Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (12)
- City University of New York (CUNY) (10)
- Florida International University (8)
- Selected Works (8)
- University of Nebraska - Lincoln (8)
-
- SelectedWorks (7)
- Georgia Southern University (4)
- University of Kentucky (4)
- University of Vermont (4)
- California State University, San Bernardino (3)
- San Jose State University (3)
- University of Massachusetts Amherst (3)
- Winthrop University (3)
- Yale University (3)
- Illinois State University (2)
- Kennesaw State University (2)
- Old Dominion University (2)
- University of San Diego (2)
- University of South Carolina (2)
- University of Tennessee, Knoxville (2)
- Brigham Young University (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Loyola University Chicago (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Messiah University (1)
- Minnesota State University, Mankato (1)
- Publication Year
- Publication
-
- FIMS Publications (8)
- Works of the FIU Libraries (8)
- Library Philosophy and Practice (e-journal) (7)
- LACUNY Institute 2015 (5)
- Publications and Research (4)
-
- University Libraries Faculty and Staff Publications (4)
- Virginia A Dressler (4)
- Wilhelm Peekhaus (4)
- Dacus Library Faculty Publications (3)
- Journal of Contemporary Archival Studies (3)
- Journal of International Technology and Information Management (3)
- School of Information Student Research Journal (3)
- Digital Initiatives Symposium (2)
- Ethics in Science and Engineering National Clearinghouse (2)
- FIMS Presentations (2)
- Faculty and Staff Publications – Milner Library (2)
- Information Science Faculty Publications (2)
- Library Faculty Publications (2)
- Peter Fernandez (2)
- University Libraries News Online (2008-2023) (2)
- Western Libraries Presentations (2)
- AALL/LexisNexis Call for Papers (1)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
- Associate Professor Linda Dawson (1)
- CGU Theses & Dissertations (1)
- Collaborative Librarianship (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Publication Type
- File Type
Articles 61 - 90 of 118
Full-Text Articles in Social and Behavioral Sciences
Beyond Compliance, Cecelia Parks
Beyond Compliance, Cecelia Parks
Library Publications
Privacy is governed by an array of laws in the United States, and this paper examines one facet of privacy regulation: the privacy of students’ academic records. The Family Educational Rights and Privacy Act (FERPA) protects the privacy of these records, but how do students understand their rights under FERPA, especially with the development of big data and learning analytics technologies that demand unprecedented sharing of student data? This paper begins to answer that question by examining existing literature on privacy in general and with regards to FERPA specifically. It suggests that FERPA places most of the power in controlling …
Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans
Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans
SLIS Connecting
With the passing of the USA Patriot Act in 2001 following the events of 9/11, libraries on the national scale have had to staunchly defend issues of privacy and confidentially more-so than ever before. Evidence of this lies not only in statements within the ALA’s Resolution on the USA PATRIOT Act and Libraries but also in other core documents which guide policy development in public libraries (ALA 2005). Intellectual Freedom and privacy are two of the major issues addressed and protected by the American Library Association through the Office of Intellectual Freedom and the Library Bill of Rights (ALA 1996).
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell
FIMS Publications
Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories …
The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, D. Grant Campbell, Scott R. Cowan
The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, D. Grant Campbell, Scott R. Cowan
Leddy Library Publications
Protecting user privacy and confidentiality is fundamental to the ethics and practice of librarianship, and such protection constitutes one of eleven values in the American Library Association’s “Core Values of Librarianship” (2004). This paper addresses the concerns of protecting privacy in the library as they relate to library users who are defining, exploring, and negotiating their sexual identities with the help of the library’s information, programming, and physical facilities. In so doing, we enlist the aid of Garret Keizer, who, in Privacy (2012), articulates a fresh theory of the concept in light of American social life in the twenty-first century. …
The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, Grant D. Campbell, Scott Cowan
The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, Grant D. Campbell, Scott Cowan
FIMS Publications
Protecting user privacy and confidentiality is fundamental to the ethics and practice of librarianship, and such protection constitutes one of eleven values in the American Library Association’s “Core Values of Librarianship” (2004). This paper addresses the concerns of protecting privacy in the library as they relate to library users who are defining, exploring, and negotiating their sexual identities with the help of the library’s information, programming, and physical facilities. In so doing, we enlist the aid of Garret Keizer, who, in Privacy (2012), articulates a fresh theory of the concept in light of American social life in the twenty-first century. …
Display And Control In Online Social Spaces: Toward A Typology Of Users, Jacquelyn A. Burkell, Alexandre Fortier
Display And Control In Online Social Spaces: Toward A Typology Of Users, Jacquelyn A. Burkell, Alexandre Fortier
FIMS Publications
Online social networks are spaces of social display where an astronomical amount of personal information, which would once have been characterized as private, is shared with a loose community of friends or followers. This broad sharing does not preclude participant interest in control, both over the content of the social network profile and over the audience that has access to that profile. Thus, issues of display and control are in tension in the context of online social networking. The goal of this research is to articulate the different subjective perspectives that characterize Facebook users with respect to the control …
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley
Faculty and Staff Publications – Milner Library
The Wisconsin School for Girls collection housed in the Wisconsin Historical Society (WHS) archives contains a variety of documents from the institution’s period of operation. Inmates who were admitted to the institution were predominately juvenile females at the time of the records’ creation; because of this, the contents of the records are protected by Wisconsin state statutes, which mandate restricted access for patrons as well as limitations on the use of the information contained within the records. This article examines how the restrictions on the collection continue to protect the privacy of the inmates and their descendants, what procedures WHS …
Librarians As Feisty Advocates For Privacy, Sarah Lamdan
Librarians As Feisty Advocates For Privacy, Sarah Lamdan
Urban Library Journal
Librarians are the ideal professional group to advocate for privacy and intellectual freedom during online social media product use. Under the central leadership of the American Library Association (ALA), librarians should lead a campaign to urge Internet social media companies to include Privacy by Design principles in their user agreements. This social media privacy campaign would follow librarians’ historical privacy advocacy efforts, and promoting ethical user agreements presents a new venue for librarians’ advocacy in the era of online information access.
Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken
Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken
Faculty Publications
Presented as a Keynote Address to the International Conference on Computing in Engineering and the Sciences in Istanbul, Turkey, on July 30, 2015.
This is an abstract of the speech:
Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding …
The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina
The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina
LACUNY Institute 2015
In the past few years, libraries have started to design public programs that educate patrons about different tools and techniques to protect personal privacy. But do end user solutions provide adequate safeguards against surveillance by corporate and government actors? What does a comprehensive plan for privacy entail in order that libraries live up to their privacy values? In this paper, the authors discuss the complexity of surveillance architecture that the library institution might confront when seeking to defend the privacy rights of patrons. This architecture consists of three main parts: physical or material aspects, logical characteristics, and social factors of …
Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey
Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey
LACUNY Institute 2015
Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited …
Who Does The Internet Think You Are? Three Tools That Teach Students How They Are Actively Profiled Online, All The Time, Robin Camille Davis
Who Does The Internet Think You Are? Three Tools That Teach Students How They Are Actively Profiled Online, All The Time, Robin Camille Davis
LACUNY Institute 2015
Your Internet experience is yours alone. For better but often for worse, websites, ads, search results, and even product prices are tailored to you specifically — but how? A vast collection of data describes you to a number of unseen organizations who use this information to shape the internet you see. This transmission of data is not readily visible, but we have the tools to bring this activity into the foreground. We will answer these questions: How does Google profile you to advertisers? How many trackers are following you around the internet? What information are these trackers transmitting, and for …
Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina
Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina
LACUNY Institute 2015
Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
LACUNY Institute 2015
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …
"Forgive And Forget": Cleaning House With Circ Jobs 39 And 42, Tari Keller
"Forgive And Forget": Cleaning House With Circ Jobs 39 And 42, Tari Keller
Library Presentations
We started using the purge job to remove old patron records with SSNs, as a first step toward removing the numbers in all our patron records. With new state laws, we are trying to eliminate as many privacy issues as we can by deleting records for patrons who are not currently using the libraries. The Commonwealth of Kentucky has a statute of limitations of 5 years on small fines. We forgive fines older than 5 years by running the Fine Forgive program at the beginning of the Fall Semester each year.
I plan to show using command, crontab and WebAdmin …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
Information Science Faculty Publications
Purpose
The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the …
Ethics Of Access In Displaced Archives, Samantha R. Winn
Ethics Of Access In Displaced Archives, Samantha R. Winn
Provenance, Journal of the Society of Georgia Archivists
This paper presents an exploratory review of archival literature on access to displaced archives. In order to understand the ethical imperatives that govern access to displaced archives, archivists must navigate a complex web of competing moral claims, contradictory legal frameworks, shifting national security norms, and customary practices that reflect centuries of colonization, occupation, and conquest. In the absence of either rigorous professional engagement or a clear ethical framework, institutions managing displaced archives may establish policies that unnecessarily restrict access, violate the values of the creators, privilege certain groups of users over others, or inflict harm upon members of the originating …
Here's Looking At You, Selfie, Mark Y. Herring
Here's Looking At You, Selfie, Mark Y. Herring
Dacus Library Faculty Publications
By the time you read this column this story may have lost all it relevance but it has made a bit of a dust up lately and so I think it deserves some further treatment. About two weeks ago, the cyberverse was all a twitter about naked selfies, mainly of celebrities, that had been hacked right out of the cloud. Imagine that. What goes online isn’t exactly private. Doh!
Digitizing Murder: Content And Platform Considerations, Rebecca Mattson, Susan Altmeyer, Elizabeth Farrell
Digitizing Murder: Content And Platform Considerations, Rebecca Mattson, Susan Altmeyer, Elizabeth Farrell
Law Library Faculty Works
No abstract provided.
Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler
Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler
School of Information Student Research Journal
This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information.
Library Patron Privacy In 2014 - Honoring The Legacy Of Zoia Horn, Sarah Lamdan
Library Patron Privacy In 2014 - Honoring The Legacy Of Zoia Horn, Sarah Lamdan
Publications and Research
No abstract provided.
The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing
The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing
AALL/LexisNexis Call for Papers
This study evaluates the digital redaction process as undertaken by the University of North Carolina Kathrine R. Everett Law Library as part of digitizing their collection of North Carolina Supreme Court briefs. New privacy concerns are raised by digitizing court documents and making them available online. Libraries have an interest in digitizing their print collections of court documents for public access on the Internet, but have received no clear guidance on how to proceed in the face of legal concerns. The purpose of this research is to inform libraries of the legal, ethical, and practical situation surrounding redaction of digitized …
Zach's News, Georgia Southern University, Zach S. Henderson Library
Zach's News, Georgia Southern University, Zach S. Henderson Library
University Libraries News Online (2008-2023)
- Constitution Day- The Right to Privacy in the 21st Century
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Georgia International Conference on Information Literacy
See presentation description.
A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi
A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi
University Libraries Faculty and Staff Publications
Provides a brief introduction to several reasons privacy is important to people and society, cites numerous studies reporting on people's attitudes about privacy, and recommends ways librarians can work to protect patron privacy.
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
FIMS Publications
Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …
Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins
Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins
Theses : Honours
Adolescents readily engage in online entertainment pursuits, however, it is their online social activities and health information searches that encourage psychosocial development and influence identity formation and autonomy. Considerable research has been completed on various aspects of adolescents’ encounters with online health information (for example, see Percheski & Hargittai, 2011), yet minimal research has been conducted using Australian adolescents. This study extends existing research utilising Western Australian adolescents who have used the Internet to obtain health information. The areas explored include how Western Australian adolescents search for online health information, by means of which devices, and their experiences of using …
Facebook: Public Space, Or Private Space?, Jacquelyn Burkell, Alexandre Fortier, Lorraine Wong, Jennifer Lynn Simpson
Facebook: Public Space, Or Private Space?, Jacquelyn Burkell, Alexandre Fortier, Lorraine Wong, Jennifer Lynn Simpson
FIMS Publications
Social networks have become a central feature of everyday life. Most young people are members of at least one online social network, and they naturally provide a great deal of personal information as a condition for participation in the rich online social lives these networks afford. Increasingly, this information is being used as evidence in criminal and even civil legal proceedings. These latter uses, by actors involved in the justice system, are typically justified on the grounds that social network information is essentially public in nature, and thus does not generate a subjective expectation of privacy necessary to support a …