Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (12)
- City University of New York (CUNY) (9)
- Florida International University (8)
- University of Nebraska - Lincoln (8)
- University of Kentucky (4)
-
- University of Vermont (4)
- Georgia Southern University (3)
- Winthrop University (3)
- Illinois State University (2)
- University of Massachusetts Amherst (2)
- University of Tennessee, Knoxville (2)
- Brigham Young University (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Loyola University Chicago (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Messiah University (1)
- Minnesota State University, Mankato (1)
- Penn State Law (1)
- Roger Williams University (1)
- St. Cloud State University (1)
- Thomas Jefferson University (1)
- University of Massachusetts Boston (1)
- University of Mississippi (1)
- University of Northern Colorado (1)
- University of South Carolina (1)
- University of Washington Tacoma (1)
- University of Windsor (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- FIMS Publications (8)
- Works of the FIU Libraries (8)
- Library Philosophy and Practice (e-journal) (7)
- LACUNY Institute 2015 (5)
- Publications and Research (4)
-
- University Libraries Faculty and Staff Publications (4)
- Dacus Library Faculty Publications (3)
- Ethics in Science and Engineering National Clearinghouse (2)
- FIMS Presentations (2)
- Faculty and Staff Publications – Milner Library (2)
- Information Science Faculty Publications (2)
- Library Faculty Publications (2)
- University Libraries News Online (2008-2023) (2)
- Western Libraries Presentations (2)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
- Computer Science Faculty Publications (1)
- Faculty Publications (1)
- Graduate Scholarship and Professional Work (1)
- Joseph P. Healey Library Publications (1)
- Law Library Faculty Works (1)
- Law Library Newsletters/Blog (1)
- Leddy Library Publications (1)
- Librarian Research (1)
- Library Presentations (1)
- Library Publications (1)
- Library Publications and Presentations (1)
- Library Services Publications (1)
- Library Staff Presentations & Publications (1)
- File Type
Articles 1 - 30 of 76
Full-Text Articles in Social and Behavioral Sciences
Data Ethics And Privacy For Researchers, Kelley F. Rowan
Data Ethics And Privacy For Researchers, Kelley F. Rowan
Works of the FIU Libraries
This workshop addresses specific data privacy and anonymization standards and techniques for researchers that are collecting personally identifiable information as well as sensitive information. The workshop covers federal, state, and international laws and regulations governing data privacy, the development of an impact assessment and privacy policy. The second half of the workshop focuses on ethical workflows, anonymization techniques and related resources.
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Library Philosophy and Practice (e-journal)
The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …
Knowledge Of Information Ethics And Digital Information-Seeking Behavior Of Undergraduates In A Nigerian University., Raphael Ebiefung
Knowledge Of Information Ethics And Digital Information-Seeking Behavior Of Undergraduates In A Nigerian University., Raphael Ebiefung
Library Philosophy and Practice (e-journal)
The proliferation of digital resources has continued to necessitate studies aimed at regulating students’ digital information-seeking behavior. This study investigated the knowledge of information ethics and digital information-seeking behavior of first-year undergraduates in Topfaith University, Nigeria. The study adopted the total enumeration technique as the entire population of 171 first-year undergraduates. A Questionnaire and Focus Group Discussion (FGD) were used for data collection. Results revealed that digital libraries ( =3.23; std dev. = .638), social media platforms ( =3.15; std dev. = .609) and the Internet ( =2.96; std dev. = .895) were the most common strategies adopted by first-year …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Building A Culture Of Privacy Through Collaborative Policy Development, Margaret Heller
Building A Culture Of Privacy Through Collaborative Policy Development, Margaret Heller
University Libraries: Faculty Publications and Other Works
No abstract provided.
Trauma Informed Interviewing: Interviewing With Empathy And Protecting Oral History Narrators, Kelley Flannery Rowan
Trauma Informed Interviewing: Interviewing With Empathy And Protecting Oral History Narrators, Kelley Flannery Rowan
Works of the FIU Libraries
This presentation discusses best privacy practice in the context of creating oral histories with narrators dealing with trauma. This was a panel discussion and this presentation represents content from this speaker only.
Safe Sharing For Sensitive Data, Kristi Thompson
Safe Sharing For Sensitive Data, Kristi Thompson
Western Libraries Presentations
This workshop focused on the question of when and how human subjects' data can be safely shared. It introduced the basics of data anonymization and discussed how to tell if a dataset has been de-identified. Case studies of successful anonymization and some spectacular failures were shared
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Library Philosophy and Practice (e-journal)
This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …
University Libraries Collection, Disclosure, And Use Of Personally Identifiable Information, University Of South Carolina Libraries
University Libraries Collection, Disclosure, And Use Of Personally Identifiable Information, University Of South Carolina Libraries
University Libraries Policies and Reports
Privacy and confidentiality are fundamental values of libraries and are vital to the preservation of academic freedom. According to the American Library Association, “all people, regardless of origin, age, background, or views, possess a right to privacy and confidentiality in their library use. When users recognize or fear that their privacy or confidentiality is compromised, true freedom of inquiry no longer exists” (ALA, 2006). The University of South Carolina Libraries respects the confidentiality of patron records and communications in all formats in compliance with federal and state law, and with university data privacy policies.
The following policy describes how University …
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Library Philosophy and Practice (e-journal)
The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Information Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
Honoring Access And Privacy In Digital Collections, Rebecca Bakker, Virginia Dressler, Kelley Flannery Rowan
Honoring Access And Privacy In Digital Collections, Rebecca Bakker, Virginia Dressler, Kelley Flannery Rowan
Works of the FIU Libraries
This session explores the often unforeseen challenges and issues that can arise with the creation and management of digital collections in regards to access and privacy. We will address incorporating a privacy review into production workflows that can embed privacy considerations into practice and offer possible solutions and creative ways in which two academic institutions have helped it’s students, faculty and researchers maintain their privacy. We will share examples of subpoenas, plagiarized content, take-down notices, awkward responses from contacted alumni, and the challenge of dealing with victims of violence. This session will share some lessons learned along with recommendations of …
Community History In Minnesota During A Pandemic: What Comes Next?, Adam Stephen Guy Smith, Daardi Sizemore Mixon
Community History In Minnesota During A Pandemic: What Comes Next?, Adam Stephen Guy Smith, Daardi Sizemore Mixon
Library Services Publications
Three Minnesota cultural heritage organizations developed distinctly different community history projects to document the COVID-19 Pandemic. Anoka County Historical Society distributed monthly surveys asking questions relevant to the community at the time while encouraging the public to submit documentation for the archives. Hennepin County Library rapidly expanded its nascent web archiving program to capture websites of Minneapolis and suburban community organizations affected by and responding to the pandemic. Minnesota State University, Mankato developed a community history project that incorporated the international student experience to explore how our students and their families responded to the pandemic throughout the summer.
This presentation …
Managing Privacy: A Survey Of Practices In Digital Archives And Libraries, Virginia Dressler, Kelley Rowan, Rebecca Bakker
Managing Privacy: A Survey Of Practices In Digital Archives And Libraries, Virginia Dressler, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
Building on past research regarding privacy and digital librarianship, this study surveyed managers of digital libraries across the USA to gauge prevalent attitudes regarding individual privacy versus access to information. In the wake of controversy surrounding the European Union’s 2014 ruling regarding the ‘right to be forgotten’, the authors sought to develop a better understanding of how digital library managers in the USA handle privacy concerns, such as takedown requests, especially in light of the strong protections for first amendment rights in the USA.
This research explores whether the majority of archives and digital libraries have developed privacy policies and …
Managing Digital Collections: Case Studies In The Ethics Of Privacy, Kelley Rowan, Rebecca Bakker
Managing Digital Collections: Case Studies In The Ethics Of Privacy, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
This session explores the often unforeseen challenges and issues associated with the creation and management of digital collections and the privacy concerns that can arise. We will explore how to handle the need for digital anonymity on the part of content creators facing issues such as stalking, harassment, and violence. We will also discuss how to deal with the need for privacy when it stems from issues such as plagiarism and false claims of ownership that are almost always unexpected. We will offer possible solutions and creative ways in which FIU has helped its students, faculty, and researchers maintain their …
Information Consumer Or Product?: Algorithmic Literacy, Sarah K. Myers, Linda Poston
Information Consumer Or Product?: Algorithmic Literacy, Sarah K. Myers, Linda Poston
Library Staff Presentations & Publications
A brief essay of the importance of being aware of your online privacy, algorithm bias, filter bubbles, and the sale online personal data. A starting place with provide resources to be a better user of the internet and more informed information consumer.
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Faculty and Staff Publications – Milner Library
Student yearbooks are distinctive cultural records. For the schools and universities that produced them, yearbooks promoted a shared sense of identity and experience among students and helped create enduring loyalty to the institutions long after the students graduated. For scholars and other users, yearbooks are unique primary sources that provide insight into past eras of local student life and culture. In regards to user engagement and preserving local histories, student yearbooks should be ideal candidates for digitization by libraries and archives. However, yearbooks are challenging digitization projects because they are likely to contain privacy-sensitive photographs and other information as well …
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Computer Science Faculty Publications
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
This presentation shares privacy challenges that librarians in the Digital Collections Center at FIU have encountered when working with the creators of content in the institutional repository and digital collections. The presenters share a brief history of privacy laws and the ethical concerns inherent in the juxtaposition between access and privacy. This presentation suggests possible solutions for other digital librarians concerned about privacy and take down requests.
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Library Publications and Presentations
This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …
Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho
Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho
FIMS Publications
Interview Guide: Networked individualism, East York Project
Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley
Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley
Joseph P. Healey Library Publications
Archival collections that include records about victims and survivors of child abuse present unique challenges regarding privacy, access, and representation. With a long tenure of collecting on the history of social welfare, University Archives and Special Collections (UASC) in the Joseph P. Healey Library at the University of Massachusetts Boston had to address these challenges before processing and making available the historic inactive records of the Massachusetts Society for the Prevention of Cruelty to Children (MSPCC). UASC and the MSPCC took steps to ensure that the MSPCC collection would be accessible to the survivors represented in the records and to …
Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr.
Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr.
Library Philosophy and Practice (e-journal)
We are witness to see exponential growth of the social media network since the year 2002. Leading social media networking sites used by people are Twitter, Snapchats, Facebook, Google, and Instagram, etc. The latest global digital report (Chaffey and Ellis-Chadwick 2019) states that there exist more than 800 million current online social media users, and the number is still exploding day by day. Users share their day to day activities such as their photos and locations etc. on social media platforms. This information gets consumed by third party users, like marketing companies, researchers, and government firms. Depending upon the purpose, …
The Dark Side Of Digitized Content: Stalking, Consent, And Subpoenas, Kelley F. Rowan, Rebecca Bakker
The Dark Side Of Digitized Content: Stalking, Consent, And Subpoenas, Kelley F. Rowan, Rebecca Bakker
Works of the FIU Libraries
Digital librarians work to balance the sometimes competing goals of stewardship and access all while being responsive to the needs of patrons, content owners, and creators. This presentation explores the often unforeseen challenges and issues that can arise with the creation and management of digital collections. While ingesting digitized works into a repository brings up ever-present concerns such as copyright, others challenges exist within the realm of privacy (stalking, harassment, digital anonymity), plagiarism, and ownership (false claims of ownership) that are almost always unexpected.
The goal is to further a discussion on these types of issues that digital librarians may …
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Towards Standard Information Privacy, Innovations Of The New General Data Protection Regulation, Ali Alibeigi, Abu Bakar Munir, Md Ershadulkarim, Adeleh Asemi
Library Philosophy and Practice (e-journal)
Protection of personal data in recent decades became more crucial affecting by emergence of the new technologies especially computer, internet, information and communications technology. However, Europeans felt this necessity at time and provided for up-to-date and supportive laws. The General Data Protection Regulation (GDPR) is the latest legislation in EU to protect personal data of individuals based on the recent technological advancements. However, its’ domestic and international output still is debatable. This doctrinal legal study by using descriptive methods, aimed to evaluate the GDPR through analyzing and interpreting its’ provisions by especial focus on its’ innovations. The results show that …
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Library Faculty Publications
With flexible access and permission features, LibGuides and LibGuides CMS offer an adaptable platform for hosting patron-created content. This paper highlights how librarians at Georgia Southern University opened their LibGuides CMS platform to host faculty and student projects and portfolios. Employing similar techniques, libraries can host a wide range of patron-created content while protecting library-managed guides and assets, controlling access to patron-created content, and protecting patron privacy. This paper provides a detailed overview of access and permission features available in LibGuides and LibGuides CMS, presents two case studies, and offers considerations and best practices for hosting patron-created content.
Just-In-Time Or Just-In-Case? Time, Learning Analytics, And The Library, Karen P. Nicholson, Nicole Pagowsky, Maura Seale
Just-In-Time Or Just-In-Case? Time, Learning Analytics, And The Library, Karen P. Nicholson, Nicole Pagowsky, Maura Seale
FIMS Publications
In this essay, we explore the timescapes of library learning analytics. We contend that just-in-time strategies, a feature of late capital modes of production, New Public Management, and future-oriented risk-management strategies inform the adoption of learning analytics. Learning analytics function as a form of temporal governmentality: current performance is scrutinized in order to anticipate future performance and prescribe just-in-time interventions to mitigate risk—not only for the student but also for the institution. Ultimately, we argue that using time as a lens to examine discourses surrounding library learning analytics reveals the temporalities reproduced in this discourse, which obscures questions of power, …
Debating Student Privacy In Library Research Projects Presentation, Jennifer Mayer, Rachel Dineen
Debating Student Privacy In Library Research Projects Presentation, Jennifer Mayer, Rachel Dineen
University Libraries Faculty Publications
No abstract provided.
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from …