"SPARC Releases Second Vendor Privacy Report Urging Action to Address Concerns with SpringerLink Data Privacy Practices"


SpringerLink provides a case study in the encroachment of the broader surveillance-based data brokering economy into academic systems. Among other findings, the report documents risks related to the 200 named third parties that are allowed to collect information from users of the site (along with what appear to be additional unlisted companies found only in our public website analysis). . . .

To fully understand how data may be used, librarians would need to read the 200 additional privacy policies from third parties that would likely stretch into the thousands of pages, a task complicated by numerous broken links to these policies at the time of publication.

https://tinyurl.com/wdkmha3z

Navigating Risk in Vendor Data Privacy Practices: An Analysis of Springer Nature’s SpringerLink

Artificial Intelligence |
| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

"Large Language Publishing: The Scholarly Publishing Oligopoly’s Bet on AI"


This article focuses on an offshoot of the big firms’ surveillance-publishing businesses: the post-ChatGPT imperative top profit from troves of proprietary “training data,” to make new AI products and—the essay predicts—to license academic papers and scholars’ tracked behavior to big technology companies.

https://tinyurl.com/ft2467my

| Artificial Intelligence |
| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

"A Literature Review of User Privacy Concerns in Conversational Chatbots: A Social Informatics Approach: An Annual Review of Information Science and Technology (ARIST) Paper"


Since the introduction of OpenAI’s ChatGPT-3 in late 2022, conversational chatbots have gained significant popularity. These chatbots are designed to offer a user-friendly interface for individuals to engage with technology using natural language in their daily interactions. However, these interactions raise user privacy concerns due to the data shared and the potential for misuse in these conversational information exchanges. Furthermore, there are no overarching laws and regulations governing such conversational interfaces in the United States. Thus, there is a need to investigate the user privacy concerns. To understand these concerns in the existing literature, this paper presents a literature review and analysis of 38 papers out of 894 retrieved papers that focus on user privacy concerns arising from interactions with text-based conversational chatbots through the lens of social informatics. The review indicates that the primary user privacy concern that has consistently been addressed is self-disclosure. This review contributes to the broader understanding of privacy concerns regarding chatbots the need for further exploration in this domain. As these chatbots continue to evolve, this paper acts as a foundation for future research endeavors and informs potential regulatory frameworks to safeguard user privacy in an increasingly digitized world.

https://doi.org/10.1002/asi.24898

| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

"Use ‘Jan’ to Chat with AI without the Privacy Concerns"


Jan is a free an open source application that makes it easy to download multiple large language models and start chatting with them. There are simple installers for Windows, macOS, and Linux. Now, this isn’t perfect. The models aren’t necessarily as good as the latest ones from OpenAI or Google, and depending on how powerful your computer is, the results might take a while to come in.

https://tinyurl.com/4m8p4b82

| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

Navigating Risk in Vendor Data Privacy Practices: An Analysis of Elsevier’s ScienceDirect


Navigating Risk in Vendor Data Privacy Practices: An Analysis of Elsevier’s ScienceDirect documents a variety of data privacy practices that directly conflict with library privacy standards, and raises important questions regarding the potential for personal data collected from academic products to be used in the data brokering and surveillance products of RELX’s LexisNexis subsidiary. By analyzing the privacy practices of the world’s largest publisher, the report describes how user tracking that would be unthinkable in a physical library setting now happens routinely through publisher platforms. The analysis underlines the concerns this tracking should raise, particularly when the same company is involved in surveillance and data brokering activities. Elsevier is a subsidiary of RELX, a leading data broker and provider of "risk" products that offer expansive databases of personal information to corporations, governments, and law enforcement agencies.

https://zenodo.org/records/10078610

| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

"The Scholarly Fingerprinting Industry"


Elsevier, Taylor & Francis, Springer Nature, Wiley, and SAGE: Many researchers know that the five giant firms publish most of the world’s scholarship. Fifty years of acquisitions and journal launches have yielded a stunningly profitable oligopoly, built up from academics’ unpaid writing-and-editing labor. Their business is a form of IP rentiership—collections of title-by-title prestige monopolies that, in the case of Nature or The Lancet, underwrite a stable of spinoff journals on the logic of the Hollywood franchise. Less well-known is that Elsevier and its peers are layering a second business on top of their legacy publishing operations, fueled by data extraction. They are packaging researcher behavior, gleaned from their digital platforms, into prediction products, which they sell back to universities and other clients. Their raw material is scholars’ citations, abstracts, downloads, and reading habits, repurposed into dashboard services that, for example, track researcher productivity. Elsevier and the other oligopolist firms are fast becoming, in other words, surveillance publishers. And they are using the windfall profits from their existing APC-and-subscription business to finance their moves into predictive analytics.

https://doi.org/10.31235/osf.io/yu34t

| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |

Rethinking Data and Rebalancing Digital Power


This report highlights and contextualises four cross-cutting interventions with a strong potential to reshape the digital ecosystem:

  • Transforming infrastructure into open and interoperable ecosystems.
  • Reclaiming control of data from dominant companies.
  • Rebalancing the centres of power with new (non-commercial) institutions.
  • Ensuring public participation as an essential component of technology policymaking.

http://bit.ly/40WNbKA

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |

"A World in Which Your Boss Spies on Your Brainwaves? That Future Is Near"


Farahany paints a picture of a near future in which every office worker could be fitted with a small wearable that would constantly record brain activity, creating an omnipotent record of your thoughts, attention and energy that the boss could study at leisure. No longer would it be enough to look like you’re working hard: your own brainwaves could reveal that you were slacking off. . . . A Coworker.org database of bossware found that more than 550 products are already in use in workplaces. Everywhere you look, workers are being tracked, watched, measured, scored, analyzed and penalized by software, human overseers and artificial intelligence, with the aim of wringing every last cent’s worth of productivity out of the flawed and fragile flesh-and-blood units of labor who must, regrettably, be used as employees until the robots get a little bit more manual dexterity.

bit.ly/3RO7ZQi

Paywall — NYT Wirecutter: "Why Every Twitter User Should Archive and Lock Down Their Data"


Now is a good time to take steps to lock down your Twitter account, grab what data you can, review where you’re using Twitter to sign in to other online services, and delete anything you’d rather not live on a site that may be on its last legs. Taking these steps could protect you from identity theft or private messages being made public

https://cutt.ly/oMZDWod

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |

"Is Mastodon Private and Secure? Let’s Take a Look"


For basic security, instances will employ transport-layer encryption, keeping your connection to the server you’ve chosen private. This will keep your communications safe from local eavesdroppers using your same WiFi connection, but it does not protect your communications, including your direct messages, from the server or instance you’ve chosen—or, if you’re messaging someone from a different instance, the server they’ve chosen. This includes the moderators and administrators of those instances, as well. Just like Twitter or Instagram, your posts and direct messages are accessible by those running the services. But unlike Twitter or Instagram, you have the choice in what server or instance you trust with your communications. . . . Two-factor authentication with an app or security key is available on Mastodon instances, giving users an extra security check to log on. The software also offers robust privacy controls: allowing users to set up automatic deletion of old posts, set personalized keyword filters, approve followers, and hide your social graph (the list of your followers and those you follow). Unfortunately, there is no analogue to making your account "private. . . . Mastodon users can mute, block, or report other users. Muting and blocking works just as you’d expect: it’s a list associated with your account that just stops the content of that user from appearing in your feed and prevents them from reaching out to you, respectively."

https://cutt.ly/mMZIEtS

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |

"Data Cartels:The Companies That Control and Monopolize Our Information"


Just a few companies dominate most of our critical informational resources. Often self-identifying as "data analytics" or "business solutions" operations, they supply the digital lifeblood that flows through the circulatory system of the internet. With their control over data, they can prevent the free flow of information, masterfully exploiting outdated information and privacy laws and curating online information in a way that amplifies digital racism and targets marginalized communities. They can also distribute private information to predatory entities.

https://www.sup.org/books/title/?id=33205

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |

"OIF’s Workbook of Privacy Best Practices for Libraries"

"Written by library privacy experts and based on input and guidance from a wide cross-section of stakeholders, The Ultimate Privacy Field Guide: A Workbook of Best Practices is structured to give library workers the tools needed to create and be advocates for privacy-protecting practices and policies. Published by ALA Editions in collaboration with ALA’s Office for Intellectual Freedom (OIF), it’s designed for use in school, public, and academic settings of all types and sizes."

https://cutt.ly/RBuJEzH

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |

Openly Licensed Photos and AI Facial Recognition White Paper: AI_Commons

"This white paper presents the case of using openly licensed photographs for AI facial recognition training datasets. . . . The case creates an opportunity to ask fundamental questions about the challenges that open licensing faces today, related to privacy, exploitation of the commons at massive scales of use, or dealing with unexpected and unintended uses of works that are openly licensed"

https://cutt.ly/pBuHEmH

| Research Data Publication and Citation Bibliography | Research Data Sharing and Reuse Bibliography | Research Data Curation and Management Bibliography | Digital Scholarship |