Librarians Rock

The general image of the librarian is definitely uncool but this image has been changing for a long time. When the New York Times published its article A Hipper Crowd of Shushers last week (8 July) this was a sign of the times.

Librarians? Arenâ??t they supposed to be bespectacled women with a love of classic books and a perpetual annoyance with talkative patrons â?? the ultimate humorless shushers?

Not any more. With so much of the job involving technology and with a focus now on finding and sharing information beyond just what is available in books, a new type of librarian is emerging…

How did such a nerdy profession become cool â?? aside from the fact that a certain amount of nerdiness is now cool? Many young librarians and library professors said that the work is no longer just about books but also about organizing and connecting people with information, including music and movies.

The upcoming documentary The Hollywood Librarian (release 29 September) will also become part of the way in which the perception of librarians is changing.

Instead of being only the strict formal organizer the librarian is actually on the forefront of several important debates in the information society. The questions of access to knowledge, privacy, free speech, open access and parts of the DRM debate are being lively discussed among librarians.

How DRM Becomes Law

Cory Doctorow has written a short must read article on how DRM becomes law in Information Week. I know that there is a lot of stuff out there which is must-read but DRM is really important. It has already reached a point where the regulation of our access and use of technology is controlled not by a transparent process of law and regulation but by the interests and technology of those who manufacture technology.

Imagine if road traffic where regulated by the groups who made asphalt, air-traffic by airplane manufacturers and what you could say on the phone was controlled by the mobile phone companies! Nobody would agree to that. And yet we accept DRM.

By the way, Cory also has the most decorated laptop I have ever seen. I just had to take a picture of it in Dubrovnik.

 

Moving South

Over the last several years I have been based at the University of Göteborg working as a lecturer and carrying out my research. Last year my research resulted in the defense of my thesis. During my time at Göteborg I have managed to be a researcher in Italy, a visiting fellow in England, I joined the Free Software Foundation and became project lead for Creative Commons Sweden.

In recent years I have come to focus greatly on copyright and open access questions so it was with great interest that I applied for a role in an open access project based at the University of Lund. Yesterday I was offered (and accepted the position).

The main thrust of my work will be:

  • The analysis of copyright interpretation and practice at Swedish universities.
  • The study of the relationship between copyright law and license agreements.
  • An analysis of the relation between authors/researchers, university departments and publishers.
  • Developing proposals and recommendations to deal with the complex of copyright problems that exist in scientific communication.

This all means that after the summer most of my work will be based at the University of Lund. Lund is one of the oldest universities in Sweden (established 1666) and it is one of the driving forces in the open access arena. But, fortunately for me I will also be able to keep a small position at the University of Göteborg.

Photo Al Monner (1935) Historic photoarchive

Six questions about open standards

The question of open standards is a challenging and important one. Unfortunately most people tend to lose interest very quickly when standards are being discussed.

The FSFE has presented six questions which national standardisation bodies should ask before adopting the ECMA/MS-OOXML format as an IEC/ISO standard. Unless a national standardisation body has conclusive and affirmative answers to all of them, it should vote no in IEC/ISO and request that Microsoft incorporate its work on MS-OOXML into ISO/IEC 26300:2006 (Open Document Format).

1. Application independence?

No standard should ever depend on a certain operating system, environment or application. Application and implementation independence is one of the most important properties of all standards.

Is the MS-OOXML specification free from any references to particular products of any vendor and their specific behaviour?

2. Supporting pre-existing Open Standards?

Whenever applicable and possible, standards should build upon previous standardisation efforts and not depend on proprietary, vendor-specific technologies.

MS-OOXML neglects various standards, such as MathML and SVG, which are recommendations by the W3C, and uses its own vendor-specific formats instead. This puts a substantial burden on all vendors to follow Microsoft in its proprietary infrastructure built over the past 20 years in order to fully implement MS-OOXML. It seems questionable how any third party could ever implement them equally well.

What is the benefit of accepting usage of such vendor-specific formats at the expense of standardisation in these areas? Where will other vendors get competitive, compatible and complete implementations for all platforms to avoid prohibitively large investments?

3. Backward compatibility for all vendors?

One of the alledged main advantages of MS-OOXML is its ability to allow for backward compatibility, as also referenced in the ECMA International press release.

For any standard it is essential that it is implementable by any third party without necessity of cooperation by another company, additional restricted information or legal agreements or indemnifications. It is also essential to not require the cooperation of any competitor to achieve full and comparable interoperability.

On the grounds of the existing MS-OOXML specification, can any third party regardless of business model, without access to additional information and without the cooperation of Microsoft implement full backward compatibility and conversion of such legacy documents into MS-OOXML comparable to what Microsoft can offer?

4. Proprietary extensions?

Proprietary, application-specific extensions are a known technique employed in particular by Microsoft to abuse and leverage its desktop monopoly into neighboring markets. It is a technique at the heart of the abusive behaviour that was at the core of the decision against Microsoft by the European Commission in 2004 and Microsoft is until today continuing its refusal to release the necessary interoperability information.

For this reason, it is common understanding that Open Standards should not allow such proprietary extensions, and that such market-distorting techniques should not be possible on the grounds of an Open Standard.
Does MS-OOXML allow proprietary extensions? Is Microsoft’s implementation of MS-OOXML faithful, i.e. without undocumented extensions? Are there safeguards against such abusive behaviour?

5. Dual standards?

The goal of all standardisation is always to come to one single standard, as multiple standards always provide an impediment to competition. Seeming competition on the standard is truly a strategic measure to gain control over certain segments of a market, as various examples in the past have demonstrated.

There is an existing Open Standard for office documents, namely the Open Document Format (ODF) (ISO/IEC 26300:2006). Both MS-OOXML and ODF are built upon XML technology, so employ the same base technology and thus ultimately have the same theoretical capabilities. Microsoft itself is a member of OASIS, the organisation in which the ODF standard was developed and is being maintained. It was aware of the process and invited to participate.

Why did and does Microsoft refuse to participate in the existing standardisation effort? Why does it not submit its technological proposals to OASIS for inclusion into ODF?

6. Legally safe?

Granting all competitors freedom from legal prosecution for implementation of a standard is essential. Such a grant needs to be clear, reliable and wide enough to cover all activities necessary to achieve full interoperability and allow a level playing field for true competition on the merits.

MS-OOXML is accompanied by an unusually complex and narrow “covenant not to sue” instead of the typical patent grant. Because of its complexity, it does not seem clear how much protection from prosecution for compatibility it will truly provide.

Cursory legal study implies that the covenant does not cover all optional features and proprietary formats mandatory for complete implementation of MS-OOXML. So freedom of implementation by all competitors is not guaranteed for the entire width of the proposed MS-OOXML format, and questionable even for the core components.

Does your national standardisation body have its own, independent legal analysis about the exact nature of the grant to certify whether it truly covers the full spectrum of all possible MS-OOXML implementations?

All these questions should have answers that should be provided by the national standardisation bodies through independent counsel and experts, and in particular not by Microsoft or its business partners, which have a direct conflict of interest on this issue. If there is no good answer to any one of them, a national body should vote no in ISO/IEC.

Theories, Movement & Collected Stories

James Boyle has just given an excellent presentation on what the environmental movement did right. He points to the right mix of theory, movements and the collection of stories in the creation of the concept of the environment. The environment as a concept did not exist prior to its creation, establishment and acceptance in the wider public.

What he means is that the movement to protect public domain and develop creative commons requires more than the creation of licenses and preaching to the choir. The theory is required as a base but the broader public does not want to read theory. Therefore what is required is a movement of people to enable the transfer of dry theory in the communication to the public.

How should this be done? Well the environmental movement added a collection of stories. Individual examples of environmental damage. Burning streams, smog cities, nuclear waste and silent springs. The collection of stories have become established and iconic. They are established in the mental image of the public to such a degree that protection of the environment becomes an obvious step.

So, in order to establish the protection of the public domain, open access and creative commons the organisations working with these issues should look at the strategies of the environmental movement.

Politics of Regulation – Violent games

The EU met yesterday to discuss the regulation of violent computer games to minors. This follows situations such as the German guman who last year shot several people before taking his life at a secondary school.

A European Union Commissioner, taking advantage of the shootings last year, has called for stricter regulations in the video game industry. A motion introduced last month calls for legislators to â??put in place all necessary measures to ban the sale of particularly violent and cruel video games.â?? (From Lawbean)

The impact of violent games, films and magazines on people (in particular impressionable minors) is questionable. Researchers have found results both to support and to deny any serious impact. The main problem is that no real study can be undertaken to ensure reliable data.

A research method would be to take two groups of children and allow one full access to violence while the other group was fed with “better” material. The drawback with this method is that it would (if true) require the creation of a group of disturbed people.

The next drawback is that the interpretation of the results would also be under question. Are the children being affected by the violence in the games or simply by the long use of computers and/or television?  Would long term exposure for long periods to peaceful activities (flower arrangement?) not lead to an equally a-social development?

This is not to say that I find the regulation of violent computer games to be a wrong goal. I just dislike bad science and the misuse of “scientific data” for political goals.

Harvard Thesis Repository

With so many discussions on Free Culture, Open Access and the problems connected with making academic publishing available outside academia it is surprising how few good places there are to find thesis’ online.

This is why I was happy when Peter Murray-Rust pointed me towards the Harvard College Thesis Repository (a project of Harvard College Free Culture).

Here Harvard students make their senior theses accessible to the world, for the advancement of scholarship and the widening of open access to academic research.

Too many academics still permit publishers to restrict access to their work, needlessly limitingâ??cutting in half, or worseâ??readership, research impact, and research productivity. For more background, check out our op-ed article in The Harvard Crimson.

If you’ve written a thesis in Harvard College, you’re invited to take a step toward open access right here, by uploading your thesis for the world to read. (If you’re heading for an academic career, this can even be a purely selfish moveâ??a first taste of the greater readership and greater impact that comes with open access.)
If you’re interested in what the students at (ahem) the finest university in the world have to say at the culmination of their undergraduate careers, look around.

The FAQ explains much of the process. It is also good to see that they are applying Creative Commons Attribution License

Q. What permissions do I have to grant to free my thesis?

A. To make sure your thesis is always available for scholars to build on, we ask that you give everyone permission to do the things you’d want to be able to do with a scholarly work you liked: download the work, read it, keep copies, share it with other people, and adapt it into fresh works. The specific legal permission we ask for is the Creative Commons Attribution License, the same one required by the world’s leading biology journal PLoS Biology and the other journals of the Public Library of Science.

My only (small) complaint is that I wish the repository was clearer in showing the license terms for their content. I only found it in the faq. Normally I would not bother reading the faq. To increase the usability of the site the terms should be on the download page and preferably on the essay file.
Despite this I think this is an excellent initiative and I would hope that the fact that Harvard has taken a step such as this would work as an incentive for other universities to follow suite.

Army 2.0

You might be excused for getting the impression that the US military is struggling to understand how they should be using Internet technology. On the one hand they recently began an effort to control what their soldiers are posting online (War blogs silenced) and now they have blocked access to sites such as YouTube and Myspace.

The reason for this? Bandwidth.

The US says the use is taking up too much bandwidth and slows down the military’s computer system.

But a US Strategic Command spokesman said a “secondary benefit” was to help operational security.

At the same time the military have realised the potential impact of sites such as YouTube and have started putting material online.

The Pentagon only recently started posting its own videos on YouTube, showing soldiers in action in Iraq in a move designed to reach out to a younger audience and to show the successes of the US military. (More on this over here).

But the best quote in this BBC article is the honest: “The cyberspace battle space was not one that we were particularly operating well in” Lt Col Christopher Garver, US Army.

Yes… we have noticed…

Lex Ferenda has more including the order (AP report | full text of order) and a increased list of blocked sites:

â??To maximize the availability of DoD network resources for official government usage, the Commander, JTF-GNO, with the approval of the Department of Defense, will block worldwide access to the following internet sites beginning on or about 14 May 2007.â??

www.youtube.com
www.1.fm
www.pandora.com
www.photobucket.com
www.myspace.com
www.live365.com
www.hi5.com
www.metacafe.com
www.mtv.com
www.ifilm.com
www.blackplanet.com
www.stupidvideos.com
www.filecabi.com

Libraries and Copyright

Copyright has a tendency to make library work difficult. This is a growing trend and many of the larger libraries in the world are struggling to come to terms with copyright issues.

Yesterday the EU’s High Level Expert Group on Digital Libraries – which includes, inter alia, stakeholders from the British Library, the Deutsche Nationalbibliothek, the Federation of European Publishers and Google – presented an advisory report on copyright issues to the European Commission.

The group also discussed how to ensure more open access to scientific research and how to improve public-private cooperation. The work of the High Level Group is part of the European Commission’s efforts to make Europe’s rich cultural and scientific heritage available online. For this purpose, the group advises the Commission on issues regarding digitisation, online accessibility and digital preservation of cultural material.

Read their Report on Digital Preservation, Orphan Works and Out-of-Print Works, Selected Implementation Issues available here and the annex Model agreement for a licence on digitisation of out of print works available here.

(EU Press Release)

Stealing Wifi

A man in the UK has been fined £500 and sentenced to 12 monthsâ?? conditional discharge for illegally using someone elseâ??s open wifi (an offence under the Computer Misuse Act see more on note below*). These (one and two) BBC stories gives more information on this but it also includes lots of interesting pre-suppositions about the dangers of open wireless Internet access points.

The main arguments in the BBC stories are that the use of someone elseâ??s wifi is mainly to enter into illegal porn sites, launch hack attacks, to steal information or worse.

Is this really what people try to do on other peoples networks? My experience is that most unauthorized wifi use is travelers checking email, or neighbors using each otherâ??s nets out of sheer incompetence. Naturally there are always going to be nasty people attempting to abuse openness but how bad can it be?

Phil Cracknell has called for an awareness campaign to inform of the dangers of openness â?? â??The perception in the past has been that borrowing a bit of bandwidth is cheeky but not really criminal behaviourâ??. But then again Phil Cracknell is chief technology officer of security firm NetSurity and may be a bit interested in increasing our perception of insecurity.

Most of the people I come into contact with (ok, so I hang with the wrong crowd) donâ??t believe that borrowing bandwidth is cheeky â?? itâ??s a simple act that does not harm anyone.

Using anything for an illegal activity is however illegal and should be punished.

* Added 23 April

Stealing wifi is actually an offence under the Communications Act of 2003. To be an offence under the Computer Misuse Act there has to be more than simple wifi use. Basically the Computer Misuse Act requires an unauthorised entry into the computer system. This is similar to Swedish law where “only” using someone’s wifi is not an offence while entering into someone’s system without authorisation is an offence (DatorintrÃ¥ng). This difference is quite subtle and should be investigated further since it could be argued that it is not possible to use wifi without unlawful entry.