Earlier this afternoon my colleague Phil Barker led a fascinating Elluminate session exploring resource tracking issues for the JISC / HEA Open Educational Resources Programme. One approach to tracking Phil raised was the use of unique keys or tag combinations which are embedded in resources and then released into the wild. Googling for the unique key will then indicate where your resource has been reused and by whom, more or less.
Now I’m no authority on tracking technologies but this reminded me of a very interesting article I read in the Guardian today How Belle de Jour’s secret ally Googlewhacked the press. This explains how a blogger known as Derren used some astute guesswork and a unique key combination of two terms associated nowhere else on the web to monitor whether anyone else was coming close to guessing the identity of the anonymous call girl Belle de Jour.
At the OER Technical Roundtable at last week’s CETIS Conference one of the actions participants prioritiesd was case studies and examples of different approaches to tracking. I’m not entirely sure that the above is the kind of case study the projects had in mind but it’s a pretty good real world example never the less! Just thought I’d mention it…..
Phil’s slides from the Elluminate session are available on Slideshare and no doubt there will be blog posts to follow.