{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2019-11-25T10:16:53.902348+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "hacking-heritage-openglamnow.pdf": { "checksum": "md5:eed664e974607b9e0d23711c2a6ac583", "ext": "pdf", "id": "64ef5714-3b4a-4ad5-94b8-a417727d0cca", "key": "hacking-heritage-openglamnow.pdf", "metadata": null, "mimetype": "application/pdf", "size": 19507334 } }, "order": [], "total_bytes": 19507334 }, "id": "3552266", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/3552266/access", "access_links": "https://zenodo.org/api/records/3552266/access/links", "access_request": "https://zenodo.org/api/records/3552266/access/request", "access_users": "https://zenodo.org/api/records/3552266/access/users", "archive": "https://zenodo.org/api/records/3552266/files-archive", "archive_media": "https://zenodo.org/api/records/3552266/media-files-archive", "communities": "https://zenodo.org/api/records/3552266/communities", "communities-suggestions": "https://zenodo.org/api/records/3552266/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.3552266", "draft": "https://zenodo.org/api/records/3552266/draft", "files": "https://zenodo.org/api/records/3552266/files", "latest": "https://zenodo.org/api/records/3552266/versions/latest", "latest_html": "https://zenodo.org/records/3552266/latest", "media_files": "https://zenodo.org/api/records/3552266/media-files", "parent": "https://zenodo.org/api/records/3552265", "parent_doi": "https://zenodo.org/doi/10.5281/zenodo.3552265", "parent_html": "https://zenodo.org/records/3552265", "requests": "https://zenodo.org/api/records/3552266/requests", "reserve_doi": "https://zenodo.org/api/records/3552266/draft/pids/doi", "self": "https://zenodo.org/api/records/3552266", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.3552266", "self_html": "https://zenodo.org/records/3552266", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:3552266/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:3552266/sequence/default", "versions": "https://zenodo.org/api/records/3552266/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "creators": [ { "person_or_org": { "family_name": "Sherratt", "given_name": "Tim", "identifiers": [ { "identifier": "0000-0001-7956-4498", "scheme": "orcid" } ], "name": "Sherratt, Tim", "type": "personal" } } ], "description": "
Invited webinar presentation in the Swedish National Heritage Board's #OpenGLAMNow series, 25 November 2019.
\n\nAccess is constructed by technology, by history, by funding, by institutional practices, by commercial interests. Hacking GLAM collections is a way of understanding how they’ve been constructed, of exploring their limits, and, if there are problems, of finding possible workarounds.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2019-11-25", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "https://slides.com/wragge/hacking-heritage-openglamnow", "relation_type": { "id": "isderivedfrom", "title": { "de": "Wird abgeleitet von", "en": "Is derived from" } }, "resource_type": { "id": "presentation", "title": { "de": "Pr\u00e4sentation", "en": "Presentation" } }, "scheme": "url" }, { "identifier": "https://www.raa.se/in-english/events-seminars-and-cultural-experiences/open-digital-heritage/", "relation_type": { "id": "isreferencedby", "title": { "de": "Wird referenziert von", "en": "Is referenced by" } }, "resource_type": { "id": "other", "title": { "de": "Sonstige", "en": "Other" } }, "scheme": "url" }, { "identifier": "https://youtu.be/zwxruQCvNO4", "relation_type": { "id": "issupplementedby", "title": { "de": "Wird erg\u00e4nzt durch", "en": "Is supplemented by" } }, "resource_type": { "id": "video", "title": { "de": "Video/Audio", "en": "Video/Audio" } }, "scheme": "url" } ], "resource_type": { "id": "presentation", "title": { "de": "Pr\u00e4sentation", "en": "Presentation" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Trove" }, { "subject": "GLAM Workbench" }, { "subject": "APIs" }, { "subject": "digital collections" } ], "title": "Hacking heritage: exploring the limits of access" }, "parent": { "access": { "owned_by": { "user": 81236 } }, "communities": {}, "id": "3552265", "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.3552265", "provider": "datacite" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.3552266", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:3552266", "provider": "oai" } }, "revision_id": 4, "stats": { "all_versions": { "data_volume": 2867578098.0, "downloads": 147, "unique_downloads": 136, "unique_views": 414, "views": 450 }, "this_version": { "data_volume": 2633490090.0, "downloads": 135, "unique_downloads": 125, "unique_views": 394, "views": 426 } }, "status": "published", "updated": "2020-01-30T08:34:55.716317+00:00", "versions": { "index": 1, "is_latest": true } }