Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (12)
- City University of New York (CUNY) (10)
- Florida International University (8)
- Selected Works (8)
- University of Nebraska - Lincoln (8)
-
- SelectedWorks (7)
- Georgia Southern University (4)
- University of Kentucky (4)
- University of Vermont (4)
- California State University, San Bernardino (3)
- San Jose State University (3)
- University of Massachusetts Amherst (3)
- Winthrop University (3)
- Yale University (3)
- Illinois State University (2)
- Kennesaw State University (2)
- Old Dominion University (2)
- University of San Diego (2)
- University of South Carolina (2)
- University of Tennessee, Knoxville (2)
- Brigham Young University (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Loyola University Chicago (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Messiah University (1)
- Minnesota State University, Mankato (1)
- Publication Year
- Publication
-
- FIMS Publications (8)
- Works of the FIU Libraries (8)
- Library Philosophy and Practice (e-journal) (7)
- LACUNY Institute 2015 (5)
- Publications and Research (4)
-
- University Libraries Faculty and Staff Publications (4)
- Virginia A Dressler (4)
- Wilhelm Peekhaus (4)
- Dacus Library Faculty Publications (3)
- Journal of Contemporary Archival Studies (3)
- Journal of International Technology and Information Management (3)
- School of Information Student Research Journal (3)
- Digital Initiatives Symposium (2)
- Ethics in Science and Engineering National Clearinghouse (2)
- FIMS Presentations (2)
- Faculty and Staff Publications – Milner Library (2)
- Information Science Faculty Publications (2)
- Library Faculty Publications (2)
- Peter Fernandez (2)
- University Libraries News Online (2008-2023) (2)
- Western Libraries Presentations (2)
- AALL/LexisNexis Call for Papers (1)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
- Associate Professor Linda Dawson (1)
- CGU Theses & Dissertations (1)
- Collaborative Librarianship (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 118
Full-Text Articles in Social and Behavioral Sciences
Using Metadata To Mitigate The Risks Of Digitizing Archival Photographs Of Violence And Oppression, Claudia A. Mallea
Using Metadata To Mitigate The Risks Of Digitizing Archival Photographs Of Violence And Oppression, Claudia A. Mallea
Journal of Contemporary Archival Studies
Questioning the archival imperative of access, this research article discussed how descriptive metadata can be used to contextualize and problematize digitized archival photographs, which are often inadequately described in the digital environment. Beginning with literature review of atrocity photos and their use and digitization to discuss the risks inherent to disseminating photos of or born from violence. Review continued into the digital environment and the risks inherent to making difficult archival collections accessible online and the conflict between the right to privacy of the individuals represented in archival materials and the archival imperative to provide access.
Expanding on the recommendations …
Data Ethics And Privacy For Researchers, Kelley F. Rowan
Data Ethics And Privacy For Researchers, Kelley F. Rowan
Works of the FIU Libraries
This workshop addresses specific data privacy and anonymization standards and techniques for researchers that are collecting personally identifiable information as well as sensitive information. The workshop covers federal, state, and international laws and regulations governing data privacy, the development of an impact assessment and privacy policy. The second half of the workshop focuses on ethical workflows, anonymization techniques and related resources.
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra
Library Philosophy and Practice (e-journal)
The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …
Knowledge Of Information Ethics And Digital Information-Seeking Behavior Of Undergraduates In A Nigerian University., Raphael Ebiefung
Knowledge Of Information Ethics And Digital Information-Seeking Behavior Of Undergraduates In A Nigerian University., Raphael Ebiefung
Library Philosophy and Practice (e-journal)
The proliferation of digital resources has continued to necessitate studies aimed at regulating students’ digital information-seeking behavior. This study investigated the knowledge of information ethics and digital information-seeking behavior of first-year undergraduates in Topfaith University, Nigeria. The study adopted the total enumeration technique as the entire population of 171 first-year undergraduates. A Questionnaire and Focus Group Discussion (FGD) were used for data collection. Results revealed that digital libraries ( =3.23; std dev. = .638), social media platforms ( =3.15; std dev. = .609) and the Internet ( =2.96; std dev. = .895) were the most common strategies adopted by first-year …
“The Same Information Is Given To Everyone”: Algorithmic Awareness Of Online Platforms, Meghan Lindsey Dowell
“The Same Information Is Given To Everyone”: Algorithmic Awareness Of Online Platforms, Meghan Lindsey Dowell
Theses and Dissertations
After years of discourse surrounding the concept of “filter bubbles,” information seekers still find themselves in echo chambers of their own thoughts and ideas. This study is an exploratory, mixed methods analysis of platform privacy/data policies and user awareness of the personal and usage data collected and user awareness of how platforms use this data to moderate and serve online content. Utilizing Bucher’s (2018) framework to research algorithms through the black box heuristic, this project learns how users inform themselves about data collection and use policies, and their awareness of algorithmic curation. The algorithmic systems that return search results or …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Building A Culture Of Privacy Through Collaborative Policy Development, Margaret Heller
Building A Culture Of Privacy Through Collaborative Policy Development, Margaret Heller
University Libraries: Faculty Publications and Other Works
No abstract provided.
A Forward-Looking Conceptualization Of Information Privacy, David Kallemeyn
A Forward-Looking Conceptualization Of Information Privacy, David Kallemeyn
CGU Theses & Dissertations
Privacy is a fluid and ever-evolving concept, studied across multiple fields and with numerous definitions. Privacy research in information systems (IS) is extensive yet has not traveled far beyond the IS realm and fully engaged in the broader conversations being had with regards to privacy. This research seeks to define a larger sense of privacy that integrates the many working definitions across fields, along with related concepts, and to develop an alternative framework that can account for the constant technological and socio-technical changes through which to engage in privacy research. One such framework is developed and tested, grounded in the …
Trauma Informed Interviewing: Interviewing With Empathy And Protecting Oral History Narrators, Kelley Flannery Rowan
Trauma Informed Interviewing: Interviewing With Empathy And Protecting Oral History Narrators, Kelley Flannery Rowan
Works of the FIU Libraries
This presentation discusses best privacy practice in the context of creating oral histories with narrators dealing with trauma. This was a panel discussion and this presentation represents content from this speaker only.
Safe Sharing For Sensitive Data, Kristi Thompson
Safe Sharing For Sensitive Data, Kristi Thompson
Western Libraries Presentations
This workshop focused on the question of when and how human subjects' data can be safely shared. It introduced the basics of data anonymization and discussed how to tell if a dataset has been de-identified. Case studies of successful anonymization and some spectacular failures were shared
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Library Philosophy and Practice (e-journal)
This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …
Archival Discretion: A Survey On The Theory And Practice Of Archival Restrictions, Katrina Windon, Lydia M. Tang
Archival Discretion: A Survey On The Theory And Practice Of Archival Restrictions, Katrina Windon, Lydia M. Tang
Journal of Contemporary Archival Studies
In 2019, the Society of American Archivists’ Privacy and Confidentiality Steering Committee surveyed SAA members with the goal of identifying current practices and concerns across the field regarding archival access restrictions. Survey results yielded rich and sometimes contradicting information about how archivists approach access restrictions in theory and practice. The authors explore the survey methodology and results. Key observations include the ubiquity of restricted collections across archival repositories; the influence of donors on repositories’ restriction decisions; and variances in approaches to administering, tracking, and lifting expired restrictions.
Not having a comprehensive codified professional standard for privacy and restrictions is entirely …
University Libraries Collection, Disclosure, And Use Of Personally Identifiable Information, University Of South Carolina Libraries
University Libraries Collection, Disclosure, And Use Of Personally Identifiable Information, University Of South Carolina Libraries
University Libraries Policies and Reports
Privacy and confidentiality are fundamental values of libraries and are vital to the preservation of academic freedom. According to the American Library Association, “all people, regardless of origin, age, background, or views, possess a right to privacy and confidentiality in their library use. When users recognize or fear that their privacy or confidentiality is compromised, true freedom of inquiry no longer exists” (ALA, 2006). The University of South Carolina Libraries respects the confidentiality of patron records and communications in all formats in compliance with federal and state law, and with university data privacy policies.
The following policy describes how University …
Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler
Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler
Legacy Theses & Dissertations (2009 - 2024)
The growth of cloud-based services collecting user data for online analytical processing (OLAP), machine learning, and applications relating to the Internet of Things (IoT) has also increased concern with data privacy. Privacy-preserving data sharing using Secure Multiparty Communication (SMC) enables the exchange of encrypted data between parties to perform calculations while maintaining data privacy for both parties simultaneously. This research builds on established work that proposed a privacy-preserving driving style recognition protocol designed to work well with semi-honest actors. In this protocol, both parties follow the established algorithms and do not overtly attempt to deceive the other party into revealing …
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Library Philosophy and Practice (e-journal)
The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Information Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Journal of Contemporary Archival Studies
Student yearbooks are distinctive cultural records. For the schools and universities that produced them, yearbooks promoted a shared sense of identity and experience among students and helped create enduring loyalty to the institutions long after the students graduated. For scholars and other users, yearbooks are unique primary sources that provide insight into past eras of local student life and culture. In regards to user engagement and preserving local histories, student yearbooks should be ideal candidates for digitization by libraries and archives. However, yearbooks are challenging digitization projects because they are likely to contain privacy-sensitive photographs and other information as well …
Honoring Access And Privacy In Digital Collections, Rebecca Bakker, Virginia Dressler, Kelley Flannery Rowan
Honoring Access And Privacy In Digital Collections, Rebecca Bakker, Virginia Dressler, Kelley Flannery Rowan
Works of the FIU Libraries
This session explores the often unforeseen challenges and issues that can arise with the creation and management of digital collections in regards to access and privacy. We will address incorporating a privacy review into production workflows that can embed privacy considerations into practice and offer possible solutions and creative ways in which two academic institutions have helped it’s students, faculty and researchers maintain their privacy. We will share examples of subpoenas, plagiarized content, take-down notices, awkward responses from contacted alumni, and the challenge of dealing with victims of violence. This session will share some lessons learned along with recommendations of …
Community History In Minnesota During A Pandemic: What Comes Next?, Adam Stephen Guy Smith, Daardi Sizemore Mixon
Community History In Minnesota During A Pandemic: What Comes Next?, Adam Stephen Guy Smith, Daardi Sizemore Mixon
Library Services Publications
Three Minnesota cultural heritage organizations developed distinctly different community history projects to document the COVID-19 Pandemic. Anoka County Historical Society distributed monthly surveys asking questions relevant to the community at the time while encouraging the public to submit documentation for the archives. Hennepin County Library rapidly expanded its nascent web archiving program to capture websites of Minneapolis and suburban community organizations affected by and responding to the pandemic. Minnesota State University, Mankato developed a community history project that incorporated the international student experience to explore how our students and their families responded to the pandemic throughout the summer.
This presentation …
Managing Privacy: A Survey Of Practices In Digital Archives And Libraries, Virginia Dressler, Kelley Rowan, Rebecca Bakker
Managing Privacy: A Survey Of Practices In Digital Archives And Libraries, Virginia Dressler, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
Building on past research regarding privacy and digital librarianship, this study surveyed managers of digital libraries across the USA to gauge prevalent attitudes regarding individual privacy versus access to information. In the wake of controversy surrounding the European Union’s 2014 ruling regarding the ‘right to be forgotten’, the authors sought to develop a better understanding of how digital library managers in the USA handle privacy concerns, such as takedown requests, especially in light of the strong protections for first amendment rights in the USA.
This research explores whether the majority of archives and digital libraries have developed privacy policies and …
Managing Digital Collections: Case Studies In The Ethics Of Privacy, Kelley Rowan, Rebecca Bakker
Managing Digital Collections: Case Studies In The Ethics Of Privacy, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
This session explores the often unforeseen challenges and issues associated with the creation and management of digital collections and the privacy concerns that can arise. We will explore how to handle the need for digital anonymity on the part of content creators facing issues such as stalking, harassment, and violence. We will also discuss how to deal with the need for privacy when it stems from issues such as plagiarism and false claims of ownership that are almost always unexpected. We will offer possible solutions and creative ways in which FIU has helped its students, faculty, and researchers maintain their …
Information Consumer Or Product?: Algorithmic Literacy, Sarah K. Myers, Linda Poston
Information Consumer Or Product?: Algorithmic Literacy, Sarah K. Myers, Linda Poston
Library Staff Presentations & Publications
A brief essay of the importance of being aware of your online privacy, algorithm bias, filter bubbles, and the sale online personal data. A starting place with provide resources to be a better user of the internet and more informed information consumer.
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy And Other Legal Issues, April K. Anderson-Zorn, Dallas Long
Faculty and Staff Publications – Milner Library
Student yearbooks are distinctive cultural records. For the schools and universities that produced them, yearbooks promoted a shared sense of identity and experience among students and helped create enduring loyalty to the institutions long after the students graduated. For scholars and other users, yearbooks are unique primary sources that provide insight into past eras of local student life and culture. In regards to user engagement and preserving local histories, student yearbooks should be ideal candidates for digitization by libraries and archives. However, yearbooks are challenging digitization projects because they are likely to contain privacy-sensitive photographs and other information as well …
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
USF Tampa Graduate Theses and Dissertations
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Computer Science Faculty Publications
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
This presentation shares privacy challenges that librarians in the Digital Collections Center at FIU have encountered when working with the creators of content in the institutional repository and digital collections. The presenters share a brief history of privacy laws and the ethical concerns inherent in the juxtaposition between access and privacy. This presentation suggests possible solutions for other digital librarians concerned about privacy and take down requests.
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
School of Information Student Research Journal
The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.