Presentation Open Access

Hacking heritage: exploring the limits of access

Sherratt, Tim


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/a51f681a-602d-4a99-952f-9ec6737681a4/hacking-heritage-openglamnow.pdf"
      }, 
      "checksum": "md5:eed664e974607b9e0d23711c2a6ac583", 
      "bucket": "a51f681a-602d-4a99-952f-9ec6737681a4", 
      "key": "hacking-heritage-openglamnow.pdf", 
      "type": "pdf", 
      "size": 19507334
    }
  ], 
  "owners": [
    81236
  ], 
  "doi": "10.5281/zenodo.3552266", 
  "stats": {
    "version_unique_downloads": 76.0, 
    "unique_views": 243.0, 
    "views": 264.0, 
    "version_views": 264.0, 
    "unique_downloads": 76.0, 
    "version_unique_views": 243.0, 
    "volume": 1638616056.0, 
    "version_downloads": 84.0, 
    "downloads": 84.0, 
    "version_volume": 1638616056.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3552266", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3552265", 
    "bucket": "https://zenodo.org/api/files/a51f681a-602d-4a99-952f-9ec6737681a4", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3552265.svg", 
    "html": "https://zenodo.org/record/3552266", 
    "latest_html": "https://zenodo.org/record/3552266", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3552266.svg", 
    "latest": "https://zenodo.org/api/records/3552266"
  }, 
  "conceptdoi": "10.5281/zenodo.3552265", 
  "created": "2019-11-25T10:16:53.902348+00:00", 
  "updated": "2020-01-30T08:34:55.716317+00:00", 
  "conceptrecid": "3552265", 
  "revision": 4, 
  "id": 3552266, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3552266", 
    "description": "<p>Invited webinar presentation in the Swedish National Heritage Board&#39;s #OpenGLAMNow series, 25 November 2019.</p>\n\n<p>Access is constructed by technology, by history, by funding, by institutional practices, by commercial interests. Hacking GLAM collections is a way of understanding how they&rsquo;ve been constructed, of exploring their limits, and, if there are problems, of finding possible workarounds.</p>", 
    "language": "eng", 
    "title": "Hacking heritage: exploring the limits of access", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3552265"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3552266"
          }
        }
      ]
    }, 
    "keywords": [
      "Trove", 
      "GLAM Workbench", 
      "APIs", 
      "digital collections"
    ], 
    "publication_date": "2019-11-25", 
    "creators": [
      {
        "orcid": "0000-0001-7956-4498", 
        "name": "Sherratt, Tim"
      }
    ], 
    "access_right": "open", 
    "resource_type": {
      "type": "presentation", 
      "title": "Presentation"
    }, 
    "related_identifiers": [
      {
        "scheme": "url", 
        "identifier": "https://slides.com/wragge/hacking-heritage-openglamnow", 
        "relation": "isDerivedFrom", 
        "resource_type": "presentation"
      }, 
      {
        "scheme": "url", 
        "identifier": "https://www.raa.se/in-english/events-seminars-and-cultural-experiences/open-digital-heritage/", 
        "relation": "isReferencedBy", 
        "resource_type": "other"
      }, 
      {
        "scheme": "url", 
        "identifier": "https://youtu.be/zwxruQCvNO4", 
        "relation": "isSupplementedBy", 
        "resource_type": "video"
      }, 
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3552265", 
        "relation": "isVersionOf"
      }
    ]
  }
}
264
84
views
downloads
All versions This version
Views 264264
Downloads 8484
Data volume 1.6 GB1.6 GB
Unique views 243243
Unique downloads 7676

Share

Cite as