Have a personal or library account? Click to login
Usability and privacy in academic libraries: regaining a foothold through identity and access management Cover

Usability and privacy in academic libraries: regaining a foothold through identity and access management

By: Peter Reid  
Open Access
|Nov 2019

References

  1. 1Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu, and Mario Caldeira, “Deciding between information security and usability: Developing value based objectives,” Computers in Human Behavior 61, Issue C (August, 2016), DOI: 10.1016/j.chb.2016.03.068 (accessed 22 October 2019).
  2. 2“Apple’s quiet AI acquisition,” AngelList Weekly, November 21, 2018, https://angel.co/newsletters/apple-s-quiet-ai-acquisition-112118 (accessed 22 October 2019); Daniel Greene and Katie Shilton, “Platform privacies: Governance, collaboration, and the different meanings of ‘privacy’ in iOS and Android development,” New Media & Society 20, no. 4 (April, 2018), DOI: https://doi.org/10.1177/1461444817702397 (accessed 22 October 2019).
  3. 3“Library Bill of Rights,” American Library Association, http://www.ala.org/advocacy/intfreedom/librarybill (accessed 22 October 2019); “IFLA Statement on Privacy in the Library Environment,” IFLA, https://www.ifla.org/publications/node/10056 (accessed 22 October 2019); “The Ethical Principles”, CILIP, https://www.cilip.org.uk/general/custom.asp?page=ethics (accessed 22 October 2019); Michael Zimmer, “Assessing the Treatment of Patron Privacy in Library 2.0 Literature,” Information Technology & Libraries 32, no. 2 (June, 2013), DOI: https://doi.org/10.6017/ital.v32i2.3420 (accessed 22 October 2019).
  4. 4“UK Federation Information Centre|Documents/AvailableServices Browse.”, UK Access Management Federation, https://www.ukfederation.org.uk/content/Documents/AvailableServices (Accessed 26 October, 2019).
  5. 5“Privacy and Security Whitepaper: Account Center Employee Database Integration (EDI) and Single Sign-On (SSO),” LinkedIn, December, 2016: 7, https://business.linkedin.com/content/dam/me/business/en-us/sales-solutions/resources/pdfs/privacy-and-security-whitepaper.pdf (accessed 22 October 2019).
  6. 6Roshan Sumbaly, Jay Kreps, and Sam Shah, “The Big Data Ecosystem at LinkedIn,” Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (June 2013), DOI: 10.1145/2463676.2463707 (accessed 22 October 2019).
  7. 7“Recommendations for use of Personal Data Version 4.1,” UK Access Management Federation for Education and Research, July 2018, https://www.ukfederation.org.uk/library/uploads/Documents/recommendations-for-use-of-personal-data.pdf (accessed 22 October 2019). It is the creation of a multi-service identifier that is cited in the recent and well-publicized complaint by the Irish Data Commission against Google for suspected infringement of GDPR – since a multi-service ID is a means by which Google can sell a user’s identity to firms which are competing to learn as much as they can about their online customers’ behaviour. EdupersonTargetedID is a pseudonymous identifier that is specifically designed to prevent this: Jane Wakefield, “Google’s ‘secret web tracking rages’ explained,” BBC News, September 5, 2019, https://www.bbc.co.uk/news/technology-49593830 (accessed 22 October 2019).
  8. 8Shiyali Ramamrita Ranganathan, “The five laws of library science,” (Madras: The Madras Library Association, 1931), DOI: 10.1145/2463676.2463707 (accessed 22 October 2019).
  9. 9Ken Chad and Helen Anderson, “The new role of the library in teaching and learning outcomes,” Higher Education Library Technology (HELibTech) briefing paper, no. 3 (June 2017), DOI: 10.13140/RG.2.2.14688.89606/1 (accessed 22 October 2019).
  10. 10“Privacy and Security Whitepaper,” 3.
  11. 11“Data protection by design and default,” Information Commissioner’s Office, https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-by-design-and-default/ (accessed 22 October 2019).
  12. 12“Data Protection Code of Conduct, Version 1.0,” GÉANT (June, 2013), http://www.geant.net/uri/dataprotection-code-of-conduct/v1 (accessed 11 September 2019).
  13. 13Speaking in 2013, when MOOCs were a popular venture, Lanier also observed that ‘at the moment, public institutions, particularly the universities, are racing to join into this digital system that will lead them to oblivion … you’ll have your Harvards and your Stanfords, who will survive as a brand, then you kill all the intermediate schools.’ “LIVE from the NYPL: Jaron Lanier,” New York Public Library (October, 2013), https://www.nypl.org/sites/default/files/livelanier_10.10transcript_0.doc (accessed 22 October 2019).
  14. 14Gina Pingitore, Vikram Rao, Kristin Cavallaro, and Kruttika Dwivedi, “To share or not to share: What consumers really think about sharing their Personal Information,” Deloitte Insights (September, 2017), https://www2.deloitte.com/us/en/insights/industry/retail-distribution/sharing-personal-information-consumer-privacy-concerns.html (accessed 22 October 2019).
  15. 15“Recommended Practices for Improved Access to Institutionally-Provided Information Resources: Results from the Resource Access in the 21st Century (RA21) Project,” National Information Standards Organization (2019), https://groups.niso.org/apps/group_public/download.php/21376/NISO_RP-27-2019_RA21_Identity_Discovery_and_Persistence-public_comment.pdf (accessed 22 October 2019).
DOI: https://doi.org/10.1629/uksg.487 | Journal eISSN: 2048-7754
Language: English
Submitted on: Sep 12, 2019
Accepted on: Oct 21, 2019
Published on: Nov 13, 2019
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2019 Peter Reid, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.