Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (3)
- Communication (3)
- Communication Technology and New Media (3)
- Computer Engineering (3)
- Computer and Systems Architecture (3)
-
- Data Storage Systems (3)
- Digital Communications and Networking (3)
- Engineering (3)
- Management Information Systems (3)
- Science and Technology Studies (3)
- Technology and Innovation (3)
- Business Intelligence (2)
- E-Commerce (2)
- Education (2)
- Health Information Technology (2)
- Management Sciences and Quantitative Methods (2)
- Medicine and Health Sciences (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Social Media (2)
- Accessibility (1)
- Archival Science (1)
- Collection Development and Management (1)
- Curriculum and Instruction (1)
- Disability and Equity in Education (1)
- Educational Methods (1)
- Educational Technology (1)
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 13 of 13
Full-Text Articles in Information Literacy
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
School of Information Student Research Journal
The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.
Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller
Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller
Digital Initiatives Symposium
This session will cover free and open tools as well as teaching strategies for creating and implementing digital/web literacy and digital media instruction. The session will also be useful for people looking for free and open tools for their own projects, including how to get started and how to learn necessary new skills. Considerations such as terms of use, privacy, accessibility and licensing can be as or more important than functionality. Additionally, adopting open tools can advance conversations about open licensing which, in turn, can promote the application of creative commons and public domain licenses to appropriate works. Knowing about …
"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling
"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling
Western Libraries Presentations
This interactive presentation highlights pop-up programming designed to improve 21st century digital literacies. The session includes an overview of activity development and reflections on its success. Participants will explore light-touch digital literacy games on their personal devices and take home tools to recreate similar programming at their library.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Protecting Patron Privacy: Vendors, Libraries, And Patrons Each Have A Role To Play, Lori Bowen Ayre
Protecting Patron Privacy: Vendors, Libraries, And Patrons Each Have A Role To Play, Lori Bowen Ayre
Collaborative Librarianship
Abstract: Protecting patron privacy involves several activities including responsibly managing the data we store about patrons and their use of the library as well as working with our vendors which also access and make use of that data. It also involves educating our patrons so they can better control what happens with their personal information.
Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans
Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans
SLIS Connecting
With the passing of the USA Patriot Act in 2001 following the events of 9/11, libraries on the national scale have had to staunchly defend issues of privacy and confidentially more-so than ever before. Evidence of this lies not only in statements within the ALA’s Resolution on the USA PATRIOT Act and Libraries but also in other core documents which guide policy development in public libraries (ALA 2005). Intellectual Freedom and privacy are two of the major issues addressed and protected by the American Library Association through the Office of Intellectual Freedom and the Library Bill of Rights (ALA 1996).
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey
Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey
LACUNY Institute 2015
Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited …
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
Librarians As Advocates For Social Media Privacy, Sarah Lamdan
LACUNY Institute 2015
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Georgia International Conference on Information Literacy
See presentation description.
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
FIMS Publications
Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …
Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian
Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian
Publications and Research
As direct providers of information literacy, librarians can help patrons analyze the social and economic forces involved in the creation and use of information. This chapter will discuss why critical information literacy and critical pedagogy are especially important in the Armenian context, with its unique historical, cultural, and geopolitical concerns. The authors will document how the Armenian government has used cutting-edge Internet controls to block online content or misdirect users. We will also examine how Armenians perceive the independence of their available media and explore current efforts by telecom, publishing, and governmental concerns to restrict Internet freedom. The authors suggest …