Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2014 Apr 22;16(4):e112.
doi: 10.2196/jmir.3331.

Is Biblioleaks inevitable?

Affiliations

Is Biblioleaks inevitable?

Adam G Dunn et al. J Med Internet Res. .

Abstract

In 2014, the vast majority of published biomedical research is still hidden behind paywalls rather than open access. For more than a decade, similar restrictions over other digitally available content have engendered illegal activity. Music file sharing became rampant in the late 1990s as communities formed around new ways to share. The frequency and scale of cyber-attacks against commercial and government interests has increased dramatically. Massive troves of classified government documents have become public through the actions of a few. Yet we have not seen significant growth in the illegal sharing of peer-reviewed academic articles. Should we truly expect that biomedical publishing is somehow at less risk than other content-generating industries? What of the larger threat--a "Biblioleaks" event--a database breach and public leak of the substantial archives of biomedical literature? As the expectation that all research should be available to everyone becomes the norm for a younger generation of researchers and the broader community, the motivations for such a leak are likely to grow. We explore the feasibility and consequences of a Biblioleaks event for researchers, journals, publishers, and the broader communities of doctors and the patients they serve.

Keywords: bibliographic databases; compromising of data; open access; peer-to-peer architectures; public access to information.

PubMed Disclaimer

Conflict of interest statement

Conflicts of Interest: None declared.

Figures

Figure 1
Figure 1
Volumes of articles currently indexed by PubMed (blue) and volumes freely available via PubMed Central (orange), arranged by year of publication, for articles published between 1945 and 2013 (data accessed 17 March 2014).
Figure 2
Figure 2
Largest recorded data breaches by number of records (accessed 7 January 2014). Hacks are in blue, all other breach types in orange (eg, stolen/lost disks)–compared to a hypothetical breach equivalent to the numbers of articles indexed by PubMed for which full-text versions require a subscription or payment to access. The proportions associated with the 6 largest publishers (sampled from outgoing PubMed links on 7 January 2014) make up 72% of these inaccessible articles (in red).

Similar articles

Cited by

References

    1. Swartz Aaron. Guerilla Open Access Manifesto. 2008. [2014-02-17]. https://ia700808.us.archive.org/17/items/GuerillaOpenAccessManifesto/Goa....
    1. Björk B, Laakso M, Welling P, Paetau P. Anatomy of green open access. J Assn Inf Sci Tec. 2013 Nov 06;65(2):237–250. doi: 10.1002/asi.22963. - DOI
    1. Laakso M, Björk BC. Anatomy of open access publishing: a study of longitudinal development and internal structure. BMC Med. 2012;10:124. doi: 10.1186/1741-7015-10-124. http://www.biomedcentral.com/1741-7015/10/124 - DOI - PMC - PubMed
    1. Levy S. Hackers: heroes of the computer revolution. Garden City, N.Y: Anchor Press/Doubleday; 1984.
    1. Open Security Foundation Data Loss DB – Largest Incidents. 2013. [2014-02-17]. http://datalossdb.org/index/largest.