Archive for the 'Privacy' Category

Teens and Mobile Apps Privacy

Posted in Digital Culture, Privacy on August 23rd, 2013

The Pew Research Center's Internet & American Life Project has released Teens and Mobile Apps Privacy.

Here's an excerpt:

Here are some of the key findings in a new survey of U.S. teens ages 12-17:

  • 58% of all teens have downloaded apps to their cell phone or tablet computer.
  • 51% of teen apps users have avoided certain apps due to privacy concerns.
  • 26% of teen apps users have uninstalled an app because they learned it was collecting personal information that they didn't wish to share.
  • 46% of teen apps users have turned off location tracking features on their cell phone or in an app because they were worried about the privacy of their information.

Digital Scholarship | Digital Scholarship Publications Overview | Sitemap

Be Sociable, Share!

    Riding the Waves or Caught in the Tide? Insights from the IFLA Trend Report

    Posted in Emerging Technologies, Libraries, Privacy, Research Libraries on August 20th, 2013

    IFLA has released Riding the Waves or Caught in the Tide? Insights from the IFLA Trend Report.

    Here's an excerpt from the announcement:

    In the global information environment, time moves quickly and there's an abundance of commentators trying to keep up. With each new technological development, a new report emerges assessing its impact on different sectors of society. The IFLA Trend Report takes a broader approach and identifies five high level trends shaping the information society, spanning access to education, privacy, civic engagement and transformation. Its findings reflect a year's consultation with a range of experts and stakeholders from different disciplines to map broader societal changes occurring, or likely to occur in the information environment.

    Digital Scholarship | Digital Scholarship Publications Overview | Sitemap

    Be Sociable, Share!

      "Private But Eventually Public: Why Copyright in Unpublished Works Matters in the Digital Age"

      Posted in Copyright, Digital Curation & Digital Preservation, Privacy on April 18th, 2013

      Damien McCallig has published "Private But Eventually Public: Why Copyright in Unpublished Works Matters in the Digital Age" in the latest issue of SCRIPTed.

      Here's an excerpt:

      Digital life is no longer only concerned with online communication between living individuals; it now encompasses post-death phenomena of inheritance, legacy, mourning and further uses of our digital remains. Scholars and practitioners seeking an appropriate legal theory to claim, control and recover the digital remains of the dead and protect post-mortem privacy interests have identified copyright as a possible surrogate.

      This article explores the links between copyright and privacy in unpublished works. It charts the historical development of perpetual copyright protection in unpublished works, reviews the reasons why perpetual protection for unpublished works has been abolished and analyses some of the privacy impacts of these changes. It argues that without perpetual copyright protection and the surrogate privacy protections in unpublished works, the fear that one's digital remains will eventually be opened to societal scrutiny may lead to the fettering of personal and private communication, while alive, and may promote the deletion of one's digital remains in contemplation of death.

      Digital Scholarship | Digital Scholarship Publications Overview | Sitemap

      Be Sociable, Share!

        The Right to Be Forgotten—Between Expectations and Practice

        Posted in Privacy, Reports and White Papers on December 10th, 2012

        The European Network and Information Security Agency has released The Right to Be Forgotten—Between Expectations and Practice.

        Here's an excerpt:

        The right to be forgotten is included in the proposed regulation on data protection published by the European Commission in January 20121. The regulation is still to be adopted by the European Parliament for entering into force. The different legal aspects of the right to be forgotten (i.e. right to erasure or right to oblivion) have been debated in different contexts and are beyond the scope of this paper. With this paper we aim to cover other facets of the right to be forgotten. We focus on the technical means to enforce or support the right in information systems; as can be seen from this paper, there are technical limitations and there is a further need for clear definitions and legal clarifications.

        | Digital Scholarship's 2012 Publications | Digital Scholarship |

        Be Sociable, Share!

          "Who’s Tracking Your Reading Habits? An E-Book Buyer’s Guide to Privacy, 2012 Edition"

          Posted in E-Books, Privacy, Publishing, Reports and White Papers on November 30th, 2012

          The EFF has released "Who's Tracking Your Reading Habits? An E-Book Buyer's Guide to Privacy, 2012 Edition."

          Here's an excerpt:

          As we've done since 2009, again we've taken some of the most popular e-book platforms and combed through their privacy policies for answers to common privacy questions that users deserve to know. In many cases, these answers were frustratingly vague and long-winded. In nearly all cases, reading e-books means giving up more privacy than browsing through a physical bookstore or library, or reading a paper book in your own home. Here, we've examined the policies of Google Books, Amazon Kindle, Barnes & Noble Nook, Kobo, Sony, Overdrive, Indiebound, Internet Archive, and Adobe Content Server for answers to the following questions:

          • Can they keep track of searches for books?
          • Can they monitor what you're reading and how you're reading it after purchase and link that information back to you? Can they do that when the e-book is obtained elsewhere?
          • What compatibility does the device have with books not purchased from an associated eBook store?
          • Do they keep a record of book purchases? Can they track book purchases or acquisitions made from other sources?
          • With whom can they share the information collected in non-aggregated form?
          • Do they have mechanisms for customers to access, correct, or delete the information?
          • Can they share information outside the company without the customer's consent?

          | Digital Scholarship's Digital/Print Books | Digital Scholarship |

          Be Sociable, Share!

            "The Web Privacy Census," June 2012

            Posted in Privacy on June 27th, 2012

            The Berkeley Center for Law and Technology has released "The Web Privacy Census," June 2012.

            Here's an excerpt:

            In this report, we discuss the results of a crawl conducted on 5/17/12. We found cookies on all popular websites (by "popular websites," we mean the top 100 most popular according to Quantcast). We conduct two different crawls—a shallow one where our test browser just visits the homepage of a site, and a deep crawl where our browser visits six links on a site. Our shallow crawl of the 25,000 most popular sites revealed that 87% have cookies (24% first, 76% third), 9% had HTML5 storage objects, and less than .0001% had flash cookies. Twenty-five percent of cookies include names such as "UID" and "GUID", suggesting that they are used for uniquely identifying users. Overall, we found that flash cookie usage is dropping and HTML5 storage use is rising and at least one tracker is using HTML5 local storage to hold unique identifiers from third party cookies.

            | Scholarly Electronic Publishing Weblog | Digital Scholarship |

            Be Sociable, Share!

              ALA Action Alert: Cybersecurity Information Sharing and Protection Act of 2011

              Posted in ALA, Legislation and Government Regulation, Privacy on April 17th, 2012

              The American Library Association has issued an action alert regarding the Cybersecurity Information Sharing and Protection Act of 2011.

              Here's an excerpt:

              Please call and ask your U.S. Representative to OPPOSE H.R. 3523, The Cybersecurity Information Sharing and Protection Act of 2011 or CISPA, one of several bills to be considered in the U.S. House of Representatives during "Cybersecurity Week" starting April 23, 2012.

              ALA is concerned that essentially all private electronic communications could be obtained by the government and used for many purposes—and not just for cybersecurity activities. H.R. 3523 would permit, even require ISPs and other entities to monitor all electronic communications and share personal information with the government without effective oversight just by claiming the sharing is for "cybersecurity purposes"

              | Digital Scholarship |

              Be Sociable, Share!

                "The Privacy Implications of Digital Preservation: Social Media Archives and the Social Networks Theory of Privacy"

                Posted in Digital Curation & Digital Preservation, Privacy, Social Media/Web 2.0 on March 27th, 2012

                Jasmine E. McNealy has self-archived "The Privacy Implications of Digital Preservation: Social Media Archives and the Social Networks Theory of Privacy" in SSRN.

                Here's an excerpt:

                This paper seeks to analyze whether SNS [Social Networking Sites] users can claim a right to privacy with respect to their online communications. To do so, this paper will examine the privacy implications of the LOC Twitter archive in light of Strahilevitz's social network theory of privacy. First, this article briefly discusses the LOC Twitter archive. Next, this article explores the online networking phenomenon and the privacy implications associated with social media. Third, this article examines privacy, in particular Strahilevitz's social networks theory of privacy. Part four analyzes whether a challenge to the LOC Twitter archive based on a theory of invasion of privacy by public disclosure of private facts or intrusion would succeed under the social network theory of privacy. This article concludes with considerations for digital archives in relation to protecting personal privacy.

                | Digital Curation and Preservation Bibliography | Digital Scholarship |

                Be Sociable, Share!

                  Page 1 of 41234

                  DigitalKoans

                  DigitalKoans

                  Digital Scholarship

                  Copyright © 2005-2014 by Charles W. Bailey, Jr.

                  Creative Commons License

                  This work is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.