15,274 research outputs found

    Privacy Issues for Online Personal Photograph collections

    Get PDF
    Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. However, it is unclear as to whether the users of such collection are fully aware of the potential privacy implications of submitting their personal contents (e.g. photographs, video, etc.) to these digital collections. They may even hold misconceptions of the technological support for preserving their privacy. In this paper we present results from 18 auto-ethnographic investigations and 19 ethnographic observations and interviews into privacy issues that arise when people make their personal photo collections available online. The AdamsĀ“ privacy model is used to discuss the findings according to information sensitivity, information receiver, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are also presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited

    Analyzing usersā€™ behaviour to identify their privacy concerns

    Get PDF
    The majority of studies examining privacy concerns of Internet users are based on surveys. Many problems have, however, been identified with using surveys to measure peopleā€™s privacy concerns. Based on our experience from our previous studies, in this paper we discuss how ethnographic interviews and observation techniques could be used to analyze usersā€™ behaviour in terms of how they share personal information and multimedia content with others, and utilize this to identify issues related to their privacy concerns more comprehensively than it is otherwise possible with conventional surveys

    Sharing, privacy and trust issues for photo collections

    Get PDF
    Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections. However, users may not be fully aware of the potential privacy implications of submitting their documents to a digital library, and may hold misconceptions of the technological support for preserving their privacy. We present results from 18 autoethnographic investigations and 19 observations / interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information receiver, information sensitivity, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited

    Towards task-based personal information management evaluations

    Get PDF
    Personal Information Management (PIM) is a rapidly growing area of research concerned with how people store, manage and re-find information. A feature of PIM research is that many systems have been designed to assist users manage and re-find information, but very few have been evaluated.This has been noted by several scholars and explained by the difficulties involved in performing PIM evaluations.The difficulties include that people re-find information from within unique personal collections; researchers know little about the tasks that cause people to re-find information; and numerous privacy issues concerning personal information. In this paper we aim to facilitate PIM evaluations by addressing each of these difficulties. In the first part, we present a diary study of information re-finding tasks. The study examines the kind of tasks that require users to re-find information and produces a taxonomy of re-finding tasks for email messages and web pages. In the second part, we propose a task-based evaluation methodology based on our findings and examine the feasibility of the approach using two different methods of task creation

    Digitization, Donor Relations, and Undergraduate Instruction

    Get PDF
    Collection development archivists know that building a partnership with a potential donor may take years, occasionally decades. From the perspective of a donor, contributing unique materials to an archival repository ā€“ a local historical society, academic archives, or a research library ā€“ can be an emotionally complicated process. A donor must have acquired a degree of separation from the material, but also have a deep sense of trust in the repository soliciting the records. Often, the initial contribution to a repository consists of records void of sentimental or financial value. As the relationship between a donor and a repository strengthens, donors (hopefully) begin contributing more noteworthy and revealing materials, including personal correspondence, diaries, and photographs. This scenario is routine not only with the acquisition of personal papers, but the records of businesses, membership organizations, and all other kinds of archival records

    Selecting Research Collections for Digitization: Applying the Harvard Model

    Get PDF
    published or submitted for publicatio

    Using Metadata To Mitigate The Risks Of Digitizing Archival Photographs Of Violence And Oppression

    Get PDF
    Questioning the archival imperative of access, this research article discussed how descriptive metadata can be used to contextualize and problematize digitized archival photographs, which are often inadequately described in the digital environment. Beginning with literature review of atrocity photos and their use and digitization to discuss the risks inherent to disseminating photos of or born from violence. Review continued into the digital environment and the risks inherent to making difficult archival collections accessible online and the conflict between the right to privacy of the individuals represented in archival materials and the archival imperative to provide access. Expanding on the recommendations made for ethical digitization of difficult or problematic archival collections made by scholars and groups such as Tara Robertson, the Archives for Black Lives in Philadelphia Anti-Racist Description Working Group. This article provided Case studies of a variety of digitized archival collections with offensive or violent contents and called for an acknowledgment of archival Labor in deciding which collections should be digitized and for a consensus on how to determine which collections need extra care and consideration in description. This article criticized the way archival metadata schema and vocabulary reduce photographs to their visual content and provided case studies focusing on metadata. It also introduced contextualizing essays as a tool for critical description. and acknowledged that Metadata work should be used with other measures to ethically digitize and disseminate collections with violent or oppressive histories. It connected Saidiya Hartmanā€™s concept of Critical fabulation to the contextualizing essay, concluding that metadata can be a tool for helping a user of a collection consider it in its historical and social context and provide a space for representing the experiences of those depicted in a collection, especially a collection with violent or problematic origins

    A Survey Paper on Photo Sharing and Privacy Control Decisions

    Get PDF
    Photo sharing is an alluring component which enhances Online Social Networks. Sadly, it may release clients' security on the off chance that they are permitted to post, remark, and label a photograph openly. Westudy the situation when a client shares a photograph containing people other than her (termed co-photograph for short). We need to minimize he security beaches that happen because posting the photos of people without the awareness of people involved in photo. For this reason, we require a proficient facial acknowledgment (FR) framework that can perceive everybody in the photograph. Notwithstanding, all the more requesting security setting may restrain the photographs' quantity freely accessible to prepare the FR framework. To manage this issue, our instrument endeavors to use clients' private photographs to plan a customized FR framework particularly prepared to separate conceivable photograph co-proprietors without releasing their protection. We additionally add to a disseminated accords based system to diminish the computational many-sided quality and ensure the private preparing set. We demonstrate that our framework is better than other conceivable methodologies as far as acknowledgment proportion and effectiveness. Our instrument is executed as a proof of idea Android application on Facebook's stage.OSNs will not contaminate to true users and polluted by unauthorized users and their posting the photos in unsecure way. Hence OSNs will be secure and safest

    Digitize Your Yearbooks: Creating Digital Access While Considering Student Privacy and Other Legal Issues

    Get PDF
    Student yearbooks are distinctive cultural records. For the schools and universities that produced them, yearbooks promoted a shared sense of identity and experience among students and helped create enduring loyalty to the institutions long after the students graduated. For scholars and other users, yearbooks are unique primary sources that provide insight into past eras of local student life and culture. In regards to user engagement and preserving local histories, student yearbooks should be ideal candidates for digitization by libraries and archives. However, yearbooks are challenging digitization projects because they are likely to contain privacy-sensitive photographs and other information as well as potentially copyrighted content created by multiple parties. An understanding of state and federal privacy laws, such as FERPA, and the ethical obligations to preserve the privacy of individuals is essential to addressing multi-layered concerns for digital access. The authors offer guidance for yearbook digitization projects based on their investigation of these issues as part of an initiative to digitize their University and K-12 schoolsā€™ collections of yearbooks

    Good practice guidance for the providers of social networking and other user-interactive services

    Get PDF
    • ā€¦
    corecore