From: "Hinchliffe, Lisa W" <[log in to unmask]> Date: Sun, 30 Apr 2017 22:45:05 +0000 Kevin echoes the privacy concerns and the reality that this is an analytics program as much as an authentication one that I raised earlier. Let me add one additional observation - as designed, RA21 is also going to remove the library from the user workflow and make the library roles of buyer and gateway even more invisible. This later is a danger of all "seamless" access to resources - the less friction, the less awareness that someone is making that access work. But, given that, it is worth some thought about how to keep attention on the library role while also improving the user experience. Adam Hodgkin mentioned earlier also that it would nice to be clearer what this new thing is. Here's how I have explained it to others. Think of RA21 as "authenticate once and then just use your device rather than going through the library." Like when your credit card company recognizes your phone number when you call in. Another analogy is that it is sort of like signing up for a service using your Google, Facebook, Twitter, etc. account. You don't go to that website and later think "thank goodness Twitter enables me to use this resource" ... no, you just use it. This is, of course, not a technical explanation so, Adam and others, if that's what you are after - hopefully someone else chimes in! :) Best, Lisa -- Lisa Janicke Hinchliffe Professor/ Coordinator for Information Literacy Services and Instruction University Library, University of Illinois, 1408 West Gregory Drive, Urbana, Illinois 61801 [log in to unmask], 217-333-1323 (v), 217-244-4358 (f) ________________________________________ From: "Smith, Kevin L" <[log in to unmask]> Date: Sun, 30 Apr 2017 19:38:49 +0000 I agree, and suspect that a movement toward credential-based access is connected to a subtext here, to differentiation among users in order to implement differential pricing. So costs could be based on how many bio-medical research an institution has versus how many anthropologists, for example. The obvious other subtext is to gather as much extremely granular data about researchers as is possible. So by focusing on privacy and a move away from IP authentication, I think the list is focusing on the key elements that lurk behind this proposal. Kevin