Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 91 - 118 of 118

Full-Text Articles in Social and Behavioral Sciences

Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian Jan 2013

Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian

Publications and Research

As direct providers of information literacy, librarians can help patrons analyze the social and economic forces involved in the creation and use of information. This chapter will discuss why critical information literacy and critical pedagogy are especially important in the Armenian context, with its unique historical, cultural, and geopolitical concerns. The authors will document how the Armenian government has used cutting-edge Internet controls to block online content or misdirect users. We will also examine how Armenians perceive the independence of their available media and explore current efforts by telecom, publishing, and governmental concerns to restrict Internet freedom. The authors suggest …


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino Oct 2012

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine Sep 2012

Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine

Articles by Maurer Faculty

Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.


Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele Apr 2012

Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele

Library Staff Publications

No abstract provided.


Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker Jul 2011

Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker

School of Information Student Research Journal

In April 2010, the Internet company Twitter announced that it had granted its entire archive of “Tweets” to the Library of Congress. These Tweets are typically generated by public users, who may or may not understand or expect that their submissions will be archived by a government agency. Archives of Web 2.0 material raise new ethical considerations for archivists, who must balance interests in preserving material with privacy interests of users who generated the content. Archivists can address these concerns by requiring corporate donors to fully disclose the nature of the archive to users and by allowing users to opt-out …


Data Security On Mobile Devices- A Higher Education Perspective, David Reis Jul 2011

Data Security On Mobile Devices- A Higher Education Perspective, David Reis

Academic Commons and Scott Memorial Library Staff Papers and Presentations

Mobile devices, both personal and Jefferson-owned, are being used everywhere on campus. Everyone knows that patient health information should not be stored on mobile devices, but did you know there are similar restrictions for student information?

If you access your Jefferson email from your mobile device and it contains student email on it, or in your address book, you need to know the requirements to protect that data.

Is your device secure?

AISR and JeffIT are hosting a presentation that will address important data security steps you should take to protect the information on your mobile device.


Zach's News, Georgia Southern University, Zach S. Henderson Library May 2011

Zach's News, Georgia Southern University, Zach S. Henderson Library

University Libraries News Online (2008-2023)

  • Welcome to choose Privacy Week!
  • Hot Doc: President Obama's birth certificate


Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi Apr 2011

Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi

University Libraries Faculty and Staff Publications

Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians may question whether privacy is worth protecting. This article reviews some of the extensive scholarly literature on privacy from disciplines outside the field of library science, including anthropology, law, philosophy, political science, psychology, and sociology, and it identifies fourteen reasons privacy matters to individuals, relationships, and to society. It …


Hacked Off In The Web, Mark Y. Herring Nov 2010

Hacked Off In The Web, Mark Y. Herring

Dacus Library Faculty Publications

According to a new report (http://tinyurl.com/2g6ghps), if you are on the Web at all you’re not safe from hackers, phishers, and spammers (oh my!). The Norton Cybercrime Report: The Human Impact (http://cybercrime.newslinevine.com/) of 7,000 Web users tells us that 65% of all users globally, and 73% of U. S. users, have been hacked in some sort of cybercrime. Globally, the U. S. ranks very high but in this case we’re not first in line. China wins Number One with 83% of its users web-abused in some manner. These are figures to give one pause.


A Content Analysis Of Library Vendor Privacy Policies: Do They Meet Our Standards?, Trina J. Magi May 2010

A Content Analysis Of Library Vendor Privacy Policies: Do They Meet Our Standards?, Trina J. Magi

University Libraries Faculty and Staff Publications

Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics.


But A Whimper, Mark Y. Herring Apr 2010

But A Whimper, Mark Y. Herring

Dacus Library Faculty Publications

In my last rustication, I opined the details of the 300-page Google Book Deal settlement made in late 2008 between Google and authors and publishers vis-à-vis Google’s massive digitization scheme (those cases, viz., Authors Guild et al v. Google and McGraw-Hill et al v. Google).


Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez Apr 2010

Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez

Other Library Publications and Works

Librarians face many challenges when dealing with issues of privacy within the mediated space of social networking sites. Conceptually, social networking sites differ from libraries on privacy as a value. Research about Generation Y students, the primary clientele of undergraduate libraries, can inform librarians’ relationship to this important emerging technology. Five recommendations assist librarians in expanding their traditional commitment to privacy into the realm of social networking sites.


Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez Apr 2010

Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez

Peter Fernandez

Librarians face many challenges when dealing with issues of privacy within the mediated space of social networking sites. Conceptually, social networking sites differ from libraries on privacy as a value. Research about Generation Y students, the primary clientele of undergraduate libraries, can inform librarians’ relationship to this important emerging technology. Five recommendations assist librarians in expanding their traditional commitment to privacy into the realm of social networking sites.


Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton Nov 2009

Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton

Ethics in Science and Engineering National Clearinghouse

No abstract provided.


Balancing Outreach And Privacy In Facebook: Five Guiding Decisions Points, Peter Fernandez Jan 2009

Balancing Outreach And Privacy In Facebook: Five Guiding Decisions Points, Peter Fernandez

UT Libraries Faculty: Peer-Reviewed Publications

The purpose of this paper is to highlight five decision points intended to serve as guideposts for librarians attempting to conceptualize their own efforts within Facebook.


Balancing Outreach And Privacy In Facebook: Five Guiding Decision Points, Peter Fernandez Jan 2009

Balancing Outreach And Privacy In Facebook: Five Guiding Decision Points, Peter Fernandez

Peter Fernandez

The purpose of this paper is to highlight five decision points intended to serve as guideposts for librarians attempting to conceptualize their own efforts within Facebook.


Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava Apr 2008

Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava

Ethics in Science and Engineering National Clearinghouse

Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …


Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus Jan 2008

Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus

Wilhelm Peekhaus

This paper examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government’s broader neo-liberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the ‘public good’ in respect of medical research, and to discussions of informed consent as an element of ‘fair information practices’ designed to safeguard the privacy …


Personal Health Information In Canada: A Comparison Of Citizen Expectations And Legislation, Wilhelm Peekhaus Jan 2008

Personal Health Information In Canada: A Comparison Of Citizen Expectations And Legislation, Wilhelm Peekhaus

Wilhelm Peekhaus

This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis of the results of a public opinion survey conducted to determine Canadian attitudes about medical privacy, particularly genetic privacy. The analysis highlights areas where legislation and public opinion converge and diverge.


A Study Of Us Library Directors' Confidence And Practice Regarding Patron Confidentiality, Trina J. Magi Jan 2008

A Study Of Us Library Directors' Confidence And Practice Regarding Patron Confidentiality, Trina J. Magi

University Libraries Faculty and Staff Publications

This article reports the results of a paper survey mailed to all 213 directors of public and academic libraries in Vermont. The purpose of the study, which yielded a 71 percent response rate, was to learn how many libraries take specific measures to protect patron confidentiality other than having a written policy, to measure library directors' confidence in their own ability and that of their workers to follow confidentiality policies, and to learn what types of support directors need to better protect confidentiality.


Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson Dec 2007

Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson

Associate Professor Linda Dawson

This paper describes and analyses clinicians’ assessments of workplace privacy and security (PaS) training in the context of contemporary health information system (HIS) practice. The PaS training underpins national e-health frameworks. The paper draws on findings from a forthcoming dissertation. The ‘questerview’ technique was applied to this case study of 26 clinicians in three Victorian (Australia) public hospitals. The technique relies on data collection that applies standardised questions and questionnaires during interviews. Respondents were recorded while they completed the standardised questions and questionnaires and were encouraged to discuss their responses to items in detail. Data analysis involved the scrutiny of …


Privacy For Sale - Business As Usual In The 21st Century: An Economic And Normative Critique, Wilhelm Peekhaus Jan 2007

Privacy For Sale - Business As Usual In The 21st Century: An Economic And Normative Critique, Wilhelm Peekhaus

Wilhelm Peekhaus

In this paper the author sets out to analyze and critique the commodification of privacy model advanced by Kenneth Laudon. Situating this marketbased model of privacy within the context of the resurgence of neo-classical economics of the last two decades, the author asserts that contemporary economic models, and in particular the intellectual property regime, have difficulty in adequately conceptualizing and treating information. When considering the implications extended by the commodification of privacy model for social and power relationships in society, the author argues that the model gives rise to increased surveillance and greater opportunities for social control and decentering of …


Personal Medical Information: Privacy Or Personal Data Protection? A Theoretical Approach To Understanding The Canadian Environment, Wilhelm Peekhaus Jan 2006

Personal Medical Information: Privacy Or Personal Data Protection? A Theoretical Approach To Understanding The Canadian Environment, Wilhelm Peekhaus

Wilhelm Peekhaus

No abstract provided.


Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner Oct 2004

Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner

Laura Quilter

No abstract provided.


Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner Oct 2004

Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner

Jennifer M. Urban

No abstract provided.


"The Homosexual" As Problem Patron, Polly Thistlethwaite Jan 2002

"The Homosexual" As Problem Patron, Polly Thistlethwaite

Publications and Research

Libraries host a range of human activity, some of which is overtly sexual. What's a librarian to do about public displays of affection? cruising? public sex? First, we read up on the issue. Unfortunately, problem patron library literature is spotted with vivid illustrations of irrational bias against gay men, male-to-female transgender women, and men-cruising-men. It also discounts the private nature of most consensual sex in public places. This article discusses sex and gender biases in library literature, arguing that gender equitable, privacy-respecting practices will better serve librarians administering public space.


Surveying Privacy: Library Privacy Laws In The Southeastern United States, Bryan M. Carson Oct 2001

Surveying Privacy: Library Privacy Laws In The Southeastern United States, Bryan M. Carson

The Southeastern Librarian

According to the American Library Association, library records should be kept private and confidential. Most states also have laws that protect the confidentiality of library records. This article will discuss the library confidentiality laws of the Southeastern United States, as well as the Family Educational Rights and Privacy Act (FERPA), and the USA PATRIOT Act (popularly known as the antiterrorism statute).


The Confidentiality Of Library Users’ Records, John A. Drobnicki Jan 1992

The Confidentiality Of Library Users’ Records, John A. Drobnicki

Publications and Research

Many activities that take place in the library, including circulation and inter!ibrary loan and reserve requests, result in the creation of records linking clients to specific kinds of information. Several groups, including law enforcement officials, have attempted on various occasions to gain access to these records. This research paper provides a broad overview of the legal and ethical issues regarding the confidentiality of library user's records, including federal, state, and court protection for the confidentiality of library records, the status of library records that are part of a public institution, and a minor's right to privacy. The paper also discusses …