Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Selected Works

Privacy

Discipline
Publication Year
Publication
File Type

Articles 1 - 30 of 47

Full-Text Articles in Social and Behavioral Sciences

Navigating Complex Issues In Modern Archival Collections: Privacy And Copyright, Virginia A. Dressler, Cindy Kristof Oct 2019

Navigating Complex Issues In Modern Archival Collections: Privacy And Copyright, Virginia A. Dressler, Cindy Kristof

Virginia A Dressler

Kent State University Libraries received a two-year grant in 2016 to aid digitization initiatives around the May 4th Collection. The grant funded digitization of the selection of the large archival collection and the library developed new workflows to address copyright and privacy issues. The session will provide information around complex copyright and privacy issues in archives, including fair use analysis, permission-seeking and review of privacy.


Balancing Privacy And Access In Personal Digital Archives, Virginia A. Dressler May 2019

Balancing Privacy And Access In Personal Digital Archives, Virginia A. Dressler

Virginia A Dressler

The session will address privacy concerns to consider within personal digital archives, particularly when access to information from the item or collection is openly available. Privacy is often an elusive term, difficult to pin down and collectively define. And perhaps even more difficult to use and apply as a working standard or ethical value to uphold within a project.
The session will outline types of private information that may be more readily apparent, such as personally identifiable information (social security number, medical information, etc.), as well as that which may be less obvious or inconspicuous in nature. The impact of …


Digitizing Modern Archival Collections, Or How We Addressed Copyright In The Murky Waters Of Clippings, Student Strike Papers And More, Virginia A. Dressler, Cindy Kristof Apr 2019

Digitizing Modern Archival Collections, Or How We Addressed Copyright In The Murky Waters Of Clippings, Student Strike Papers And More, Virginia A. Dressler, Cindy Kristof

Virginia A Dressler

In order to aid digitization of the Kent State University May 4th Collection in preparation for the 50th anniversary, University Libraries received a National Historical Publications and Records Commission (NHPRC) grant which funded digitization of a selection of the large archival collection. Librarians developed new workflows to address copyright and privacy issues in assorted archival materials to be digitized. The session will highlight this work, and also provide information on the approach to complex copyright issues present in many archival collections, including fair use analysis and permission-seeking. Lastly, effective cross-training of staff and student assistants will be reviewed.


Big Data's Impact On Privacy For Librarians And Information Professionals, Lindsey M. Harper, Shannon M. Oltmann Feb 2019

Big Data's Impact On Privacy For Librarians And Information Professionals, Lindsey M. Harper, Shannon M. Oltmann

Lindsey M. Harper

In a digital age, it is very difficult to maintain complete privacy when posting on social media or making purchases. Individual activity on the internet is increasingly collected by corporations, even with the user’s knowledge, and can be used to predict future behavior, purchasing choices or other sensitive subjects. This data analysis is often done without a user’s consent and in many cases presents unethical behavior and breaches of privacy. Big data can be beneficial to libraries in many ways, and if pointed at library systems, rather than the habits of patrons, can also keep privacy intact.


Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir Jan 2018

Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir

Chris Jay Hoofnagle

This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …


How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow Jan 2018

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow

Chris Jay Hoofnagle

Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the …


Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Nov 2017

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Teresa A. Miller

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Nov 2017

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Samantha Barbas

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …


The Right To Be Forgotten In Digital Collections: A Survey Of Practice And Policy At Arl Institutions, Virginia A. Dressler, Cindy Kristof Oct 2017

The Right To Be Forgotten In Digital Collections: A Survey Of Practice And Policy At Arl Institutions, Virginia A. Dressler, Cindy Kristof

Virginia A Dressler

Presentation at DLF forum 2017

Digital librarians and digital collection managers at ARL institutions were surveyed in the Spring of 2017 to investigate practices and policies surrounding takedown requests in openly accessible digital collections. The survey collected basic demographic information on the digital repositories and presented a series of hypothetical scenarios for respondents to consider.


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews Apr 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

Lori B. Andrews

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Human-Robot Versus Human-Human Relationship Impact On Comfort Levels Regarding In Home Privacy, Keith R. Macarthur, Thomas G. Macgillivray, Eva L. Parkhurst, Peter A. Hancock Mar 2016

Human-Robot Versus Human-Human Relationship Impact On Comfort Levels Regarding In Home Privacy, Keith R. Macarthur, Thomas G. Macgillivray, Eva L. Parkhurst, Peter A. Hancock

Keith Reid MacArthur

When considering in-group vs. out-group concepts, certain degrees of human relationships naturally assume one of two categories. Roles such as immediate and extended family members and friends tend to fit quite nicely in the in-group category. Strangers, hired help, as well as acquaintances would likely be members of the out-group category due to a lack of personal relation to the perceiver. Though an out-group member may possess cultural, socioeconomic, or religious traits that an individual may perceive as in-group, the fact that they are an unknown stranger should immediately place them in the out-group. From [K1] this notion, it can be inferred …


A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh Dec 2015

A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh

Lorrie F Cranor

Anecdotal evidence and scholarly research have shown that Internet users may regret some of their online disclosures. To help individuals avoid such regrets, we designed two modifications to the Facebook web interface that nudge users to consider the content and audience of their online disclosures more carefully. We implemented and evaluated these two nudges in a 6-week field trial with 28 Facebook users. We analyzed participants' interactions with the nudges, the content of their posts, and opinions collected through surveys. We found that reminders about the audience of posts can prevent unintended disclosures without major burden; however, introducing a time …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Dec 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Lorrie F Cranor

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes Jun 2015

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …


Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert Jan 2015

Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert

Michael Friedewald

No abstract provided.


Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks Sep 2014

Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks

David J Brooks Dr.

Public street surveillance, a domain of Closed Circuit Television (CCTV), has grown enormously and is becoming common place with increasing utilization in society as an all-purpose security tool. Previous authors (Ditton, 1999; Davies, 1998; Horne, 1998; Tomkins, 1998) have raised concern over social, civil and privacy issues, but there has been limited research to quantify these concerns. There are a number of core aspects that could relocate the risk perception and therefore, social support of public street surveillance. This study utilized the psychometric paradigm to quantitatively measure the social risk perception of public street surveillance. The psychometric paradigm is a …


Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable Jun 2014

Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable

Professor Katina Michael

This quantitative, descriptive study investigated if there was a relationship between countries of residence of small business owners (N = 453) within four countries (Australia, India, UK, and the USA) with respect to perceived barriers to RFID (radio frequency identification) transponders being implanted into humans for employee ID. Participants were asked what they believed were the greatest barriers in instituting chip implants for access control in organizations. Participants had six options from which to select. There were significant chi-square analyses reported relative to respondents’ countries and: 1) a perceived barrier of technological issues (χ2 = 11.86, df = 3, p …


Information Privacy, Gary S. Sander Mar 2014

Information Privacy, Gary S. Sander

Gary S Sander

Databases of information about individuals have similar architectural qualities as in the neighborhood in which our physical homes are situated in. Within our personal homes, there are rooms and areas in which are more private and accessible. We can store away and access information which is embedded in physical objects. But as these boundaries between the physical and the virtual become blurry, the ideas of privacy need to be re-thought carefully. When information is stored virtually there are pros and cons to this – how does information get represented in context of the situation than as a single entity that …


We Got To Do Better, Katherine Albrecht, Katina Michael Mar 2014

We Got To Do Better, Katherine Albrecht, Katina Michael

Professor Katina Michael

Each year, thousands of film buffs gather at the Sundance International Film Festival in park City, UT, U.S.A., to see the offerings of the world’s brightest filmmakers. If it’s true that movies reflect the preoccupations and obsessions of the larger culture, it’s eye opening that three of the twelve contenders for international documentary film this year address the dark side of screen technology.

Love Child, looks at the tragic 2010 death by neglect of a three-month-old baby named “Sarang” (“Love” in Korean), when her parents spent up to twelve hours a day playing the game Prius, caring for their avatar …


Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo Mar 2014

Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo

Professor Willy Susilo

Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

M. G. Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

Professor Katina Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson Sep 2013

Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson

Ariana R. Levinson

This article posits that privacy issues arising in the United States from the use of social media and the employment relationship are similar to those that have arisen around the world. It suggests, however, that the patchwork of governing legal claims arising under different laws in different jurisdictions may be unique. After a brief introduction, the second section describes the recent passage of legislation in several states that may protect the privacy of job applicants’ passwords to social-media sites. The third section describes the various claims employees may bring under the federal Electronic Communications Privacy Act, in tort for invasion …