37 cc 3_c_j-dillon
TRANSCRIPT
PowerPoint Presentation
Digital Delivery in a Post DMCA World:
Challenges & OpportunitiesJoseph F. DillonDIRECTOR, SALES
ADMINISTRATION, IEEE 30 May 2003 2003 IEEE
309.bin
And I Quote
The Internet and its most famous child, the World Wide Web, have genuinely transformed expectations of what and how data and information should be accessible.
Scientific Databases IEEE Computing in Science and Engineering - May 2003Norman Chonacky
IEEE Has Its Roots in
High Tech Entrepreneurs
Founding officers of the American Institute of Electrical Engineers in 1884 include:
IEEE Has Its Roots in
High Tech Entrepreneurs
Founding members of the Institute of Radio Engineers in 1912
included:These two organizations merged in 1963
to form the IEEE
IEEE Members Are Leaders
of Today and Tomorrow
Mission Meets Reality
in the Digital Age
To serve IEEE members
382,000 and growingTo disseminate information worldwide
Publish high-quality material at below average prices
The digital age has made this easier and more challenging than ever!
The Rewards of the Digital Age
(Or So They Tell Me)Increased revenue stream Ability to reach users
who are actively interested in your contentIncreased citations
Improved brand recognition in marketplaceCloser relationships with partner organizations
IEEE Information is Used
Around the World
Academic
Corporate
Government
Total
Pacific Rim
21%
3%
2%
26%
Europe
12%
4%
1%
17%
Middle East/India
1%
0%
1%
2%
S./Central America
5%
0%
0%
5%
North America
13%
28%
9%
50%
% of Total
53%
35%
12%
100%
For Individuals and Customers
Develop use permissions and policies with customers
SPARC Licensing InitiativeAnnual review of license by LACPolicies & licenses not written in legalese
Use copyright law as the basis for policyProvide key policies in local languages
For Individuals and Customers
Offer Multiple Avenues of Availability
Ask*IEEE service with InfotrieveSingle Article Sales through IEEE XplorePartnering with trusted customers to provide document delivery services to a broader audienceBritish LibraryCISTI
Protection Behind the Scenes
Limit simultaneous usage by IPMonitor system performance for suspicious activity
Send notices out to suspected abusersSuspend access if egregious as a last resortWork with librarians to find suspected abusers
They take copyright as seriously as we do
And I quotewe have presented copyright as a set of dense, technical rules about how to comply with the law without ever explaining why anyone should bother, as if the mere existence of the law made clarification of its purpose irrelevant. Copyright: It's for the Public Good, Chronicle of Higher Education, May 2003 Peter Givler.