Ithaka S+R Draft for Comment: The Second Digital Transformation of Scholarly Publishing: Strategic Context and Shared Infrastructure


The issue that we identified as the biggest gap today is the perceived need for a secure digital identity for legitimate scholars, to help editors triage submissions into more and less trusted categories. We see opportunities for researcher identifiers to be used as the hub for much greater information about digital identity, in part by allowing publishers and other parties to submit markers of identity into identifier records. As examples, publishers that have processed APC transactions using credit cards have substantial signs of verified identity, as do universities that have securely linked an email address.

The boundaries of the scholarly record represent another aspect of research integrity that requires new forms of infrastructure. Of course the record has never had absolute boundaries. But in a subscription landscape, libraries played an important role in establishing the metes and bounds of the scholarly record (and what would be preserved over time) based on their selection decision-making. In a gold or diamond open access environment, libraries may have a reduced role and so other forms of boundary-setting may be required. Journal rankings may increasingly serve to set the boundaries of the scholarly record, although whether that is the right form of shared infrastructure, or whether it has the right governance and business model to allow it to serve this role without fear or favor, is not yet settled.

https://tinyurl.com/mr2ce748

| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

Avatar photo

Author: Charles W. Bailey, Jr.

Charles W. Bailey, Jr.