12 research outputs found

    De-Identifying Your Data

    Get PDF
    This presentation was developed for a Digital Scholar Studio workshop at Florida International University. The presentation covers the legal ramifications and guidelines of collecting, processing, and sharing data, as well as a discussion on various techniques and tools available for pseudonymization and achieving anonymization. Definitions and workflows are provided at the beginning of the presentation and a discussion of encryption and anonymization services can be found at the end

    Trauma Informed Interviewing: Interviewing with Empathy and Protecting Oral History Narrators

    Get PDF
    This presentation discusses best privacy practice in the context of creating oral histories with narrators dealing with trauma. This was a panel discussion and this presentation represents content from this speaker only

    Opening a Communication Channel with the ETD Librarian

    Get PDF
    This presentation will share the results of a new initiative developed by the ETD Librarian at Florida International University (FIU) to develop a personal connection between students and the ETD Librarian. The goal is threefold; to provide a personal contact and open communication channel within the library to whom students can address publishing best practices and concerns with, to better inform and engage students in the metadata process of submitting theses and dissertations, and to spur the growth of knowledge and usage of ORCID. A previous initiative that added an ORCID and a license option to the metadata fields had resulted in a growth in licensing usage but the use of ORCID continued to remain flat at approximately 30%.A study was conducted to determine whether students understood when and why to use the ORCID and embargo options and the results showed that students did not understand the usefulness of these tools. At FIU, the ETD submission process is split into two parts with the graduate school coordinator being the main contact with students and the ETD Librarian doing the publishing in the institutional repository. Our ETD Coordinator offers workshops to help guide the students through this process, however, students have previously had no contact with the ETD Librarian. This novel approach aims to change that

    Facilitating a QEP micro-credential

    Get PDF
    This presentation is for faculty and staff considering teaching a micro-credential as part of the Quality Enhancement Plan at FIU and is part of the First Thursday presentation series. The content covers the available micro-credentials, the requirements of the QEP course, reimbursement, and what is expected from facilitators

    How will this benefit you? ​Ethical guidelines for community driven archives​

    Get PDF
    This presentation was given at the Centre for Excellence on Empathy, Equity & Diversity\u27s (CEEED) inaugural seminar, Making Empathy, Equity, and Diversity Relevant for Digital Ethics seminar. It provides a brief overview of how to develop an ethical foundation when working with historically marginalized communities in developing archives and digital collections. An ethical approach to digital collections is essential for creating collections and partnerships that benefit and represent community members and the institution hosting the collection. While examples in this presentation are based on developing relationships with tribal nations, the same approach can be employed in working with all community partners. The process of creating a collection from the initial idea and grant stage, techniques for reaching out to community members, and creating inclusive (and reparative) metadata are included

    An Overview of Understanding Digital Privacy

    Get PDF
    This presentation is part of the Digital Scholar Studio\u27s workshop series and is an overview of best practices related to digital security and privacy at home, work, and in the university setting. It covers the use of computers, mobile devices, and data storage and anonymization

    Digital Privacy in the Home

    Get PDF
    This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the risks associated with connected cars and smart appliances. teach you how to identify where your PII (personally identifiable information) is at risk and how to protect your privacy in the digital world when using everything from your phone to online bill paying to communicating with the Internet of Things (all those “smart” devices). We will consider questions such as: Are biometrics really more secure than a good password? Is your Alexa listening to you ALL the time? Can you delete your internet presence? Are all privacy browsers created equal? Join us to learn more about these topics and others related to digital privacy

    Facing Truths: Facial Recognition Software in Digital Archives

    Get PDF
    This presentation discusses research conducted on various facial recognition software and was funded by a LYRASIS Catalyst Fund grant. The goal of the research was to determine whether facial recognition software could be adapted to work with older, often faded or discolored historical photos and still accurately identify faces in photographs. Such software capabilities would be highly beneficial for librarians and archivists in creating quality metadata by identifying unknown people in photos. It would also assist archivists in finding the photos patrons and partners are seeking. The research brought to light the many ethical controversies associated with facial recognition technology, which are discussed here

    Monstrum in femine figura : the patriarchal devaluation of the Irish goddess, the Mor-rioghan

    Get PDF
    This work explores the transformation and eventual demotion of the goddess in ancient Ireland through the evolution of patriarchal mythos and as a consequence of economic factors, socio-political and religious manifestations, as well as agricultural developments. The purpose of this paper is to examine the relationship between leading theories of social, cultural and religious change in prehistory and early history and the historical process of the demotion of the Irish goddess figure, the Mor-rioghan. The Mor-rioghan is the subject of exploration as her militarization and subsequent incarnation as a bean si have resulted in her near dissolution. The decline of the goddess\u27s status will be explained as inevitable in the face of the evolving hierarchies of androcentric theologies

    Honoring Access and Privacy in Digital Collections

    Get PDF
    This session explores the often unforeseen challenges and issues that can arise with the creation and management of digital collections in regards to access and privacy. We will address incorporating a privacy review into production workflows that can embed privacy considerations into practice and offer possible solutions and creative ways in which two academic institutions have helped it’s students, faculty and researchers maintain their privacy. We will share examples of subpoenas, plagiarized content, take-down notices, awkward responses from contacted alumni, and the challenge of dealing with victims of violence. This session will share some lessons learned along with recommendations of addressing privacy before publication and dissemination. Our hope is to engender a discussion and provide a framework of best practices based on examples and discussion from the presenters and attendees, and also provide some resources to consult
    corecore