environment, Number of ongoing research projects Lack of awareness of fair-use terms among users Neglecting internet security aspects Over enthusiasm to access more number of articlesFeeling insecurity regarding the availability of articles perpetuallyIntend to preserve the complete volume/issue of journalsIntend to help co-researchers belong to other institutionsPossibility of commercial involvement, since the individual articles are highly expensive to access by the other institutions users. Type of network, wherein the entire access from at different corners of the campus will be seen coming through a single IP, i.e. the public IP (gateway) UOH - Campus Network Structure

14Suggestions Thus the libraries need to negotiate with content providers for permanent access to the subscribed content or provide back up in the form of disks for maintaining the content over intranet or run through off line devises. So users will not be passionate to download articles for future use. The cost of the individual articles should be highly reduced to enable the users' easily purchase the access when required. The subscription price can be set based on the possible usage or unlimited usage and the number of users.

Access Monitoring The usage is being monitored only by the online administrators of the libraries and publishers, so the usage facts remain invisible unless the administrators view themCampus network should be secured and monitor the access so that it is feasible to match and analyze the log to spot out the point of excessive downloads to initiate disciplinary action. The access model need to be modified embedding the usage counter on the database/journal/article webpage. Annual Reviews (Sample Transaction File Extracted from UOH Servers)id=firewall time="2013-06-17 21:03:46" fw="NG5KXA2C0G00045" tz=+0530 startime="2013-06-17 20:58:17" pri=5 slotlevel=2 ruleid=18 user="lp11ms05"srcif="Ethernet6" srcifname="dmz5" ipproto=tcp proto=https src=10.8.19.2 srcport=57198 srcportname=ephemeral_fwdst=129.41.4.153 dstport=443 dstportname=https sent=5571 rcvd=48852 duration=319.10id=firewall time="2013-06-17 21:03:46" fw="NG5KXA2C0G00045" tz=+0530 startime="2013-06-17 20:58:15" pri=5 slotlevel=2 ruleid=18 user="lp11ms05"srcif="Ethernet6" srcifname="dmz5" ipproto=tcp proto=https src=10.8.19.2 srcport=57194 srcportname=ephemeral_fwdst=129.41.4.153 dstport=443 dstportname=https sent=6722 rcvd=89451 duration=320.92id=firewall time="2013-06-17 21:03:48" fw="NG5KXA2C0G00045" tz=+0530 startime="2013-06-17 20:58:17" pri=5 slotlevel=2 ruleid=18 user="lp11ms05"srcif="Ethernet6" srcifname="dmz5" ipproto=tcp proto=https src=10.8.19.2 srcport=57196 srcportname=ephemeral_fwdst=129.41.4.153 dstport=443 dstportname=https sent=4701 rcvd=13317 duration=320.50

AIP (Sample of Transaction File Original from Publishers)14.139.69.5 - [02-MAY-13 16:06:52] /resource/1/chaoeh/v17/i2/p026103_s1 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) pfe414.139.69.5 - [02-MAY-13 16:06:52] /link/doi/10.1063/1.2737822 302 307 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) app614.139.69.5 - [02-MAY-13 16:06:53] /error/cookies.jsp?url=http%3a//chaos.aip.org/resource/1/chaoeh/v17/i2/p026103_s1 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) 1367525212-WNMf4cOgh pfe414.139.69.5 - [02-MAY-13 16:06:53] /resource/1/chaoeh/v17/i2/p026103_s1 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) 1367525212-WNMf4cOgh pfe414.139.69.5 - [02-MAY-13 16:06:53] /sso/servlet/subsidiaryLogin?subsidiary=chaos.aip.org&url=http%3a%2f%2fchaos.aip.org%2fresource%2f1%2fchaoeh%2fv17%2fi2%2fp02610 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) 1367525212-WNMf4cOgh pfe314.139.69.5 - [02-MAY-13 16:06:54] /resource/1/chaoeh/v17/i2/p026103_s1 200 228243 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) 1367525212-WNMf4cOgh pfe414.139.69.5 - [02-MAY-13 16:06:54] /sso/servlet/primaryLogin?url=http%3a%2f%2fchaos.aip.org%2fresource%2f1%2fchaoeh%2fv17%2fi2%2fp026103_s1 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) 1367525212-WNMf4cOgh pfe314.139.69.5 - [02-MAY-13 16:06:59] /link/apcpcs/v1488/i1/p27/s1?view=fulltext&KEY=FREESR 302 339 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) app614.139.69.5 - [02-MAY-13 16:07:02] /journals/doc/APCPCS-ft/vol_1488/iss_1/27_1.html 302 0 - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; chromeframe/11.0.696.57) app6AIP (Sample Transaction File Extracted from UOH servers)Friday, May 03, 2013 12:35:51 PM.949 1959 172.16.64.137 TCP_MISS/200 7373 GET http://apl.aip.org/resource/1/applab/v83/i24/p4903_s1? ph09ph16 DIRECT/208.76.206.27 text/htmlFriday, May 03, 2013 12:35:52 PM .615 7 172.16.64.137 TCP_HIT/200 1565 GET http://apl.aip.org/css/commons/reset.css ph09ph16 NONE/- text/cssFriday, May 03, 2013 12:35:52 PM .654 1 172.16.64.137 TCP_HIT/200 5078 GET http://apl.aip.org/css/commons/jquery.css ph09ph16 NONE/- text/cssFriday, May 03, 2013 12:35:52 PM .778 4 172.16.64.137 TCP_HIT/200 958 GET http://apl.aip.org/css/commons/mathstyle.css ph09ph16 NONE/- text/cssFriday, May 03, 2013 12:35:52 PM .900 15 172.16.64.137 TCP_HIT/200 24687 GET http://apl.aip.org/js/yui/utilities.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.149 0 172.16.64.137 TCP_HIT/200 2422 GET http://apl.aip.org/js/jquery-ui-core-1.5.packed.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.156 10 172.16.64.137 TCP_HIT/200 20152 GET http://apl.aip.org/js/jquery-1.3.2.min.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.251 1 172.16.64.137 TCP_HIT/200 5178 GET http://apl.aip.org/js/jquery-ui-tabs-1.5.packed.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.572 238 172.16.64.137 TCP_MISS/404 688 GET http://apl.aip.org/js/swfobject.js ph09ph16 DIRECT/208.76.206.27 text/htmlFriday, May 03, 2013 12:35:53 PM.826 447 172.16.64.137 TCP_MISS/404 688 GET http://apl.aip.org/js/poll.js ph09ph16 DIRECT/208.76.206.27 text/htmlFriday, May 03, 2013 12:35:53 PM.854 254 172.16.64.137 TCP_REFRESH_HIT/200 720 GET http://apl.aip.org/cmlink/7.7704 ph09ph16 DIRECT/208.76.206.27 text/cssFriday, May 03, 2013 12:35:53 PM.907 6 172.16.64.137 TCP_HIT/200 5158 GET http://apl.aip.org/js/scitation.abstract.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.936 0 172.16.64.137 TCP_HIT/200 10363 GET http://apl.aip.org/js/fulltext.js ph09ph16 NONE/- application/x-javascriptFriday, May 03, 2013 12:35:53 PM.996 479 172.16.64.137 TCP_REFRESH_HIT/200 7094 GET http://apl.aip.org/cmlink/7.146 ph09ph16 DIRECT/208.76.206.27 text/cssFriday, May 03, 2013 12:35:54 PM.137 1 172.16.64.137 TCP_HIT/200 1587 GET http://apl.aip.org/js/site-min.js ph09ph16 NONE/- application/x-javascriptAccess Monitoring The usage is being monitored only by the online administrators of the libraries and publishers, so the usage facts remain invisible unless the administrators view themCampus network should be secured and monitor the access so that it is feasible to match and analyze the log to spot out the point of excessive downloads to initiate disciplinary action. The access model need to be modified embedding the usage counter on the database/journal/article webpage. Institutional SubscriptionLicensing against IPsEnabling Online AccessUsage as per Fair use TermsExcessive Usage Indication on web pageAlert Users Alert Librarians

Uninterrupted AccessE-Resources Online Access Model (Without IP Blocks)SuggestionsSince the open access trend is taking momentum and supporting campus as well as non-campus users, the best suggestion for publishers to move the content towards open access to the extent possible. The older articles can be turned open for registered researchers. Since the ownership is denied for subscribing, institutions the license agreements should categorically mention The procedures adopted in the maintenance of data in multiple locations, archiving processes and the data security methods, backup devises especially while providing perpetual access to the institutions. It should also be clearly stating the measures taken to provide access to the content if the publisher ceases to publish or maintain the content in different server or sell the same to a different publisher.Conclusion It is essential to map access points our users can get from outside the campus system and the way it is being used, wherein the user authentication, access control and resource mapping are expected to be well integrated to provide secured access. The secured access not only resolves the issues of misuse to some extent since the users (with their ID), nodes (system address) and accessed URL can be identified precisely as rightly tracked in the case of University of Hyderabad servers. Content providers too need to set up the usage counter /alerts to be able to arrest the misuse or excessive use over the campuses than allowing it to happen and suspending access thereafter. It further allows to structurally restricting access to identified user/s, than entirely blocking the facility to the genuine scholars on the campus. Dr. V.J. Suseela

Thanks for your attention