2015
DOI: 10.6017/ital.v34i3.5495
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Online Surveillance: What Librarians Should Know to Protect Their Own Privacy and That of Their Patrons

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 11 publications
(18 reference statements)
0
12
0
Order By: Relevance
“…Magi (2013) urges that librarians educate their users about these pitfalls so that they can make “informed choices” and that libraries keep circulation and research profile information in house as far as possible (p. 39; see also Fortier and Burkell, 2015). This is all very well, but will it matter?…”
Section: Resultsmentioning
confidence: 99%
“…Magi (2013) urges that librarians educate their users about these pitfalls so that they can make “informed choices” and that libraries keep circulation and research profile information in house as far as possible (p. 39; see also Fortier and Burkell, 2015). This is all very well, but will it matter?…”
Section: Resultsmentioning
confidence: 99%
“…To this end, we have several recommendations. First, information professionals should educate themselves with respect to behavioural tracking mechanisms and the measures that can be taken to identify and even block behavioural tracking . Second, armed with this information and appropriate tools, information professionals should assess the behavioural tracking practices of the consumer health websites they recommend.…”
Section: Resultsmentioning
confidence: 99%
“…More recently, however, websites and associated advertisers have increased their use of behavioural tracking using tools such as HTTP cookies, Web beacons and Flash cookies. These mechanisms collect non‐personally identifying information such as IP address, browser configuration information and details of browsing behaviour . Information is often integrated across multiple visits to a website and even across visits to different websites to assemble a detailed profile of online activities.…”
Section: Introductionmentioning
confidence: 99%
“…However, though significant effort has been focused on librarian education around privacy-protection technology tools (e.g. Fortier and Burkell, 2015; Noh, 2014), relatively little work in the information science field has looked directly at the barriers and issues surrounding users’ adoption and use of such tools. These challenges have the potential to lessen the impact of librarians’ work in educating and encouraging patrons in using privacy-related technologies.…”
Section: Introductionmentioning
confidence: 99%
“…Complementing the formal training opportunities in this area for librarians and library staff, numerous pragmatic guides to privacy threats, protective actions and relevant technology tools exist, both in the research literature (e.g. Fortier and Burkell, 2015) and in web-based resources (such as the Library Freedom Project's (2018) "Privacy toolkit for librarians"). The American Library Association (ALA) provides a wealth of privacy-related guidelines, checklists, and toolkits for library staff and librarians (ALA, 2014(ALA, , 2016.…”
Section: Introductionmentioning
confidence: 99%