Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 118

Full-Text Articles in Social and Behavioral Sciences

Beyond Compliance, Cecelia Parks Jan 2017

Beyond Compliance, Cecelia Parks

Library Publications

Privacy is governed by an array of laws in the United States, and this paper examines one facet of privacy regulation: the privacy of students’ academic records. The Family Educational Rights and Privacy Act (FERPA) protects the privacy of these records, but how do students understand their rights under FERPA, especially with the development of big data and learning analytics technologies that demand unprecedented sharing of student data? This paper begins to answer that question by examining existing literature on privacy in general and with regards to FERPA specifically. It suggests that FERPA places most of the power in controlling …


Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans Dec 2016

Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans

SLIS Connecting

With the passing of the USA Patriot Act in 2001 following the events of 9/11, libraries on the national scale have had to staunchly defend issues of privacy and confidentially more-so than ever before. Evidence of this lies not only in statements within the ALA’s Resolution on the USA PATRIOT Act and Libraries but also in other core documents which guide policy development in public libraries (ALA 2005). Intellectual Freedom and privacy are two of the major issues addressed and protected by the American Library Association through the Office of Intellectual Freedom and the Library Bill of Rights (ALA 1996).


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell Mar 2016

Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell

FIMS Publications

Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories …


The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, D. Grant Campbell, Scott R. Cowan Jan 2016

The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, D. Grant Campbell, Scott R. Cowan

Leddy Library Publications

Protecting user privacy and confidentiality is fundamental to the ethics and practice of librarianship, and such protection constitutes one of eleven values in the American Library Association’s “Core Values of Librarianship” (2004). This paper addresses the concerns of protecting privacy in the library as they relate to library users who are defining, exploring, and negotiating their sexual identities with the help of the library’s information, programming, and physical facilities. In so doing, we enlist the aid of Garret Keizer, who, in Privacy (2012), articulates a fresh theory of the concept in light of American social life in the twenty-first century. …


The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, Grant D. Campbell, Scott Cowan Jan 2016

The Paradox Of Privacy: Revisiting A Core Library Value In An Age Of Big Data And Linked Data, Grant D. Campbell, Scott Cowan

FIMS Publications

Protecting user privacy and confidentiality is fundamental to the ethics and practice of librarianship, and such protection constitutes one of eleven values in the American Library Association’s “Core Values of Librarianship” (2004). This paper addresses the concerns of protecting privacy in the library as they relate to library users who are defining, exploring, and negotiating their sexual identities with the help of the library’s information, programming, and physical facilities. In so doing, we enlist the aid of Garret Keizer, who, in Privacy (2012), articulates a fresh theory of the concept in light of American social life in the twenty-first century. …


Display And Control In Online Social Spaces: Toward A Typology Of Users, Jacquelyn A. Burkell, Alexandre Fortier Jan 2016

Display And Control In Online Social Spaces: Toward A Typology Of Users, Jacquelyn A. Burkell, Alexandre Fortier

FIMS Publications

Online social networks are spaces of social display where an astronomical amount of personal information, which would once have been characterized as private, is shared with a loose community of friends or followers. This broad sharing does not preclude participant interest in control, both over the content of the social network profile and over the audience that has access to that profile. Thus, issues of display and control are in tension in the context of online social networking. The goal of this research is to articulate the different subjective perspectives that characterize Facebook users with respect to the control …


Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley Oct 2015

Wisconsin School For Girls Inmate Record Books: A Case Study Of Redacted Digitization, Eric Willey, Laura Farley

Faculty and Staff Publications – Milner Library

The Wisconsin School for Girls collection housed in the Wisconsin Historical Society (WHS) archives contains a variety of documents from the institution’s period of operation. Inmates who were admitted to the institution were predominately juvenile females at the time of the records’ creation; because of this, the contents of the records are protected by Wisconsin state statutes, which mandate restricted access for patrons as well as limitations on the use of the information contained within the records. This article examines how the restrictions on the collection continue to protect the privacy of the inmates and their descendants, what procedures WHS …


Librarians As Feisty Advocates For Privacy, Sarah Lamdan Sep 2015

Librarians As Feisty Advocates For Privacy, Sarah Lamdan

Urban Library Journal

Librarians are the ideal professional group to advocate for privacy and intellectual freedom during online social media product use. Under the central leadership of the American Library Association (ALA), librarians should lead a campaign to urge Internet social media companies to include Privacy by Design principles in their user agreements. This social media privacy campaign would follow librarians’ historical privacy advocacy efforts, and promoting ethical user agreements presents a new venue for librarians’ advocacy in the era of online information access.


Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken Jul 2015

Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken

Faculty Publications

Presented as a Keynote Address to the International Conference on Computing in Engineering and the Sciences in Istanbul, Turkey, on July 30, 2015.

This is an abstract of the speech:

Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding …


The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina May 2015

The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina

LACUNY Institute 2015

In the past few years, libraries have started to design public programs that educate patrons about different tools and techniques to protect personal privacy. But do end user solutions provide adequate safeguards against surveillance by corporate and government actors? What does a comprehensive plan for privacy entail in order that libraries live up to their privacy values? In this paper, the authors discuss the complexity of surveillance architecture that the library institution might confront when seeking to defend the privacy rights of patrons. This architecture consists of three main parts: physical or material aspects, logical characteristics, and social factors of …


Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey May 2015

Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey

LACUNY Institute 2015

Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited …


Who Does The Internet Think You Are? Three Tools That Teach Students How They Are Actively Profiled Online, All The Time, Robin Camille Davis May 2015

Who Does The Internet Think You Are? Three Tools That Teach Students How They Are Actively Profiled Online, All The Time, Robin Camille Davis

LACUNY Institute 2015

Your Internet experience is yours alone. For better but often for worse, websites, ads, search results, and even product prices are tailored to you specifically — but how? A vast collection of data describes you to a number of unseen organizations who use this information to shape the internet you see. This transmission of data is not readily visible, but we have the tools to bring this activity into the foreground. We will answer these questions: How does Google profile you to advertisers? How many trackers are following you around the internet? What information are these trackers transmitting, and for …


Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina May 2015

Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina

LACUNY Institute 2015

Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.


Librarians As Advocates For Social Media Privacy, Sarah Lamdan May 2015

Librarians As Advocates For Social Media Privacy, Sarah Lamdan

LACUNY Institute 2015

Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …


"Forgive And Forget": Cleaning House With Circ Jobs 39 And 42, Tari Keller May 2015

"Forgive And Forget": Cleaning House With Circ Jobs 39 And 42, Tari Keller

Library Presentations

We started using the purge job to remove old patron records with SSNs, as a first step toward removing the numbers in all our patron records. With new state laws, we are trying to eliminate as many privacy issues as we can by deleting records for patrons who are not currently using the libraries. The Commonwealth of Kentucky has a statute of limitations of 5 years on small fines. We forgive fines older than 5 years by running the Fine Forgive program at the beginning of the Fall Semester each year.

I plan to show using command, crontab and WebAdmin …


The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner Mar 2015

The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …


An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally Jan 2015

An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally

Information Science Faculty Publications

Purpose

The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the …


Ethics Of Access In Displaced Archives, Samantha R. Winn Jan 2015

Ethics Of Access In Displaced Archives, Samantha R. Winn

Provenance, Journal of the Society of Georgia Archivists

This paper presents an exploratory review of archival literature on access to displaced archives. In order to understand the ethical imperatives that govern access to displaced archives, archivists must navigate a complex web of competing moral claims, contradictory legal frameworks, shifting national security norms, and customary practices that reflect centuries of colonization, occupation, and conquest. In the absence of either rigorous professional engagement or a clear ethical framework, institutions managing displaced archives may establish policies that unnecessarily restrict access, violate the values of the creators, privilege certain groups of users over others, or inflict harm upon members of the originating …


Here's Looking At You, Selfie, Mark Y. Herring Sep 2014

Here's Looking At You, Selfie, Mark Y. Herring

Dacus Library Faculty Publications

By the time you read this column this story may have lost all it relevance but it has made a bit of a dust up lately and so I think it deserves some further treatment. About two weeks ago, the cyberverse was all a twitter about naked selfies, mainly of celebrities, that had been hacked right out of the cloud. Imagine that. What goes online isn’t exactly private. Doh!


Digitizing Murder: Content And Platform Considerations, Rebecca Mattson, Susan Altmeyer, Elizabeth Farrell Jul 2014

Digitizing Murder: Content And Platform Considerations, Rebecca Mattson, Susan Altmeyer, Elizabeth Farrell

Law Library Faculty Works

No abstract provided.


Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler May 2014

Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler

School of Information Student Research Journal

This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information.


Library Patron Privacy In 2014 - Honoring The Legacy Of Zoia Horn, Sarah Lamdan Jan 2014

Library Patron Privacy In 2014 - Honoring The Legacy Of Zoia Horn, Sarah Lamdan

Publications and Research

No abstract provided.


The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing Jan 2014

The Unc Law Library's Redaction Of Its Digitized Collection Of North Carolina Supreme Court Briefs: A Case Study, Nicole Downing

AALL/LexisNexis Call for Papers

This study evaluates the digital redaction process as undertaken by the University of North Carolina Kathrine R. Everett Law Library as part of digitizing their collection of North Carolina Supreme Court briefs. New privacy concerns are raised by digitizing court documents and making them available online. Libraries have an interest in digitizing their print collections of court documents for public access on the Internet, but have received no clear guidance on how to proceed in the face of legal concerns. The purpose of this research is to inform libraries of the legal, ethical, and practical situation surrounding redaction of digitized …


Zach's News, Georgia Southern University, Zach S. Henderson Library Sep 2013

Zach's News, Georgia Southern University, Zach S. Henderson Library

University Libraries News Online (2008-2023)

  • Constitution Day- The Right to Privacy in the 21st Century


Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D Aug 2013

Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D

Georgia International Conference on Information Literacy

See presentation description.


A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi Jul 2013

A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi

University Libraries Faculty and Staff Publications

Provides a brief introduction to several reasons privacy is important to people and society, cites numerous studies reporting on people's attitudes about privacy, and recommends ways librarians can work to protect patron privacy.


Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier Mar 2013

Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier

FIMS Publications

Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …


Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins Jan 2013

Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins

Theses : Honours

Adolescents readily engage in online entertainment pursuits, however, it is their online social activities and health information searches that encourage psychosocial development and influence identity formation and autonomy. Considerable research has been completed on various aspects of adolescents’ encounters with online health information (for example, see Percheski & Hargittai, 2011), yet minimal research has been conducted using Australian adolescents. This study extends existing research utilising Western Australian adolescents who have used the Internet to obtain health information. The areas explored include how Western Australian adolescents search for online health information, by means of which devices, and their experiences of using …


Facebook: Public Space, Or Private Space?, Jacquelyn Burkell, Alexandre Fortier, Lorraine Wong, Jennifer Lynn Simpson Jan 2013

Facebook: Public Space, Or Private Space?, Jacquelyn Burkell, Alexandre Fortier, Lorraine Wong, Jennifer Lynn Simpson

FIMS Publications

Social networks have become a central feature of everyday life. Most young people are members of at least one online social network, and they naturally provide a great deal of personal information as a condition for participation in the rich online social lives these networks afford. Increasingly, this information is being used as evidence in criminal and even civil legal proceedings. These latter uses, by actors involved in the justice system, are typically justified on the grounds that social network information is essentially public in nature, and thus does not generate a subjective expectation of privacy necessary to support a …