W3C home > Mailing lists > Public > public-awwsw@w3.org > February 2011

Re: Requirements for Any Theory of "Information Resource"

From: Nathan <nathan@webr3.org>
Date: Mon, 28 Feb 2011 21:51:28 +0000
Message-ID: <4D6C18E0.7050507@webr3.org>
To: David Booth <david@dbooth.org>
CC: AWWSW TF <public-awwsw@w3.org>
David Booth wrote:
> On Mon, 2011-02-28 at 14:36 -0500, David Booth wrote:
>> I thought I would take this opportunity to provide some feedback on
>> Jonathan's draft: Requirements for Any Theory of "Information Resource".
>> http://www.w3.org/2001/tag/awwsw/ir-axioms/20110225 
> . . . 
> One more comment:
> 12. BTW, I like your idea of talking about "authorized" representations
> of an IR.  That's what specs like 2616 assume (or specify), but given
> the amount of confusion that has been caused by scenarios where hardware
> or software malfunctions, or a web site is cracked or mis-configured, I

intermediaries like caches? man in the middle attacks? badly configured 
ISPs / network intermediaries which modify to add tracking code or ads?

> think it is good to make this explicit.  This also leads toward talking
> about what *should* people in various situations do, i.e., what are
> their social responsibilities if they are to "play nicely" in the
> semantic web community.  For example: 
>  - What are the responsibilities of the URI owner, when minting a URI?
>  - What are the responsibilities of an RDF statement author, who makes
> use of a URI in an RDF statement?
>  - How should an RDF consumer determine the intended meaning of a URI
> that was used in an RDF statement?
>  - What should an RDF statement author do if a URI has been compromised
> (e.g., if the domain has been sold and the URI is reused for an
> unrelated purpose)?  What should an RDF consumer do?
> I think these are the kinds of questions that we should eventually be
> able to address.
Received on Monday, 28 February 2011 21:52:16 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 20:21:09 UTC