30,228 research outputs found

    Privacy, Restriction, and Access: Legal and Ethical Dilemmas

    Get PDF
    This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information

    SLIS Student Research Journal, Vol. 4, Iss. 1

    Get PDF

    Practices, policies, and problems in the management of learning data: A survey of libraries’ use of digital learning objects and the data they create

    Get PDF
    This study analyzed libraries’ management of the data generated by library digital learning objects (DLO’s) such as forms, surveys, quizzes, and tutorials. A substantial proportion of respondents reported having a policy relevant to learning data, typically a campus-level policy, but most did not. Other problems included a lack of access to library learning data, concerns about student privacy, inadequate granularity or standardization, and a lack of knowledge about colleagues’ practices. We propose more dialogue on learning data within libraries, between libraries and administrators, and across the library profession

    SLIS Student Research Journal, Vol. 1, Iss. 1

    Get PDF

    Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier

    Full text link
    As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property. Two parallel developments in academic data collection are converging: (1) open access requirements, whereby researchers must provide access to their data as a condition of obtaining grant funding or publishing results in journals; and (2) the vast accumulation of 'grey data' about individuals in their daily activities of research, teaching, learning, services, and administration. The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities are exploiting these data for research, learning analytics, faculty evaluation, strategic decisions, and other sensitive matters. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them. The privacy frontier facing research universities spans open access practices, uses and misuses of data, public records requests, cyber risk, and curating data for privacy protection. This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201

    Comparative Study of Ethics in Librarianship and the Bible

    Full text link
    This paper is a comparative study that discusses ethical issues in librarianship and the Bible. Such issues include: Laws in librarianship vs. laws in the Bible; censorship in librarianship vs. censorship in the Bible; Bible teachings on access to information and access to information in librarianship; purification (i.e., book binding), conservation and preservation practices in the library and in the Bible; weeding of library collections and weeding practices in the Bible; privacy and confidentiality in the library and in the Bible; orderliness of the library collections and the Bible; consortium building of library collections and in the Bible; and consequences of human action in the library and in the Bible. These topics are carefully discussed in order to discover the differences and similarities between the library and biblical ethics. The paper concludes that there is correlation between some ethical issues in the Bible and that of librarianship. It is clear that some aspects of librarianship are rooted in the Bible

    Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals

    Get PDF
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise on licenses, and to our account of the four facets of intellectual freedom. We find important conflicts with each

    After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance

    Get PDF
    Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumers’ privacy expectations and thereby, become “over-privileged” to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE
    • …
    corecore