The access question Alice

نویسنده

  • David Willetts
چکیده

Access to journal content has been central to the open access (OA) debate. The European Commission has focused on ‘access and preservation’ in its planning for Horizon 2020; in the UK the Department of Business, Innovation and Skills (BIS) has set up the Finch Group (an independent working group that emerged from discussions at a round table meeting on transparency with the Rt Hon David Willetts in March 2011) to look at and report on widening access; while in the USA the Office of Science and Technology Policy (OSTP) has addressed public access. Over the past few years, a number of surveys and other studies have solicited feedback from academics, researchers, and other scholarly communication stakeholders in various countries and regions about access to research journals and/or data. These include two surveys carried out by the European Commission (EC); one by CIBER, which was commissioned and funded by JISC, the Publishing Research Consortium (PRC) and the Research Information Network (RIN); another by Outsell, commissioned by the libraries of the Australian Group of Eight Universities (Go8); and, most recently, the two Requests for Information (RFI) on public access to scholarly journals, issued by the US Office of Science & Technology Policy (OSTP). This article is an attempt to identify the common themes across all five studies, to address some seemingly contradictory findings, and to suggest some best practices for future surveys of this kind – especially important given that their findings are increasingly used to inform policy decisions which may have a major impact on some or all scholarly communication key stakeholders. Overview of the surveys and studies

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The space complexity of mirror games

We consider a simple streaming game between two players Alice and Bob, which we call the mirror game. In this game, Alice and Bob take turns saying numbers belonging to the set {1, 2, . . . , 2N}. A player loses if they repeat a number that has already been said. Bob, who goes second, has a very simple (and memoryless) strategy to avoid losing: whenever Alice says x, respond with 2N+1−x. The qu...

متن کامل

Investigating the Possibilities of Reading Literary Texts in Light of a Sociolinguistic Perspective: Applications on the Case of Alice Walker’s Selected Short Stories

The present research tries to show how race, class, and gender and intersectionality in general, have their decisive impact on the black- American women; and how Alice Walker as a womanist, in her selected short stories, tries to show that black women in the U.S. suffer two-fold acts of oppression and discrimination, i.e. male violence affects all women in social life, irrespective of age or so...

متن کامل

Determine the Effectiveness of Learning of Coping Strategies with Irrational Beliefs Based on the Theory of Rational-Emotional Alice on Attitudes to Communicate Before Married Female High School Students in Yazd- Iran

Introduction This research was done with the objective of "Determine the effectiveness of learning coping strategies with Irrational Beliefs based on the theory of rational-emotional Alice on students’ attitude toward premarital relations in Yazd city". Materials and Methods In this semi experimental research 60 female students of Yazd-Iran, selected by using of Cochran’s formula and divided in...

متن کامل

A Comparative Study of the Nursing Undergraduate Program in Iran and Alice Lee University in Singapore

Introduction: Curriculum is the heart of any educational program and the key elements of higher education for transferring knowledge, attitude, and skills to students. Comparing different educational systems will improve the content and quality of the educational program and will help to improve it .The aim of this study was to compare nursing program in Iran and Alice Lee University in Singapo...

متن کامل

Evaluating Predicates over Encrypted Data

Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword MEDICAL), and the capability allows one to evaluate the outcome of this predicate on the encrypted data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012