Book section Open Access

Hacking Heritage: Understanding the Limits of Online Access

Sherratt, Tim


Dublin Core Export

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
  <dc:creator>Sherratt, Tim</dc:creator>
  <dc:date>2019-11-18</dc:date>
  <dc:description>As cultural heritage collections become available online they carry the promise of ‘access’ – new audiences, new uses, new understandings. But access is never simply open. Limits are imposed, structures are defined, categories are created. Decisions are made about what gets digitised and why. This chapter will describe a series of experiments within online cultural heritage collections to investigate the meaning of access. What happens, for example, if we invert the usual processes of discovery and focus on records in the National Archives of Australia that have been withheld from public view? What does our history look like if we restrict our gaze only to resources that have been digitised? By manipulating the contexts of cultural heritage collections we can start to see their limits and biases. By hacking heritage we can move beyond search interfaces and image galleries to develop an understanding of what’s missing.</dc:description>
  <dc:description>Author Accepted Manuscript version of chapter 10 in Lewi, H. (Ed.), Smith, W. (Ed.), vom Lehn, D. (Ed.), Cooke, S. (Ed.).
(2019). The Routledge International Handbook of New Digital Practices in Galleries, Libraries, Archives, Museums and
Heritage Sites. London: Routledge, https://doi.org/10.4324/9780429506765</dc:description>
  <dc:identifier>https://zenodo.org/record/5035855</dc:identifier>
  <dc:identifier>10.5281/zenodo.5035855</dc:identifier>
  <dc:identifier>oai:zenodo.org:5035855</dc:identifier>
  <dc:language>eng</dc:language>
  <dc:publisher>Routledge</dc:publisher>
  <dc:relation>doi:10.5281/zenodo.3544989</dc:relation>
  <dc:relation>doi:10.4324/9780429506765</dc:relation>
  <dc:relation>url:https://timsherratt.org/blog/hacking-heritage/</dc:relation>
  <dc:relation>doi:10.5281/zenodo.5035854</dc:relation>
  <dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
  <dc:rights>https://creativecommons.org/licenses/by/4.0/legalcode</dc:rights>
  <dc:subject>Trove</dc:subject>
  <dc:subject>National Archives of Australia</dc:subject>
  <dc:subject>access</dc:subject>
  <dc:subject>GLAM</dc:subject>
  <dc:subject>digital collections</dc:subject>
  <dc:title>Hacking Heritage: Understanding the Limits of Online Access</dc:title>
  <dc:type>info:eu-repo/semantics/bookPart</dc:type>
  <dc:type>publication-section</dc:type>
</oai_dc:dc>
502
309
views
downloads
All versions This version
Views 502502
Downloads 309309
Data volume 263.5 MB263.5 MB
Unique views 418418
Unique downloads 265265

Share

Cite as