This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Online Identity and the Fragmentation of the Internet - Tobias Matznercyborgology
This document discusses the fragmentation of the internet and online identity. It notes that popular internet services and apps increasingly limit access through closed platforms rather than open standards. This can impact the disclosure of personal identity and possibilities for participation online. The document examines perspectives for analyzing these issues, including considerations of technology and code, legal aspects, and the potential for surveillance and social control through closed platforms.
This document discusses privacy and data protection topics. It begins with an introduction about how privacy has become a major issue as organizations collect and share personal information. It then covers key topics like definitions of privacy, how technology poses new risks to privacy through databases and data sharing, and debates around government surveillance and how privacy can be protected.
This document discusses the concept of online gatekeepers and proposes a framework for identifying them. It defines two types of gatekeepers: 1) Online gatekeepers who control information flow through a "gate" and 2) Internet information gatekeepers who attract human rights responsibilities by controlling democratic deliberation and participation. The framework involves analyzing whether a entity is an online gatekeeper and/or an internet information gatekeeper based on their scale of responsibility and democratic impact. Examples of potential internet information gatekeepers are given such as ISPs, search engines, Facebook, Wikipedia, and certain content moderators.
In this presentation, Sushmitha introduces IoT and associated trends. Sushmitha is interested in cloud computing which is one of the enablers of IoT. She also talks about fog computing which uses challenge questions for access control.
Social Networking Sites and Privacy as Contextual Integritymvla
The document discusses the theory of privacy as contextual integrity (PCI) and how it relates to social networking sites (SNS). PCI examines how information transfer norms are formed within contexts defined by values. The document outlines how PCI is a normative and multifaceted theory that challenges the public-private dichotomy. It also discusses how PCI addresses reasonable expectations of privacy and how norms evolve with new contexts like SNS. The challenges of identifying contexts within SNS and determining reasonable privacy expectations in those contexts are also examined.
Online Identity and the Fragmentation of the Internet - Tobias Matznercyborgology
This document discusses the fragmentation of the internet and online identity. It notes that popular internet services and apps increasingly limit access through closed platforms rather than open standards. This can impact the disclosure of personal identity and possibilities for participation online. The document examines perspectives for analyzing these issues, including considerations of technology and code, legal aspects, and the potential for surveillance and social control through closed platforms.
This document discusses privacy and data protection topics. It begins with an introduction about how privacy has become a major issue as organizations collect and share personal information. It then covers key topics like definitions of privacy, how technology poses new risks to privacy through databases and data sharing, and debates around government surveillance and how privacy can be protected.
This document discusses the concept of online gatekeepers and proposes a framework for identifying them. It defines two types of gatekeepers: 1) Online gatekeepers who control information flow through a "gate" and 2) Internet information gatekeepers who attract human rights responsibilities by controlling democratic deliberation and participation. The framework involves analyzing whether a entity is an online gatekeeper and/or an internet information gatekeeper based on their scale of responsibility and democratic impact. Examples of potential internet information gatekeepers are given such as ISPs, search engines, Facebook, Wikipedia, and certain content moderators.
In this presentation, Sushmitha introduces IoT and associated trends. Sushmitha is interested in cloud computing which is one of the enablers of IoT. She also talks about fog computing which uses challenge questions for access control.
Social Networking Sites and Privacy as Contextual Integritymvla
The document discusses the theory of privacy as contextual integrity (PCI) and how it relates to social networking sites (SNS). PCI examines how information transfer norms are formed within contexts defined by values. The document outlines how PCI is a normative and multifaceted theory that challenges the public-private dichotomy. It also discusses how PCI addresses reasonable expectations of privacy and how norms evolve with new contexts like SNS. The challenges of identifying contexts within SNS and determining reasonable privacy expectations in those contexts are also examined.
A brief account of the current state of EU data protection laws accompanied by the suggestion they face almost insuperable challenge from the combination of the illusory nature of consent in most online contracts; the rise of big data as a "treasure hunt"; and the rise oambient environments for data colelction (the "Internet of Things") where design imperatives push towards an absence of opportunities for informed specific consent.
1. The document discusses how data protection laws are meant to work based on principles of consent and transparency, but these principles are breaking down due to technological advances.
2. Ubiquitous computing and "ambient environments" make it difficult if not impossible to provide meaningful consent and transparency as data is collected invisibly and continuously in public.
3. Big data undermines the idea of consent by allowing for secondary uses of data that were not envisioned or consented to originally.
4. "Smart cities" combine issues of consent, ubiquitous data collection, and big data, posing challenges for how to protect individual privacy within a system aimed at social benefits through data.
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information
Privacy Concerns related to Verifiable ClaimsDavid Wood
The document discusses privacy concerns related to verifiable claims, specifically around cross-site tracking of credentials and whether a single identity profile is sufficient to protect individual privacy. It acknowledges these are open issues being discussed in standards groups and proposes some mitigation strategies, such as using local identifiers and accepting certain risks of agency collusion required by regulations.
Copyright and privacy by design - what lessons have we learned?blogzilla
This document discusses privacy and data protection by design. It covers:
1. Early efforts at digital rights management (DRM) and "trusted" system architectures.
2. More recent efforts at web blocking and legislation like the PROTECT-IP Act. Effectiveness of blocking is limited by encryption, site replication, and alternative access methods.
3. The GDPR's requirements for data protection by design and by default, including data minimization and limiting data collection and access.
A practical approach to the internet of things by Kristian FossKristian Foss
This document discusses legal issues surrounding the Internet of Things, including cyber crime, product and service liability, personal liability, data ownership, privacy, and information security. Specific topics covered include the EU's General Data Protection Regulation, principles of privacy by design, data protection impact assessments, and codes of conduct for certifying IoT devices and services. The presentation was given by Kristian Foss at a conference in Madrid on legal approaches to ensuring privacy and security with the growth of connected devices and data collection.
Tensions between intellectual property and knowledge discovery in the digital...LIBER Europe
Presentation on text and data mining, its uses, and issues to be addressed to increase its uptake: copyright, open access. Introduces a new European open research infrastructure, OpenMinTed, which will enable TDM and tha capturing of TMD outputs. Ex Libris session, #WLIC15 Cape Town, 18 August 2015.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
The document discusses strategies for civil society organizations (CSOs) to advocate on internet policy issues in Indonesia, including online freedom of expression. It identifies key issues like privacy, surveillance, and net neutrality. CSO representatives discussed these topics and how to prioritize them for engagement at the 2013 Internet Governance Forum. The document also examines Indonesia's law on electronic information dissemination and some court cases around online defamation, identifying the law as a hindrance to internet users' rights. CSOs plan capacity building, media outreach, and stakeholder engagement to advocate reforming this law to protect freedom of expression.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Social media: Legal and business challengesPaul Jacobson
This is a presentation for the IT Governance Forum which ran between 24 and 27 November 2009. My goal was to highlight concrete risks that social media poses and some of the ways to address those risks.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
We see a lot of hype about security in today's networks. This presentation outlines where cybersecurity is going, the global paradigm, the role of government and civil society in building transparency as security evolves.
This document discusses declining privacy norms and the challenges posed by new technologies. It summarizes:
1) Consent for data collection and use has become less meaningful online as privacy policies are complex and users prioritize immediate benefits over long-term privacy risks.
2) Ubiquitous computing through technologies like RFID, smart meters, and sensors threaten to collect personal data without notice or choice as collection becomes invisible and ambient.
3) Reform efforts have failed to adequately address these issues, and notice and consent may no longer be viable frameworks as technologies learn from total and constant data collection in ways that are adaptive and useful but threaten privacy.
This document discusses several legal restraints that can impact media companies, including defamation laws, equality laws, privacy laws, data protection acts, freedom of information acts, intellectual property laws, and copyright laws. Defamation laws make it illegal to publish false statements that damage someone's reputation, while equality laws protect individuals from discrimination. Privacy laws govern how personal information can be collected and used, and data protection acts establish rules for handling data. Freedom of information acts enable public access to government-held information. Intellectual property laws protect original creative works, and copyright laws specifically protect works of authorship. A case study describes a design firm suing Target for allegedly copying and using their dog sketches without permission, in violation of
This document summarizes lessons learned from privacy activism against a 2005 EU data retention directive in Germany. It discusses how the movement began informally but grew into a broader internet freedom movement. It highlights the importance of open and leaderless structures, viral marketing, getting offline for real-world engagement, and internationalization. Current activities are now centered on Twitter under a common hashtag.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by Peter Murray of IndexData during the NISO virtual conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018.
CILIP Cymru Wales Conference 2019: Privacy literacy for better digital citizensCILIP
Aude Charillon's presentation
Many libraries and information centres offer digital skills training. But do we explain what happens with personal data online?
All citizens should be privacy literate, to make informed decisions about how much personal information they are comfortable sharing online and which software to use. We library and information professionals should be privacy literate, to help citizens and to ensure our own practices and systems are respectful of privacy.
This talk will cover how attendees can enhance their knowledge, what we can do in our institutions and how we may work together to make our services more respectful of citizens' privacy.
Understanding personal privacy in the age of big online dataMathieu d'Aquin
The document discusses the challenges of privacy in the age of big online data. It reviews experts' definitions of privacy as control over personal information. Regulations like the EU Data Protection Directive establish principles of transparency, legitimate purpose, and consent in data collection and processing. The concept of "social translucence" is introduced as making information flows and activities visible. Technological challenges in ensuring privacy include data fragmentation, user identification across systems, and limitations of data analysis at large scales. Semantic web technologies and reasoning approaches show promise in addressing some challenges through interoperability, collection proxies, and modeling access policies.
A brief account of the current state of EU data protection laws accompanied by the suggestion they face almost insuperable challenge from the combination of the illusory nature of consent in most online contracts; the rise of big data as a "treasure hunt"; and the rise oambient environments for data colelction (the "Internet of Things") where design imperatives push towards an absence of opportunities for informed specific consent.
1. The document discusses how data protection laws are meant to work based on principles of consent and transparency, but these principles are breaking down due to technological advances.
2. Ubiquitous computing and "ambient environments" make it difficult if not impossible to provide meaningful consent and transparency as data is collected invisibly and continuously in public.
3. Big data undermines the idea of consent by allowing for secondary uses of data that were not envisioned or consented to originally.
4. "Smart cities" combine issues of consent, ubiquitous data collection, and big data, posing challenges for how to protect individual privacy within a system aimed at social benefits through data.
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information
Privacy Concerns related to Verifiable ClaimsDavid Wood
The document discusses privacy concerns related to verifiable claims, specifically around cross-site tracking of credentials and whether a single identity profile is sufficient to protect individual privacy. It acknowledges these are open issues being discussed in standards groups and proposes some mitigation strategies, such as using local identifiers and accepting certain risks of agency collusion required by regulations.
Copyright and privacy by design - what lessons have we learned?blogzilla
This document discusses privacy and data protection by design. It covers:
1. Early efforts at digital rights management (DRM) and "trusted" system architectures.
2. More recent efforts at web blocking and legislation like the PROTECT-IP Act. Effectiveness of blocking is limited by encryption, site replication, and alternative access methods.
3. The GDPR's requirements for data protection by design and by default, including data minimization and limiting data collection and access.
A practical approach to the internet of things by Kristian FossKristian Foss
This document discusses legal issues surrounding the Internet of Things, including cyber crime, product and service liability, personal liability, data ownership, privacy, and information security. Specific topics covered include the EU's General Data Protection Regulation, principles of privacy by design, data protection impact assessments, and codes of conduct for certifying IoT devices and services. The presentation was given by Kristian Foss at a conference in Madrid on legal approaches to ensuring privacy and security with the growth of connected devices and data collection.
Tensions between intellectual property and knowledge discovery in the digital...LIBER Europe
Presentation on text and data mining, its uses, and issues to be addressed to increase its uptake: copyright, open access. Introduces a new European open research infrastructure, OpenMinTed, which will enable TDM and tha capturing of TMD outputs. Ex Libris session, #WLIC15 Cape Town, 18 August 2015.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
The document discusses strategies for civil society organizations (CSOs) to advocate on internet policy issues in Indonesia, including online freedom of expression. It identifies key issues like privacy, surveillance, and net neutrality. CSO representatives discussed these topics and how to prioritize them for engagement at the 2013 Internet Governance Forum. The document also examines Indonesia's law on electronic information dissemination and some court cases around online defamation, identifying the law as a hindrance to internet users' rights. CSOs plan capacity building, media outreach, and stakeholder engagement to advocate reforming this law to protect freedom of expression.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
Social media: Legal and business challengesPaul Jacobson
This is a presentation for the IT Governance Forum which ran between 24 and 27 November 2009. My goal was to highlight concrete risks that social media poses and some of the ways to address those risks.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
We see a lot of hype about security in today's networks. This presentation outlines where cybersecurity is going, the global paradigm, the role of government and civil society in building transparency as security evolves.
This document discusses declining privacy norms and the challenges posed by new technologies. It summarizes:
1) Consent for data collection and use has become less meaningful online as privacy policies are complex and users prioritize immediate benefits over long-term privacy risks.
2) Ubiquitous computing through technologies like RFID, smart meters, and sensors threaten to collect personal data without notice or choice as collection becomes invisible and ambient.
3) Reform efforts have failed to adequately address these issues, and notice and consent may no longer be viable frameworks as technologies learn from total and constant data collection in ways that are adaptive and useful but threaten privacy.
This document discusses several legal restraints that can impact media companies, including defamation laws, equality laws, privacy laws, data protection acts, freedom of information acts, intellectual property laws, and copyright laws. Defamation laws make it illegal to publish false statements that damage someone's reputation, while equality laws protect individuals from discrimination. Privacy laws govern how personal information can be collected and used, and data protection acts establish rules for handling data. Freedom of information acts enable public access to government-held information. Intellectual property laws protect original creative works, and copyright laws specifically protect works of authorship. A case study describes a design firm suing Target for allegedly copying and using their dog sketches without permission, in violation of
This document summarizes lessons learned from privacy activism against a 2005 EU data retention directive in Germany. It discusses how the movement began informally but grew into a broader internet freedom movement. It highlights the importance of open and leaderless structures, viral marketing, getting offline for real-world engagement, and internationalization. Current activities are now centered on Twitter under a common hashtag.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by Peter Murray of IndexData during the NISO virtual conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018.
CILIP Cymru Wales Conference 2019: Privacy literacy for better digital citizensCILIP
Aude Charillon's presentation
Many libraries and information centres offer digital skills training. But do we explain what happens with personal data online?
All citizens should be privacy literate, to make informed decisions about how much personal information they are comfortable sharing online and which software to use. We library and information professionals should be privacy literate, to help citizens and to ensure our own practices and systems are respectful of privacy.
This talk will cover how attendees can enhance their knowledge, what we can do in our institutions and how we may work together to make our services more respectful of citizens' privacy.
Understanding personal privacy in the age of big online dataMathieu d'Aquin
The document discusses the challenges of privacy in the age of big online data. It reviews experts' definitions of privacy as control over personal information. Regulations like the EU Data Protection Directive establish principles of transparency, legitimate purpose, and consent in data collection and processing. The concept of "social translucence" is introduced as making information flows and activities visible. Technological challenges in ensuring privacy include data fragmentation, user identification across systems, and limitations of data analysis at large scales. Semantic web technologies and reasoning approaches show promise in addressing some challenges through interoperability, collection proxies, and modeling access policies.
The document discusses various issues related to privacy invasion in the digital age. It addresses arguments such as "If you have nothing to hide, you have nothing to worry about" and explains why privacy matters for everyone. It also discusses how governments and companies can misuse personal data through secondary use, distortion, and data breaches, even if the initial intent is not harmful. The document advocates for individuals to take steps to maintain control over their private information and notes that privacy is important for security.
Presentation given at a seminar on "the impact of algorithms on fundamental rights", 22 March 2018, organized by the Dutch Ministry of the Interior and Kingdom Relations, Department of Constitutional Affairs. Jeroen van den Hoven is professor of ethics and technology at Delft University of Technology and scientific director of the Delft Design for Values Institute.
This document discusses censorship and privacy as two legal issues that can shape the management of information, as well as beneficence as an ethical issue. Specifically, it defines censorship as examining communications to suppress unacceptable material. Censorship aims to protect institutions and can occur before or after publication. Privacy laws protect individuals' personal information from unauthorized access and aim to prevent harm from information disclosure. Beneficence requires professionals to prioritize clients' interests over their own when managing personal data.
Some ethicists argue that the very conduct that results in resistanc.pdflibowskymcinnisell69
Some ethicists argue that the very conduct that results in resistance from
participants—interference, invasiveness in their lives, denial of privacy rights—has encouraged
researchers to investigate topics online that have long been the principal commodity of offline
investigation. The novelty and convenience of communicating by computer has led researchers
to cyberspace in search of abundant sources of data. Whether we call it the “wired society,”
“digital life,” “computer-mediated communication,” or “cyberculture,” the growth of
cyberstudies causes us to question how we gather data online, deal with participants, and present
results.
In a special ethics issue of Information Society, scholars involved in cyberspace research
concluded:
All participants agree that research in cyberspace provides no special dispensation to ignore
ethical precepts. Researchers are obligated to protect human subjects and “do right” in electronic
venues as in more conventional ones. Second, each participant recognizes that cyberspace poses
complex ethical issues that may lack exact analogs in other types of inquiry. The ease of covert
observation, the occasional blurry distinction between public and private venues, and the
difficulty of obtaining the informed consent of subjects make cyber-research particularly
vulnerable to ethical breaches by even the most scrupulous scholars. Third, all recognize that
because research procedures or activities may be permissible or not precluded by law or policy, it
does not follow that they are necessarily ethical or allowable. Fourth, all agree that the individual
researcher has the ultimate responsibility for assuring that inquiry is not only done honestly, but
done with ethical integrity.7
Issues relating to cyberspace in research also relate to data mining. The information collection
devices available today were once the tools of the spy, the science fiction protagonist, or the
superhero. Smart cards, biometrics (finger printing, retinal scans, facial recognition), electronic
monitoring (closed circuit television, digital camera monitoring), global surveillance, and genetic
identification (DNA) are just some of the technological tools being used by today’s organizations
to track and understand employees, customers, and suppliers. The data mining of all this
information, collected from advanced and not necessarily obvious sources, offers infinite
possibilities for research abuse.
show your reaction to that, how it can damage and can be destructive to a research, how it can be
destructive to research results, how it can be destructive to the name of the researcher, etc. Is
there any positive side that you see in that ethical matter? Write your assignment based on what
was just explained. Your assignment will be a large paragraph to a maximum of one page
Solution
A cyber event can be instigated either from external parties (remote, unauthorized access) or by
insider misuse:
Resulting in theft, disruption and/or damage to data a.
The document discusses the right to be forgotten and the debates around privacy, free speech, and transparency on the internet. It argues that while search engines currently act as judges in removing personal information, they do so opaquely and are motivated by commercial interests rather than fairness. True freedom of information requires regulation of internet companies and democratic processes for individuals to request accurate contextualization or removal of harmful private details. Extending rights to remove sensitive personal data globally could help address issues like online harassment while respecting both privacy and free speech.
This document discusses both the benefits and drawbacks of dataveillance, or the systematic monitoring and analysis of personal data. It outlines several potential benefits, such as understanding personal preferences, networks, research, accountability, and problem solving. However, it also examines some downsides, including data breaches, mistakes in analysis, bias in data and questions, filter bubbles that limit information exposure, threats to privacy, and mysteries around how data is used and social contracts with audiences.
This document discusses ethics and social media in physical therapy. It begins by defining social media and networking, and discussing their purposes. It then covers popular social media platforms and statistics. The document identifies key ethical and legal issues around maintaining patient privacy and professional boundaries. It presents a framework for ethical decision making regarding social media use. Finally, it provides recommendations for developing a social media strategy and guidelines on appropriate social media behaviors.
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
This document discusses ethics and social media in physical therapy. It defines social media and networking, and identifies their purpose of connecting people. Various social media platforms are discussed, along with statistics on their usage. Ethical and legal issues with social media use are identified, including maintaining privacy and confidentiality. Guidelines are provided for physical therapists to make ethical decisions regarding social media use and to develop a professional online presence.
Everyone seems to think that Big Social has made privacy a thing of the past. Think again. It's a human right and it's on the Endangered Species list, but there are ways to save it. Find out how.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
This document discusses several key issues relating to open data and access to information:
1) Open data enshrines the concept that data generated by the government with public funds cannot be unreasonably kept from citizens.
2) Access to information lays the foundation for good governance and transparency, allowing citizens to understand what is happening in their society.
3) Both open data and access to information laws must balance transparency with protecting personal privacy and sensitive information.
A presentation at the 'Information Privacy, Security and Forensics in the Digital Age' Symposium - a National Library of Wales / Aberystwyth University event 6th September 2012
Discourse on the public and private spheres in the digital age has aroused much critical commentary and has occasioned a revisioning of the meaning of public and private in the realm of information. Developments in on-line communication and commerce have popularised this debate and the question of what information is, or should be, public and private, is one which reflects the complexity and interconnectivity of personal and public personas.
In exploring the perceived potential for transparency and accountability, finding the balance between consumerism and control, collaboration and cyber security, and in developing communities of trust whilst being mindful of compliance and continuous enforcement is a challenge which benefits from interdisciplinary approaches. This symposium explores the boundaries of public and private in the digital ecology and includes contributions from a diverse range of fields: forensics, security, law, information and archival science, and social and mobile media.
There has been unprecedented activity in this area in the second decade of this millennium, culminating in a proclamation by the United Nations on access to the Internet as a human right, the deliberations of the Leveson Enquiry regarding press standards and surveillance culture and EU e-privacy and data protection reform, to name a few.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
The document provides an overview of two themes related to open text assessments: 1) Information Technology and Values, and 2) The Future is Now: A Zest for Living.
The section on Information Technology and Values discusses how information technology has become ubiquitous and how it leaves extensive digital trails of people's activities and information. It raises questions about who owns this data and how to balance privacy with businesses' use of personal information. The text also examines the role of moral values in recording, communicating, and accessing information in the digital era.
Similar to Marden - Privacy in the 21st Century Why It Matters Now More Than Ever (20)
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the closing segment of the NISO training series "AI & Prompt Design." Session Eight: Limitations and Potential Solutions, was held on May 23, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the seventh segment of the NISO training series "AI & Prompt Design." Session 7: Open Source Language Models, was held on May 16, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the sixth segment of the NISO training series "AI & Prompt Design." Session Six: Text Classification with LLMs, was held on May 9, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fifth segment of the NISO training series "AI & Prompt Design." Session Five: Named Entity Recognition with LLMs, was held on May 2, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fourth segment of the NISO training series "AI & Prompt Design." Session Four: Structured Data and Assistants, was held on April 25, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the third segment of the NISO training series "AI & Prompt Design." Session Three: Beginning Conversations, was held on April 18, 2024.
This presentation was provided by Kaveh Bazargan of River Valley Technologies, during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by Dana Compton of the American Society of Civil Engineers (ASCE), during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the second segment of the NISO training series "AI & Prompt Design." Session Two: Large Language Models, was held on April 11, 2024.
This presentation was provided by Teresa Hazen of the University of Arizona, Geoff Morse of Northwestern University. and Ken Varnum of the University of Michigan, during the Spring ODI Conformance Statement Workshop for Libraries. This event was held on April 9, 2024
This presentation was provided by William Mattingly of the Smithsonian Institution, during the opening segment of the NISO training series "AI & Prompt Design." Session One: Introduction to Machine Learning, was held on April 4, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the eight and final session of NISO's 2023 Training Series on Text and Data Mining. Session eight, "Building Data Driven Applications" was held on Thursday, December 7, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the seventh session of NISO's 2023 Training Series on Text and Data Mining. Session seven, "Vector Databases and Semantic Searching" was held on Thursday, November 30, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the sixth session of NISO's 2023 Training Series on Text and Data Mining. Session six, "Text Mining Techniques" was held on Thursday, November 16, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fifth session of NISO's 2023 Training Series on Text and Data Mining. Session five, "Text Processing for Library Data" was held on Thursday, November 9, 2023.
This presentation was provided by Todd Carpenter, Executive Director, during the NISO webinar on "Strategic Planning." The event was held virtually on November 8, 2023.
Strategic planning is an organizational management activity used to set priorities, focus energy and resources, and ensure employees are working toward common goals. It involves developing a vision and mission, setting clear and aligned goals and objectives, engaging stakeholders, conducting data analysis, and maintaining flexibility. Best practices for developing a strategic plan include researching market trends, conducting a SWOT analysis, defining an aspirational vision and mission, aligning on a strategy and goals to achieve the vision, and developing clear communications for stakeholders. The presentation discusses traditional strategic planning approaches and alternatives like the Theory of Change model.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fourth session of NISO's 2023 Training Series on Text and Data Mining. Session four, "Data Mining Techniques" was held on Thursday, November 2, 2023.
More from National Information Standards Organization (NISO) (20)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
1. Privacy in the 21st Century:
Why it Matters Now More Than Ever
Bill Marden
NISO Virtual Conference
“Information Freedom, Ethics, and Integrity”
18 April 2018
2. Privacy: What is it?
Any information that—alone or when
used in combination with other
information—can be used to identify,
locate or contact an individual. It is
considered “personal information”
regardless of whether it is stored on
paper, electronically or by any other
means.
Privacy is about ‘Personal Information’
2
3. Privacy: What is it?
What’s the difference between “privacy” and “confidentiality”?
Privacy: an individual’s right to control the collection, use and
disclosure of personal information.
Confidentiality: the obligation of an individual, organization or
business to protect personal information and not misuse or
wrongfully disclose that information.
3
4. • Completely public
• Openly-discoverable
• Completely private
• Known only to the
originator of the data
The Privacy Spectrum
“No person can stand outside of the network.
It is part of the fabric of contemporary society, from which one cannot remove oneself.”
— Peter Brantley, Univ. of California – Davis
4
5. 5
I am not interested in disconnecting from
technology. I believe technology has
empowered people to make great changes
in the world. I simply want to limit the
harmful downsides of a technology-saturated
life. As a result, I won’t be able to achieve
perfect privacy….
My goal is not to win at all costs. My goal
is simply to force my adversary to work
harder.
— Julia Angwin, Dragnet Nation
7. Privacy: Why Care?
Privacy is an essential human need,
and central to our ability to control
how we relate to the world. Being
stripped of privacy is fundamentally
dehumanizing, and it makes no
difference whether the surveillance
is conducted by an undercover
policeman following us around or by
a computer algorithm tracking our
every move.
— Bruce Schneier, Data and Goliath
7
8. Privacy: Why Care?
Privacy is essential to the exercise of free speech, free
thought, and free association. Lack of privacy and
confidentiality chills users' choices, thereby suppressing
access to ideas. The possibility of surveillance, whether
direct or through access to records of speech, research
and exploration, undermines a democratic society.
8
9. Privacy: Why Care?
“A person who says he doesn’t care about privacy
because he has nothing to hide is like someone saying
he doesn’t care about free speech because he has
nothing to say.”
— Edward Snowden, 4 May 2017
9
11. Types of Library Data
Digital
Circulation records
Borrowing requests
Reference questions (online chat, e-mail, etc.)
Online catalog searches
Online ticketing for events
Applications for library cards
In-library computer use
Analog
Call slips (e.g., for research collections)
Applications and order forms (library cards, events, etc.)
Receipts for check-ins, check-outs, fines, etc.
Personal Knowledge 11
12. 1971: Zhoia Horn and the ‘Harrisburg Seven’ case
Libraries and Privacy
12
13. 2005: George Christian and the
Connecticut ‘Library Connection’ case
Libraries and Privacy
13
14. Issues and Challenges
Increased growth of data types and connectivity
Lack of awareness (by both staff and public)
Manipulation of data (including Big Data)
Requests for data from law enforcement
14
16. More information = More people wanting to see it
Subpoenas, warrants, court orders, et al.
16Source: www.reddit.com/wiki/transparency/2016
17. Making it happen: here and now
Internal communication between library departments
Internal ‘Privacy Audits’ (battling the “Known Unknowns”)
‘Privacy by Design’
Training and awareness for staff and public
Lobbying for stricter protections in public laws
Privacy Policies, supported by guidelines and procedures
17
18. Policy as only one aspect of ‘Control’
18
Control activities are the policies, standards, guidelines and procedures
that ensure data assets are protected against accidental or deliberate
disclosure, modification, loss, destruction, or interruption.
Policy
(general
management
statements)
Standards
(specific mandatory controls)
Guidelines
(recommendations / best practices)
Procedures
(step-by-step instructions)
19. The library, as the unique sanctuary of the widest possible
spectrum of ideas, must protect the confidentiality of its records
in order to insure its readers' right to read anything they wish,
free from the fear that someone might see what they read and
use thisasa waytointimidate them….
19
20. Without such protection there would be a chilling effect on our
library users as inquiring minds turn away from exploring
varied avenues of thought because they fear the potentiality of
others knowing their reading history.
— Supporting documentation for 1981 passage of the New York State library-privacy law (NYS Statute CPLR §4509)
20
22. Bill Marden
Director of Privacy and Compliance
The New York Public Library
Stephen A. Schwarzman Building
476 Fifth Avenue
New York, NY 10018
T: 212.930.0651 | C: 917.699.7063 | WilliamMarden@nypl.org
22