SlideShare a Scribd company logo
1 of 12
THEVIRTUALITY OF
PRIVACY AND SECURITY
ONTHE MODERN CAMPUS:
the privacy and security issues of the “third-
party software” teaching and learning
Privacy & Security inToday’s Library by Amigos Library Services
http://www.amigos.org
September 21, 2017
Plamen Miltenoff, Ph.D., MLIS, @SCSUtechinstruc, https://www.facebook.com/InforMediaServices/
@AmigosLibServ @SCSUtechinstruc #facultytechnology #edtech #libtech #privacy #security
Plan
■ Working definition regarding “privacy” in academic environment
■ Working definition regarding “security” in academic environment
■ Discuss the balance between usage of institutionally-sanctioned and “third-party”
applications
– Advantages
– Disadvantages
■ Privacy
■ Security
■ Seeking the middle ground
https://www.pinterest.com/pin/528258231275219231/
Privacy and security – the American way
A study was released recently about the
thingsAmericans fear the most. It includes
literally everything.Terrorism and identity
theft. Corrupt companies and financial ruin.
Tornadoes and adultery.
From
http://www.spiegel.de/international/world/
what-two-years-of-living-in-america-
taught-me-a-1165557.html
FollowingAlexis deTocqueville 
Privacy
■ Internet privacy involves the right or mandate of personal privacy concerning the
storing, repurposing, provision to third parties, and displaying of information
pertaining to oneself via of the Internet.[1][2] Internet privacy is a subset of data privacy.
https://en.wikipedia.org/wiki/Internet_privacy
http://hightechforum.org/life-liberty-pursuit-privacy/
■ ALA | Privacy Many states provide guarantees of
privacy in their constitutions and statute law.
Numerous decisions in case law have defined and
extended rights to privacy. ... Protecting user
privacy and confidentiality has long been an
integral part of the mission of libraries.
http://www.ala.org/Template.cfm?Section=interp
retations&Template=/ContentManagement/Cont
entDisplay.cfm&ContentID=34182
Security
■ Definition - What does Internet Security mean?
Internet security is a catch-all term for a very broad issue
covering security for transactions made over the Internet.
Generally, Internet security encompasses browser security, the
security of data entered through aWeb form, and overall
authentication and protection of data sent via Internet
Protocol.
https://www.techopedia.com/definition/23548/internet-
security
The role of the library in teaching with
technology unsupported by campus IT
the privacy and security issues of the “third-party software” teaching and learning
■ Why third party applications? (Adobe Connect pole)
– Pros
– Cons
■ Your preference: (Adobe Connect pole)
– Would you use (teach/learn) with standardized tools
– Would you outsource
■ Word of the day: #AppSmashing:
http://blog.stcloudstate.edu/ims/2017/06/22/app-smashing/
Campus reality: faculty
■ Moreover, research has shown that faculty regard online teaching as more difficult and
intensive than teaching traditional courses (Gerlich, 2005;Wegmann, and McCauley,
2008).They found that faculty believed online courses were to be more difficult to
teach because of workload increases due to more interaction with students, grading
paper, designing assignments, and assessments.This resulted in being overwhelmed
with stress, which lead to anger. Similarly, Sellani and Harrington (2002) found that
faculty became overwhelmed with designing online courses and their other demands
as faculty including research and service commitments interfered and cause
workplace stress… Lack of adequate technology led to feelings of anxiety, stress, and
anger associated with online learning and technology.
Kidd,T, Morris, L. (2017). Handbook of Research on Instructional
Systems and EducationalTechnology. IGI Global
Campus IT and technology
standartization
http://www.sandiego.edu/its/support/hardware/why-standardize.php
■ Why Standardize?
■ Why is this important?
– Cost value
– Compatibility
– Time savings
– Support
– Support costs
– Asset tracking
AdobeConnect survey:
Technology standardization:
– Yes
– No
– Indifferent
“Third-party” versus standartization
■ The increasing use of third-party logistics providers is a part of general
trend toward an emphasis on market rather than hierarchies to
accomplish corporate goals.
Lewis, I.,Talalayevsky,A. (2000). Journal Of Business Logistics, 21(2), pp.
173-186.
■ The model was tested using data from a survey of 335 firms. Results
indicate that uncertainty is the major deterrent to outsourcing, while
the level of technical skills is the most important reason to outsource.
Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT
outsourcing. Information & Management, 41(7), 921–932.
https://doi.org/10.1016/j.im.2003.09.001
Issues with “third-party”
■ Privacy and security
– FERPA
FERPA AND CAMPUS SAFETY: http://www.irb.vt.edu/documents/ferpa.pdf
– does campus IT support of third party
Is there a middle ground?
■ Between a “stagnant” standardization
And
■ Third-party perils
Where/what is the balance between safeguarding
privacy on campus and fostering security without
stifling innovation and creativity?
Can the library be the campus hub for education
about privacy and security, the sandbox for testing
and innovation and the body to expedite decision-
making?
Plamen Miltenoff
pmiltenoff@stcloudstate.edu
302 308 3072
@SCSUtechinstruc
https://www.facebook.com/InforMediaServices/
http://blog.stcloudstate.edu/ims/

More Related Content

What's hot

Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning
Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning
Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning 8th DisCo conference 2013
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issuesrgermosen
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Distance Learning: An Evaluation of Online Learning
Distance Learning: An Evaluation of Online LearningDistance Learning: An Evaluation of Online Learning
Distance Learning: An Evaluation of Online Learningguest533473
 
Fair Use
Fair UseFair Use
Fair Usemcgeet1
 
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBoundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBernsteinUSC
 
Algorithms are biased because we are. Are we willing to change?
Algorithms are biased because we are. Are we willing to change?Algorithms are biased because we are. Are we willing to change?
Algorithms are biased because we are. Are we willing to change?Gregory Menvielle
 
Conole plenary LINQ Conference Brussels 12 May 2015
Conole plenary LINQ Conference Brussels 12 May 2015Conole plenary LINQ Conference Brussels 12 May 2015
Conole plenary LINQ Conference Brussels 12 May 2015Grainne Conole
 
Bridging the gap: OER for increasing access, openness and performance
Bridging the gap: OER for increasing access, openness and performanceBridging the gap: OER for increasing access, openness and performance
Bridging the gap: OER for increasing access, openness and performanceRamesh C. Sharma
 
Four dystopias for the future of education
Four dystopias for the future of educationFour dystopias for the future of education
Four dystopias for the future of educationBryan Alexander
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
A brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedA brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedUniversity of South Africa (Unisa)
 
Network Ethics Conference, Lisbon
Network Ethics Conference, LisbonNetwork Ethics Conference, Lisbon
Network Ethics Conference, LisbonLisa Harris
 

What's hot (20)

Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning
Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning
Jiří Zounek, Petr Sudický:Heads in the Cloud: Pros and Cons of Online Learning
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Distance Learning: An Evaluation of Online Learning
Distance Learning: An Evaluation of Online LearningDistance Learning: An Evaluation of Online Learning
Distance Learning: An Evaluation of Online Learning
 
Fair Use
Fair UseFair Use
Fair Use
 
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBoundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
 
TU Delft goes Mobile
TU Delft goes MobileTU Delft goes Mobile
TU Delft goes Mobile
 
Algorithms are biased because we are. Are we willing to change?
Algorithms are biased because we are. Are we willing to change?Algorithms are biased because we are. Are we willing to change?
Algorithms are biased because we are. Are we willing to change?
 
Conole plenary LINQ Conference Brussels 12 May 2015
Conole plenary LINQ Conference Brussels 12 May 2015Conole plenary LINQ Conference Brussels 12 May 2015
Conole plenary LINQ Conference Brussels 12 May 2015
 
Bridging the gap: OER for increasing access, openness and performance
Bridging the gap: OER for increasing access, openness and performanceBridging the gap: OER for increasing access, openness and performance
Bridging the gap: OER for increasing access, openness and performance
 
Four dystopias for the future of education
Four dystopias for the future of educationFour dystopias for the future of education
Four dystopias for the future of education
 
It orientation
It orientationIt orientation
It orientation
 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to Consider
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Rome talk
Rome talkRome talk
Rome talk
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
A brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - RevisitedA brave new world - Student surveillance in higher education - Revisited
A brave new world - Student surveillance in higher education - Revisited
 
Network Ethics Conference, Lisbon
Network Ethics Conference, LisbonNetwork Ethics Conference, Lisbon
Network Ethics Conference, Lisbon
 

Similar to The virtuality of privacy and security on the

EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxresource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxdebishakespeare
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».eMadrid network
 
9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docxJospehStull43
 
Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater AlleneMcclendon878
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Joanne Luciano
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencySimon Buckingham Shum
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For EducatorsMichael Zarro, Ph.D.
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53IRJET Journal
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxchristinemaritza
 
Vitae tomorrows-researchers
Vitae tomorrows-researchersVitae tomorrows-researchers
Vitae tomorrows-researchersMatthew Dovey
 

Similar to The virtuality of privacy and security on the (20)

EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxresource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
2021_07_01 «Learning Informatics as Inspiration for Learning Analytics».
 
9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx
 
Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater Confirming PagesLess managing. More teaching. Greater
Confirming PagesLess managing. More teaching. Greater
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • Agency
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For Educators
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
 
Meda5400 emergingtechnology
Meda5400 emergingtechnologyMeda5400 emergingtechnology
Meda5400 emergingtechnology
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
PP for syncrinization
PP for syncrinizationPP for syncrinization
PP for syncrinization
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
 
Vitae tomorrows-researchers
Vitae tomorrows-researchersVitae tomorrows-researchers
Vitae tomorrows-researchers
 

More from Plamen Miltenoff

Immersive Teaching and Learning
Immersive Teaching and LearningImmersive Teaching and Learning
Immersive Teaching and LearningPlamen Miltenoff
 
Digital badges and Microcredentialing
Digital badges and MicrocredentialingDigital badges and Microcredentialing
Digital badges and MicrocredentialingPlamen Miltenoff
 
Digital Badging and Microcredentialing
Digital Badging and MicrocredentialingDigital Badging and Microcredentialing
Digital Badging and MicrocredentialingPlamen Miltenoff
 
SCSU Augmented Reality Library Tour
SCSU Augmented Reality Library TourSCSU Augmented Reality Library Tour
SCSU Augmented Reality Library TourPlamen Miltenoff
 
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...Plamen Miltenoff
 
SCSU library digitizing/ archiving VHS tapes
SCSU library digitizing/ archiving VHS tapesSCSU library digitizing/ archiving VHS tapes
SCSU library digitizing/ archiving VHS tapesPlamen Miltenoff
 
Embedded Librarian and Gamification in Libraries
Embedded Librarian and Gamification in LibrariesEmbedded Librarian and Gamification in Libraries
Embedded Librarian and Gamification in LibrariesPlamen Miltenoff
 
Library Technology Conference 2018
Library Technology Conference 2018Library Technology Conference 2018
Library Technology Conference 2018Plamen Miltenoff
 
Are ETextbooks Cost Effective?
Are ETextbooks Cost Effective?Are ETextbooks Cost Effective?
Are ETextbooks Cost Effective?Plamen Miltenoff
 
Social Networking Sites in Learning Environments: What Students Want?
Social Networking Sites in Learning Environments:  What Students Want?Social Networking Sites in Learning Environments:  What Students Want?
Social Networking Sites in Learning Environments: What Students Want?Plamen Miltenoff
 
Social Media in Education: best practices for learning/teaching, communicatio...
Social Media in Education: best practices for learning/teaching, communicatio...Social Media in Education: best practices for learning/teaching, communicatio...
Social Media in Education: best practices for learning/teaching, communicatio...Plamen Miltenoff
 
Social media for my institution week four
Social media for my institution week fourSocial media for my institution week four
Social media for my institution week fourPlamen Miltenoff
 

More from Plamen Miltenoff (20)

Immersive Teaching and Learning
Immersive Teaching and LearningImmersive Teaching and Learning
Immersive Teaching and Learning
 
Digital badges and Microcredentialing
Digital badges and MicrocredentialingDigital badges and Microcredentialing
Digital badges and Microcredentialing
 
Digital Badging and Microcredentialing
Digital Badging and MicrocredentialingDigital Badging and Microcredentialing
Digital Badging and Microcredentialing
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
 
Open English
Open EnglishOpen English
Open English
 
Intro to XR in Libraries
Intro to XR in LibrariesIntro to XR in Libraries
Intro to XR in Libraries
 
XR mission possible
XR mission possibleXR mission possible
XR mission possible
 
SCSU Augmented Reality Library Tour
SCSU Augmented Reality Library TourSCSU Augmented Reality Library Tour
SCSU Augmented Reality Library Tour
 
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...
Multi-campus Partnership to Advance Sustainability in Chemistry Education, Re...
 
SCSU library digitizing/ archiving VHS tapes
SCSU library digitizing/ archiving VHS tapesSCSU library digitizing/ archiving VHS tapes
SCSU library digitizing/ archiving VHS tapes
 
Embedded Librarian and Gamification in Libraries
Embedded Librarian and Gamification in LibrariesEmbedded Librarian and Gamification in Libraries
Embedded Librarian and Gamification in Libraries
 
T4 tl 360_videos
T4 tl 360_videosT4 tl 360_videos
T4 tl 360_videos
 
Library Technology Conference 2018
Library Technology Conference 2018Library Technology Conference 2018
Library Technology Conference 2018
 
Library counters project
Library counters projectLibrary counters project
Library counters project
 
Vr library
Vr libraryVr library
Vr library
 
Are ETextbooks Cost Effective?
Are ETextbooks Cost Effective?Are ETextbooks Cost Effective?
Are ETextbooks Cost Effective?
 
Social Networking Sites in Learning Environments: What Students Want?
Social Networking Sites in Learning Environments:  What Students Want?Social Networking Sites in Learning Environments:  What Students Want?
Social Networking Sites in Learning Environments: What Students Want?
 
Social Media in Education: best practices for learning/teaching, communicatio...
Social Media in Education: best practices for learning/teaching, communicatio...Social Media in Education: best practices for learning/teaching, communicatio...
Social Media in Education: best practices for learning/teaching, communicatio...
 
Video 360 in the Library
Video 360 in the LibraryVideo 360 in the Library
Video 360 in the Library
 
Social media for my institution week four
Social media for my institution week fourSocial media for my institution week four
Social media for my institution week four
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

The virtuality of privacy and security on the

  • 1. THEVIRTUALITY OF PRIVACY AND SECURITY ONTHE MODERN CAMPUS: the privacy and security issues of the “third- party software” teaching and learning Privacy & Security inToday’s Library by Amigos Library Services http://www.amigos.org September 21, 2017 Plamen Miltenoff, Ph.D., MLIS, @SCSUtechinstruc, https://www.facebook.com/InforMediaServices/ @AmigosLibServ @SCSUtechinstruc #facultytechnology #edtech #libtech #privacy #security
  • 2. Plan ■ Working definition regarding “privacy” in academic environment ■ Working definition regarding “security” in academic environment ■ Discuss the balance between usage of institutionally-sanctioned and “third-party” applications – Advantages – Disadvantages ■ Privacy ■ Security ■ Seeking the middle ground https://www.pinterest.com/pin/528258231275219231/
  • 3. Privacy and security – the American way A study was released recently about the thingsAmericans fear the most. It includes literally everything.Terrorism and identity theft. Corrupt companies and financial ruin. Tornadoes and adultery. From http://www.spiegel.de/international/world/ what-two-years-of-living-in-america- taught-me-a-1165557.html FollowingAlexis deTocqueville 
  • 4. Privacy ■ Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet.[1][2] Internet privacy is a subset of data privacy. https://en.wikipedia.org/wiki/Internet_privacy http://hightechforum.org/life-liberty-pursuit-privacy/ ■ ALA | Privacy Many states provide guarantees of privacy in their constitutions and statute law. Numerous decisions in case law have defined and extended rights to privacy. ... Protecting user privacy and confidentiality has long been an integral part of the mission of libraries. http://www.ala.org/Template.cfm?Section=interp retations&Template=/ContentManagement/Cont entDisplay.cfm&ContentID=34182
  • 5. Security ■ Definition - What does Internet Security mean? Internet security is a catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through aWeb form, and overall authentication and protection of data sent via Internet Protocol. https://www.techopedia.com/definition/23548/internet- security
  • 6. The role of the library in teaching with technology unsupported by campus IT the privacy and security issues of the “third-party software” teaching and learning ■ Why third party applications? (Adobe Connect pole) – Pros – Cons ■ Your preference: (Adobe Connect pole) – Would you use (teach/learn) with standardized tools – Would you outsource ■ Word of the day: #AppSmashing: http://blog.stcloudstate.edu/ims/2017/06/22/app-smashing/
  • 7. Campus reality: faculty ■ Moreover, research has shown that faculty regard online teaching as more difficult and intensive than teaching traditional courses (Gerlich, 2005;Wegmann, and McCauley, 2008).They found that faculty believed online courses were to be more difficult to teach because of workload increases due to more interaction with students, grading paper, designing assignments, and assessments.This resulted in being overwhelmed with stress, which lead to anger. Similarly, Sellani and Harrington (2002) found that faculty became overwhelmed with designing online courses and their other demands as faculty including research and service commitments interfered and cause workplace stress… Lack of adequate technology led to feelings of anxiety, stress, and anger associated with online learning and technology. Kidd,T, Morris, L. (2017). Handbook of Research on Instructional Systems and EducationalTechnology. IGI Global
  • 8. Campus IT and technology standartization http://www.sandiego.edu/its/support/hardware/why-standardize.php ■ Why Standardize? ■ Why is this important? – Cost value – Compatibility – Time savings – Support – Support costs – Asset tracking AdobeConnect survey: Technology standardization: – Yes – No – Indifferent
  • 9. “Third-party” versus standartization ■ The increasing use of third-party logistics providers is a part of general trend toward an emphasis on market rather than hierarchies to accomplish corporate goals. Lewis, I.,Talalayevsky,A. (2000). Journal Of Business Logistics, 21(2), pp. 173-186. ■ The model was tested using data from a survey of 335 firms. Results indicate that uncertainty is the major deterrent to outsourcing, while the level of technical skills is the most important reason to outsource. Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT outsourcing. Information & Management, 41(7), 921–932. https://doi.org/10.1016/j.im.2003.09.001
  • 10. Issues with “third-party” ■ Privacy and security – FERPA FERPA AND CAMPUS SAFETY: http://www.irb.vt.edu/documents/ferpa.pdf – does campus IT support of third party
  • 11. Is there a middle ground? ■ Between a “stagnant” standardization And ■ Third-party perils Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision- making?
  • 12. Plamen Miltenoff pmiltenoff@stcloudstate.edu 302 308 3072 @SCSUtechinstruc https://www.facebook.com/InforMediaServices/ http://blog.stcloudstate.edu/ims/