Open Access. Powered by Scholars. Published by Universities.®

Information Literacy Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 13 of 13

Full-Text Articles in Information Literacy

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey May 2020

Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey

School of Information Student Research Journal

The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.


Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller Apr 2019

Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller

Digital Initiatives Symposium

This session will cover free and open tools as well as teaching strategies for creating and implementing digital/web literacy and digital media instruction. The session will also be useful for people looking for free and open tools for their own projects, including how to get started and how to learn necessary new skills. Considerations such as terms of use, privacy, accessibility and licensing can be as or more important than functionality. Additionally, adopting open tools can advance conversations about open licensing which, in turn, can promote the application of creative commons and public domain licenses to appropriate works. Knowing about …


"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling Jun 2018

"This Was Actually Fun!": Engaging Users In Conversations About Digital Literacy, Madisson Goldhawk, Erin Johnson, Lillian S. Rigling

Western Libraries Presentations

This interactive presentation highlights pop-up programming designed to improve 21st century digital literacies. The session includes an overview of activity development and reflections on its success. Participants will explore light-touch digital literacy games on their personal devices and take home tools to recreate similar programming at their library.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Protecting Patron Privacy: Vendors, Libraries, And Patrons Each Have A Role To Play, Lori Bowen Ayre Mar 2017

Protecting Patron Privacy: Vendors, Libraries, And Patrons Each Have A Role To Play, Lori Bowen Ayre

Collaborative Librarianship

Abstract: Protecting patron privacy involves several activities including responsibly managing the data we store about patrons and their use of the library as well as working with our vendors which also access and make use of that data. It also involves educating our patrons so they can better control what happens with their personal information.


Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans Dec 2016

Core Values: Intellectual Freedom And Privacy In Public Libraries, Stephanie A. Evans

SLIS Connecting

With the passing of the USA Patriot Act in 2001 following the events of 9/11, libraries on the national scale have had to staunchly defend issues of privacy and confidentially more-so than ever before. Evidence of this lies not only in statements within the ALA’s Resolution on the USA PATRIOT Act and Libraries but also in other core documents which guide policy development in public libraries (ALA 2005). Intellectual Freedom and privacy are two of the major issues addressed and protected by the American Library Association through the Office of Intellectual Freedom and the Library Bill of Rights (ALA 1996).


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey May 2015

Protecting Your Search Privacy: A Lesson Plan, Maria Bernhey

LACUNY Institute 2015

Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited …


Librarians As Advocates For Social Media Privacy, Sarah Lamdan May 2015

Librarians As Advocates For Social Media Privacy, Sarah Lamdan

LACUNY Institute 2015

Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that …


Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D Aug 2013

Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D

Georgia International Conference on Information Literacy

See presentation description.


Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier Mar 2013

Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier

FIMS Publications

Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …


Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian Jan 2013

Critical Information Literacy And The Technology Of Control: The Case Of Armenia, John Carey, D. Aram Donabedian

Publications and Research

As direct providers of information literacy, librarians can help patrons analyze the social and economic forces involved in the creation and use of information. This chapter will discuss why critical information literacy and critical pedagogy are especially important in the Armenian context, with its unique historical, cultural, and geopolitical concerns. The authors will document how the Armenian government has used cutting-edge Internet controls to block online content or misdirect users. We will also examine how Armenians perceive the independence of their available media and explore current efforts by telecom, publishing, and governmental concerns to restrict Internet freedom. The authors suggest …