logo for American Library Association
Anonymity
Alison Macrina
American Library Association, 2019

front cover of Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

front cover of The Disaster Planning Handbook for Libraries
The Disaster Planning Handbook for Libraries
Mary Grace Flaherty
American Library Association, 2021
Libraries are in a unique position to aid communities during times of adversity, and this comprehensive handbook’s practical tools and expert guidance will help ensure that your library is thoroughly prepared for emergency response and recovery.

Your library is a vital information hub and resource provider every single day, and that’s doubly true when calamity strikes. In fact, your library’s role as an “essential community function” during disasters is now encoded in U.S. law. Engaging as a partner in planning and preparedness will build much-needed community support should disaster strike, and even a basic plan will also save you time and stress later on. No matter where your library is in the disaster planning cycle, this handbook will make the process clearer and less daunting. You’ll get tools, activities, easy-to-adapt templates, and hands-on guidance on such topics as

  • the six phases of disaster response;
  • 15 first-hand accounts of library disaster planning or responses, helping you identify the library services most needed during a disaster;
  • three essential factors that will shape the form of your disaster plan;
  • preparing for hurricanes, tornadoes, fires, floods, and earthquakes;
  • ideas for connecting with your community’s emergency response teams; 
  • federal government planning resources;
  • pointers on working with state and local governments;
  • a sample Memorandum of Understanding to outline mutual support for a speedier recovery;
  • recommended courses and training, many of which are free;
  • targeted advice for archives and special collections;
  • sample building inspection checklists; and
  • recommended games to help children and families prepare.
[more]

front cover of The Economics of Privacy
The Economics of Privacy
Edited by Avi Goldfarb and Catherine E. Tucker
University of Chicago Press, 2024

A foundational new collection examining the mechanics of privacy in the digital age.

The falling costs of collecting, storing, and processing data have allowed firms and governments to improve their products and services, but have also created databases with detailed individual-level data that raise privacy concerns. This volume summarizes the research on the economics of privacy and identifies open questions on the value of privacy, the roles of property rights and markets for privacy and data, the relationship between privacy and inequality, and the political economy of privacy regulation.

Several themes emerge across the chapters. One is that it may not be possible to solve privacy concerns by creating a market for the right to privacy, even if property rights are well-defined and transaction costs are low. Another is that it is difficult to measure and value the benefits of privacy, particularly when individuals have an intrinsic preference for privacy. Most previous attempts at valuation have focused only on quantifiable economic outcomes, such as innovation. Finally, defining privacy through an economic lens is challenging. The broader academic and legal literature includes many distinct definitions of privacy, and different definitions may be appropriate in different contexts. The chapters explore a variety of frameworks for examining these questions and provide a range of new perspectives on the role of economics research in understanding the benefits and costs of privacy and of data flows. As the digital economy continues to expand the scope of economic theory and research, The Economics of Privacy provides the most comprehensive survey to date of this field and its next steps.

[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

front cover of The Future of Digital Surveillance
The Future of Digital Surveillance
Why Digital Monitoring Will Never Lose Its Appeal in a World of Algorithm-Driven AI
Yong Jin Park
University of Michigan Press, 2021

Are humans hard-wired to make good decisions about managing their privacy in an increasingly public world? Or are we helpless victims of surveillance through our use of invasive digital media? Exploring the chasm between the tyranny of surveillance and the ideal of privacy, this book traces the origins of personal data collection in digital technologies including artificial intelligence (AI) embedded in social network sites, search engines, mobile apps, the web, and email. The Future of Digital Surveillance argues against a technologically deterministic view—digital technologies by nature do not cause surveillance. Instead, the shaping of surveillance technologies is embedded in a complex set of individual psychology, institutional behaviors, and policy principles.

[more]

front cover of Managing Data for Patron Privacy
Managing Data for Patron Privacy
Comprehensive Strategies for Libraries
Kristin Briney and Becky Yoose
American Library Association, 2022
Libraries are not exempt from the financial costs of data breaches or leaks, no matter the size. Whether from a library worker unwittingly sharing a patron’s address with a perpetrator of domestic violence to leaving sensitive patron data unprotected, patrons can also pay a hefty price when libraries fail to manage patron data securely and ethically. In this guide, readers will learn concrete action steps for putting the ethical management of data into practice, following two common public and academic library cumulative case studies. The authors explore such key topics as
  • succinct summaries of major U.S. laws and other regulations and standards governing patron data management;
  • information security practices to protect patrons and libraries from common threats;
  • how to navigate barriers in organizational culture when implementing data privacy measures;
  • sources for publicly available, customizable privacy training material for library workers;
  • the data life cycle from planning and collecting to disposal;
  • how to conduct a data inventory;
  • understanding the associated privacy risks of different types of library data;
  • why the current popular model of library assessment can become a huge privacy invasion;
  • addressing key topics while keeping your privacy policy clear and understandable to patrons; and
  • data privacy and security provisions to look for in vendor contracts.
[more]

front cover of Privacy at Risk
Privacy at Risk
The New Government Surveillance and the Fourth Amendment
Christopher Slobogin
University of Chicago Press, 2007
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes even our medical histories can be readily accessed by law enforcement officials. As Christopher Slobogin explains in Privacy at Risk, these intrusive acts of surveillance are subject to very little regulation.

Applying the Fourth Amendment’s prohibition on unreasonable searches and seizures, Slobogin argues that courts should prod legislatures into enacting more meaningful protection against government overreaching.  In setting forth a comprehensive framework meant to preserve rights guaranteed by the Constitution without compromising the government’s ability to investigate criminal acts, Slobogin offers a balanced regulatory regime that should intrigue everyone concerned about privacy rights in the digital age.
[more]

front cover of Privacy’s Blueprint
Privacy’s Blueprint
The Battle to Control the Design of New Technologies
Woodrow Hartzog
Harvard University Press, 2018

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them.

In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.

Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.

[more]

front cover of RFID Protocol Design, Optimization, and Security for the Internet of Things
RFID Protocol Design, Optimization, and Security for the Internet of Things
Alex X. Liu
The Institution of Engineering and Technology, 2018
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage.
[more]

front cover of Rights in the Digital Era
Rights in the Digital Era
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without prior permission from the publisher.
Society of American Archivists, 2015

About Rights in the Digital Era:

MODULE 4
Understanding Copyright Law
Heather Briston
Describes the main principles of copyright law and outlines strategies for addressing common issues, special topics, and digital projects.

MODULE 5
Balancing Access and Privacy in Manuscript Collections
Menzi L. Behrnd-Klodt
Introduces basic access and privacy laws, concepts, definitions, and professional ethical standards affecting manuscript materials and private and family papers.

MODULE 6
Balancing Access and Privacy in the Records of Organizations

Menzi L. Behrnd-Klodt
Introduces basic access and privacy laws, concepts, definitions, and professional ethical standards affecting the management of records created by organizations, businesses, agencies, and other entities.

MODULE 7
Managing Rights and Permissions

Aprille C. McKay
Provides practical guidance to help archivists transfer, clear, manage, and track rights information in analog and digital archives.

About Trends in Archives Practice:

This open-ended series by the Society of American Archivists features brief, authoritative treatments—written and edited by top-level professionals—that fill significant gaps in archival literature. The goal of this modular approach is to build agile, user-centered resources. Modules treat discrete topics relating to the practical management of archives and manuscript collections in the digital age. Select modules are clustered together by topic (as they are here) and are available in print or electronic format. Each module also is available separately in electronic format so that readers can mix and match modules that best satisfy their needs and interests. Stay on trend with Trends in Archives Practice!

[more]

logo for American Library Association
Technology Disaster Response and Recovery Planning
A LITA Guide
Mary Mallery
American Library Association, 2015

front cover of User-Centric Privacy and Security in Biometrics
User-Centric Privacy and Security in Biometrics
Claus Vielhauer
The Institution of Engineering and Technology, 2018
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
[more]


Send via email Share on Facebook Share on Twitter