Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (12)
- City University of New York (CUNY) (10)
- Florida International University (8)
- Selected Works (8)
- University of Nebraska - Lincoln (8)
-
- SelectedWorks (7)
- Georgia Southern University (4)
- University of Kentucky (4)
- University of Vermont (4)
- California State University, San Bernardino (3)
- San Jose State University (3)
- University of Massachusetts Amherst (3)
- Winthrop University (3)
- Yale University (3)
- Illinois State University (2)
- Kennesaw State University (2)
- Old Dominion University (2)
- University of San Diego (2)
- University of South Carolina (2)
- University of Tennessee, Knoxville (2)
- Brigham Young University (1)
- Butler University (1)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Loyola University Chicago (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Messiah University (1)
- Minnesota State University, Mankato (1)
- Publication Year
- Publication
-
- FIMS Publications (8)
- Works of the FIU Libraries (8)
- Library Philosophy and Practice (e-journal) (7)
- LACUNY Institute 2015 (5)
- Publications and Research (4)
-
- University Libraries Faculty and Staff Publications (4)
- Virginia A Dressler (4)
- Wilhelm Peekhaus (4)
- Dacus Library Faculty Publications (3)
- Journal of Contemporary Archival Studies (3)
- Journal of International Technology and Information Management (3)
- School of Information Student Research Journal (3)
- Digital Initiatives Symposium (2)
- Ethics in Science and Engineering National Clearinghouse (2)
- FIMS Presentations (2)
- Faculty and Staff Publications – Milner Library (2)
- Information Science Faculty Publications (2)
- Library Faculty Publications (2)
- Peter Fernandez (2)
- University Libraries News Online (2008-2023) (2)
- Western Libraries Presentations (2)
- AALL/LexisNexis Call for Papers (1)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
- Associate Professor Linda Dawson (1)
- CGU Theses & Dissertations (1)
- Collaborative Librarianship (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Publication Type
- File Type
Articles 91 - 118 of 118
Full-Text Articles in Social and Behavioral Sciences
Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian
Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian
Publications and Research
As direct providers of information literacy, librarians can help patrons analyze the social and economic forces involved in the creation and use of information. This chapter will discuss why critical information literacy and critical pedagogy are especially important in the Armenian context, with its unique historical, cultural, and geopolitical concerns. The authors will document how the Armenian government has used cutting-edge Internet controls to block online content or misdirect users. We will also examine how Armenians perceive the independence of their available media and explore current efforts by telecom, publishing, and governmental concerns to restrict Internet freedom. The authors suggest …
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Articles by Maurer Faculty
Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Library Staff Publications
No abstract provided.
Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker
Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker
School of Information Student Research Journal
In April 2010, the Internet company Twitter announced that it had granted its entire archive of “Tweets” to the Library of Congress. These Tweets are typically generated by public users, who may or may not understand or expect that their submissions will be archived by a government agency. Archives of Web 2.0 material raise new ethical considerations for archivists, who must balance interests in preserving material with privacy interests of users who generated the content. Archivists can address these concerns by requiring corporate donors to fully disclose the nature of the archive to users and by allowing users to opt-out …
Data Security On Mobile Devices- A Higher Education Perspective, David Reis
Data Security On Mobile Devices- A Higher Education Perspective, David Reis
Academic Commons and Scott Memorial Library Staff Papers and Presentations
Mobile devices, both personal and Jefferson-owned, are being used everywhere on campus. Everyone knows that patient health information should not be stored on mobile devices, but did you know there are similar restrictions for student information?
If you access your Jefferson email from your mobile device and it contains student email on it, or in your address book, you need to know the requirements to protect that data.
Is your device secure?
AISR and JeffIT are hosting a presentation that will address important data security steps you should take to protect the information on your mobile device.
Zach's News, Georgia Southern University, Zach S. Henderson Library
Zach's News, Georgia Southern University, Zach S. Henderson Library
University Libraries News Online (2008-2023)
- Welcome to choose Privacy Week!
- Hot Doc: President Obama's birth certificate
Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi
Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi
University Libraries Faculty and Staff Publications
Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians may question whether privacy is worth protecting. This article reviews some of the extensive scholarly literature on privacy from disciplines outside the field of library science, including anthropology, law, philosophy, political science, psychology, and sociology, and it identifies fourteen reasons privacy matters to individuals, relationships, and to society. It …
Hacked Off In The Web, Mark Y. Herring
Hacked Off In The Web, Mark Y. Herring
Dacus Library Faculty Publications
According to a new report (http://tinyurl.com/2g6ghps), if you are on the Web at all you’re not safe from hackers, phishers, and spammers (oh my!). The Norton Cybercrime Report: The Human Impact (http://cybercrime.newslinevine.com/) of 7,000 Web users tells us that 65% of all users globally, and 73% of U. S. users, have been hacked in some sort of cybercrime. Globally, the U. S. ranks very high but in this case we’re not first in line. China wins Number One with 83% of its users web-abused in some manner. These are figures to give one pause.
A Content Analysis Of Library Vendor Privacy Policies: Do They Meet Our Standards?, Trina J. Magi
A Content Analysis Of Library Vendor Privacy Policies: Do They Meet Our Standards?, Trina J. Magi
University Libraries Faculty and Staff Publications
Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics.
But A Whimper, Mark Y. Herring
But A Whimper, Mark Y. Herring
Dacus Library Faculty Publications
In my last rustication, I opined the details of the 300-page Google Book Deal settlement made in late 2008 between Google and authors and publishers vis-à-vis Google’s massive digitization scheme (those cases, viz., Authors Guild et al v. Google and McGraw-Hill et al v. Google).
Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez
Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez
Other Library Publications and Works
Librarians face many challenges when dealing with issues of privacy within the mediated space of social networking sites. Conceptually, social networking sites differ from libraries on privacy as a value. Research about Generation Y students, the primary clientele of undergraduate libraries, can inform librarians’ relationship to this important emerging technology. Five recommendations assist librarians in expanding their traditional commitment to privacy into the realm of social networking sites.
Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez
Privacy And Generation Y: Applying Library Values To Social Networking Sites, Peter Fernandez
Peter Fernandez
Librarians face many challenges when dealing with issues of privacy within the mediated space of social networking sites. Conceptually, social networking sites differ from libraries on privacy as a value. Research about Generation Y students, the primary clientele of undergraduate libraries, can inform librarians’ relationship to this important emerging technology. Five recommendations assist librarians in expanding their traditional commitment to privacy into the realm of social networking sites.
Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton
Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton
Ethics in Science and Engineering National Clearinghouse
No abstract provided.
Balancing Outreach And Privacy In Facebook: Five Guiding Decisions Points, Peter Fernandez
Balancing Outreach And Privacy In Facebook: Five Guiding Decisions Points, Peter Fernandez
UT Libraries Faculty: Peer-Reviewed Publications
The purpose of this paper is to highlight five decision points intended to serve as guideposts for librarians attempting to conceptualize their own efforts within Facebook.
Balancing Outreach And Privacy In Facebook: Five Guiding Decision Points, Peter Fernandez
Balancing Outreach And Privacy In Facebook: Five Guiding Decision Points, Peter Fernandez
Peter Fernandez
The purpose of this paper is to highlight five decision points intended to serve as guideposts for librarians attempting to conceptualize their own efforts within Facebook.
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Ethics in Science and Engineering National Clearinghouse
Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …
Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus
Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus
Wilhelm Peekhaus
This paper examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government’s broader neo-liberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the ‘public good’ in respect of medical research, and to discussions of informed consent as an element of ‘fair information practices’ designed to safeguard the privacy …
Personal Health Information In Canada: A Comparison Of Citizen Expectations And Legislation, Wilhelm Peekhaus
Personal Health Information In Canada: A Comparison Of Citizen Expectations And Legislation, Wilhelm Peekhaus
Wilhelm Peekhaus
This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis of the results of a public opinion survey conducted to determine Canadian attitudes about medical privacy, particularly genetic privacy. The analysis highlights areas where legislation and public opinion converge and diverge.
A Study Of Us Library Directors' Confidence And Practice Regarding Patron Confidentiality, Trina J. Magi
A Study Of Us Library Directors' Confidence And Practice Regarding Patron Confidentiality, Trina J. Magi
University Libraries Faculty and Staff Publications
This article reports the results of a paper survey mailed to all 213 directors of public and academic libraries in Vermont. The purpose of the study, which yielded a 71 percent response rate, was to learn how many libraries take specific measures to protect patron confidentiality other than having a written policy, to measure library directors' confidence in their own ability and that of their workers to follow confidentiality policies, and to learn what types of support directors need to better protect confidentiality.
Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson
Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson
Associate Professor Linda Dawson
This paper describes and analyses clinicians’ assessments of workplace privacy and security (PaS) training in the context of contemporary health information system (HIS) practice. The PaS training underpins national e-health frameworks. The paper draws on findings from a forthcoming dissertation. The ‘questerview’ technique was applied to this case study of 26 clinicians in three Victorian (Australia) public hospitals. The technique relies on data collection that applies standardised questions and questionnaires during interviews. Respondents were recorded while they completed the standardised questions and questionnaires and were encouraged to discuss their responses to items in detail. Data analysis involved the scrutiny of …
Privacy For Sale - Business As Usual In The 21st Century: An Economic And Normative Critique, Wilhelm Peekhaus
Privacy For Sale - Business As Usual In The 21st Century: An Economic And Normative Critique, Wilhelm Peekhaus
Wilhelm Peekhaus
In this paper the author sets out to analyze and critique the commodification of privacy model advanced by Kenneth Laudon. Situating this marketbased model of privacy within the context of the resurgence of neo-classical economics of the last two decades, the author asserts that contemporary economic models, and in particular the intellectual property regime, have difficulty in adequately conceptualizing and treating information. When considering the implications extended by the commodification of privacy model for social and power relationships in society, the author argues that the model gives rise to increased surveillance and greater opportunities for social control and decentering of …
Personal Medical Information: Privacy Or Personal Data Protection? A Theoretical Approach To Understanding The Canadian Environment, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection? A Theoretical Approach To Understanding The Canadian Environment, Wilhelm Peekhaus
Wilhelm Peekhaus
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Laura Quilter
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Jennifer M. Urban
No abstract provided.
"The Homosexual" As Problem Patron, Polly Thistlethwaite
"The Homosexual" As Problem Patron, Polly Thistlethwaite
Publications and Research
Libraries host a range of human activity, some of which is overtly sexual. What's a librarian to do about public displays of affection? cruising? public sex? First, we read up on the issue. Unfortunately, problem patron library literature is spotted with vivid illustrations of irrational bias against gay men, male-to-female transgender women, and men-cruising-men. It also discounts the private nature of most consensual sex in public places. This article discusses sex and gender biases in library literature, arguing that gender equitable, privacy-respecting practices will better serve librarians administering public space.
Surveying Privacy: Library Privacy Laws In The Southeastern United States, Bryan M. Carson
Surveying Privacy: Library Privacy Laws In The Southeastern United States, Bryan M. Carson
The Southeastern Librarian
According to the American Library Association, library records should be kept private and confidential. Most states also have laws that protect the confidentiality of library records. This article will discuss the library confidentiality laws of the Southeastern United States, as well as the Family Educational Rights and Privacy Act (FERPA), and the USA PATRIOT Act (popularly known as the antiterrorism statute).
The Confidentiality Of Library Users’ Records, John A. Drobnicki
The Confidentiality Of Library Users’ Records, John A. Drobnicki
Publications and Research
Many activities that take place in the library, including circulation and inter!ibrary loan and reserve requests, result in the creation of records linking clients to specific kinds of information. Several groups, including law enforcement officials, have attempted on various occasions to gain access to these records. This research paper provides a broad overview of the legal and ethical issues regarding the confidentiality of library user's records, including federal, state, and court protection for the confidentiality of library records, the status of library records that are part of a public institution, and a minor's right to privacy. The paper also discusses …