Book section Open Access

Hacking Heritage: Understanding the Limits of Online Access

Sherratt, Tim


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Trove</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">National Archives of Australia</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">access</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">GLAM</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">digital collections</subfield>
  </datafield>
  <controlfield tag="005">20210628134812.0</controlfield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Author Accepted Manuscript version of chapter 10 in Lewi, H. (Ed.), Smith, W. (Ed.), vom Lehn, D. (Ed.), Cooke, S. (Ed.).
(2019). The Routledge International Handbook of New Digital Practices in Galleries, Libraries, Archives, Museums and
Heritage Sites. London: Routledge, https://doi.org/10.4324/9780429506765</subfield>
  </datafield>
  <controlfield tag="001">5035855</controlfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">852659</subfield>
    <subfield code="z">md5:474673ea0b614e594585ce0999582bbb</subfield>
    <subfield code="u">https://zenodo.org/record/5035855/files/Sherratt_GLAM_Digi_AAM.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-11-18</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5035855</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">University of Canberra</subfield>
    <subfield code="0">(orcid)0000-0001-7956-4498</subfield>
    <subfield code="a">Sherratt, Tim</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Hacking Heritage: Understanding the Limits of Online Access</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;As cultural heritage collections become available online they carry the promise of &amp;lsquo;access&amp;rsquo; &amp;ndash; new audiences, new uses, new understandings. But access is never simply open. Limits are imposed, structures are defined, categories are created. Decisions are made about what gets digitised and why. This chapter will describe a series of experiments within online cultural heritage collections to investigate the meaning of access. What happens, for example, if we invert the usual processes of discovery and focus on records in the National Archives of Australia that have been withheld from public view? What does our history look like if we restrict our gaze only to resources that have been digitised? By manipulating the contexts of cultural heritage collections we can start to see their limits and biases. By hacking heritage we can move beyond search interfaces and image galleries to develop an understanding of what&amp;rsquo;s missing.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isNewVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.3544989</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isPartOf</subfield>
    <subfield code="a">10.4324/9780429506765</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">url</subfield>
    <subfield code="i">isDocumentedBy</subfield>
    <subfield code="a">https://timsherratt.org/blog/hacking-heritage/</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.5035854</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="g">116-130</subfield>
    <subfield code="b">Routledge</subfield>
    <subfield code="a">London</subfield>
    <subfield code="z">9780429506765</subfield>
    <subfield code="t">The Routledge International Handbook of New Digital Practices in Galleries, Libraries, Archives, Museums and  Heritage Sites</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.5035855</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">section</subfield>
  </datafield>
</record>
502
309
views
downloads
All versions This version
Views 502502
Downloads 309309
Data volume 263.5 MB263.5 MB
Unique views 418418
Unique downloads 265265

Share

Cite as