Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The virtuality of privacy and security on the

232 views

Published on

notes on a discussion regarding the use of third party applications in academic settings and the hurdles faculty needs to overcome in terms of standards and policies

Published in: Education
  • Be the first to comment

  • Be the first to like this

The virtuality of privacy and security on the

  1. 1. THEVIRTUALITY OF PRIVACY AND SECURITY ONTHE MODERN CAMPUS: the privacy and security issues of the “third- party software” teaching and learning Privacy & Security inToday’s Library by Amigos Library Services http://www.amigos.org September 21, 2017 Plamen Miltenoff, Ph.D., MLIS, @SCSUtechinstruc, https://www.facebook.com/InforMediaServices/ @AmigosLibServ @SCSUtechinstruc #facultytechnology #edtech #libtech #privacy #security
  2. 2. Plan ■ Working definition regarding “privacy” in academic environment ■ Working definition regarding “security” in academic environment ■ Discuss the balance between usage of institutionally-sanctioned and “third-party” applications – Advantages – Disadvantages ■ Privacy ■ Security ■ Seeking the middle ground https://www.pinterest.com/pin/528258231275219231/
  3. 3. Privacy and security – the American way A study was released recently about the thingsAmericans fear the most. It includes literally everything.Terrorism and identity theft. Corrupt companies and financial ruin. Tornadoes and adultery. From http://www.spiegel.de/international/world/ what-two-years-of-living-in-america- taught-me-a-1165557.html FollowingAlexis deTocqueville 
  4. 4. Privacy ■ Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet.[1][2] Internet privacy is a subset of data privacy. https://en.wikipedia.org/wiki/Internet_privacy http://hightechforum.org/life-liberty-pursuit-privacy/ ■ ALA | Privacy Many states provide guarantees of privacy in their constitutions and statute law. Numerous decisions in case law have defined and extended rights to privacy. ... Protecting user privacy and confidentiality has long been an integral part of the mission of libraries. http://www.ala.org/Template.cfm?Section=interp retations&Template=/ContentManagement/Cont entDisplay.cfm&ContentID=34182
  5. 5. Security ■ Definition - What does Internet Security mean? Internet security is a catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through aWeb form, and overall authentication and protection of data sent via Internet Protocol. https://www.techopedia.com/definition/23548/internet- security
  6. 6. The role of the library in teaching with technology unsupported by campus IT the privacy and security issues of the “third-party software” teaching and learning ■ Why third party applications? (Adobe Connect pole) – Pros – Cons ■ Your preference: (Adobe Connect pole) – Would you use (teach/learn) with standardized tools – Would you outsource ■ Word of the day: #AppSmashing: http://blog.stcloudstate.edu/ims/2017/06/22/app-smashing/
  7. 7. Campus reality: faculty ■ Moreover, research has shown that faculty regard online teaching as more difficult and intensive than teaching traditional courses (Gerlich, 2005;Wegmann, and McCauley, 2008).They found that faculty believed online courses were to be more difficult to teach because of workload increases due to more interaction with students, grading paper, designing assignments, and assessments.This resulted in being overwhelmed with stress, which lead to anger. Similarly, Sellani and Harrington (2002) found that faculty became overwhelmed with designing online courses and their other demands as faculty including research and service commitments interfered and cause workplace stress… Lack of adequate technology led to feelings of anxiety, stress, and anger associated with online learning and technology. Kidd,T, Morris, L. (2017). Handbook of Research on Instructional Systems and EducationalTechnology. IGI Global
  8. 8. Campus IT and technology standartization http://www.sandiego.edu/its/support/hardware/why-standardize.php ■ Why Standardize? ■ Why is this important? – Cost value – Compatibility – Time savings – Support – Support costs – Asset tracking AdobeConnect survey: Technology standardization: – Yes – No – Indifferent
  9. 9. “Third-party” versus standartization ■ The increasing use of third-party logistics providers is a part of general trend toward an emphasis on market rather than hierarchies to accomplish corporate goals. Lewis, I.,Talalayevsky,A. (2000). Journal Of Business Logistics, 21(2), pp. 173-186. ■ The model was tested using data from a survey of 335 firms. Results indicate that uncertainty is the major deterrent to outsourcing, while the level of technical skills is the most important reason to outsource. Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT outsourcing. Information & Management, 41(7), 921–932. https://doi.org/10.1016/j.im.2003.09.001
  10. 10. Issues with “third-party” ■ Privacy and security – FERPA FERPA AND CAMPUS SAFETY: http://www.irb.vt.edu/documents/ferpa.pdf – does campus IT support of third party
  11. 11. Is there a middle ground? ■ Between a “stagnant” standardization And ■ Third-party perils Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision- making?
  12. 12. Plamen Miltenoff pmiltenoff@stcloudstate.edu 302 308 3072 @SCSUtechinstruc https://www.facebook.com/InforMediaServices/ http://blog.stcloudstate.edu/ims/

×