The Access Principle: The Case for Open Access to Research and Scholarship

نویسنده

  • Marta Gwinn
چکیده

Emerging Infectious Diseases helped pioneer open-access publishing by launching free online and print editions simultaneously in 1995. A decade later, perhaps half of the 50,000 scholarly journals are available online; however, access to the contents generally requires a subscription. Although many journals are experimenting with enhanced-access models, such as offering open access to a small selection of articles (e.g., Lancet) or making archived articles freely available 6–12 months after publication (e.g., New England Journal of Medicine), only ≈20% of all research articles are open access, and many of these are available only as self-archived manuscripts on authors’ personal websites. Meanwhile, journal subscription rates continue to escalate, strapping library budgets and restricting circulation. In this book, John Willinsky, professor of literacy and technology at the University of British Columbia, argues that access to the results of research and scholarship are a public good: information shared is not diminished; in fact, only when shared does it become knowledge. The access principle states that a commitment to research entails a responsibility to circulate the results as widely as possible. Each chapter in the book presents this principle from a different perspective, making a case for open access on philosophical, ethical, practical, economic, and technical grounds. In each instance, the contentions of open-access critics are carefully dissected, exposed, and refuted with timely and relevant data. Individual researchers concerned about losing prestige and officers of professional societies concerned about losing subscription revenue might find these arguments particularly interesting. For example, the evidence from physics, a field with wellestablished open-access publishing conventions, suggests that openaccess articles are cited more often (i.e., higher impact factor) than those available only to subscribers. Analyses of scholarly association budgets and journal management economics, which appear among the useful appendices at the end of the book, suggest that alternative publishing models could be more cost-effective than the status quo. The author does not overlook the irony of publishing this work as a book that costs $34.95, but I tend to agree that the book is still the best medium for a “thoroughgoing treatment of an issue in a single sustained piece of writing.” This book is for scholars and professionals who are interested in the idea of open access but are not yet convinced. Those who read it are likely to be surprised, engrossed, informed, and perhaps persuaded.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Structural analysis of the deck of access bridges in offshore docks under dynamic loading of moving heavy vehicles (Case study: 10 feet concrete deck with prefabricated beam, under the passage of 125-ton bogie)

Ports are the most important economic, political and military bottlenecks. This puts shoreline structures (port) in the class of important structures and they have a crucial role in the countries’ life. Pile and deck wharf and their access bridges and offshore deck (jetties), are one of the parts which are supplier of coupling between the land and the waterfront. Correct and exact estimation of...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Comparison Between Open and Ultrasonography Guided Venous Access Ports in Children with Malignancy

Background: Long-term central venous access is used in children for various reasons specially for delivering chemotherapy. Since vessels in children have smaller diameters, they are more prone to injury and complications such as thrombosis. Different methods are used for implantation of port-a-cath in children. We aimed to compare the complications of insertion of central venous access ports be...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2006