References
- 1Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu, and Mario Caldeira, “Deciding between information security and usability: Developing value based objectives,” Computers in Human Behavior 61, Issue C (August, 2016), DOI: 10.1016/j.chb.2016.03.068 (accessed 22 October 2019).
- 2“Apple’s quiet AI acquisition,” AngelList Weekly, November 21, 2018,
https://angel.co/newsletters/apple-s-quiet-ai-acquisition-112118 (accessed 22 October 2019); Daniel Greene and Katie Shilton, “Platform privacies: Governance, collaboration, and the different meanings of ‘privacy’ in iOS and Android development,” New Media & Society 20, no. 4 (April, 2018), DOI:https://doi.org/10.1177/1461444817702397 (accessed 22 October 2019). - 3
“Library Bill of Rights,” American Library Association,http://www.ala.org/advocacy/intfreedom/librarybill (accessed 22 October 2019); “IFLA Statement on Privacy in the Library Environment,” IFLA,https://www.ifla.org/publications/node/10056 (accessed 22 October 2019); “The Ethical Principles”, CILIP,https://www.cilip.org.uk/general/custom.asp?page=ethics (accessed 22 October 2019); Michael Zimmer, “Assessing the Treatment of Patron Privacy in Library 2.0 Literature,” Information Technology & Libraries 32, no. 2 (June, 2013), DOI:https://doi.org/10.6017/ital.v32i2.3420 (accessed 22 October 2019). - 4
“UK Federation Information Centre|Documents/AvailableServices Browse.” , UK Access Management Federation,https://www.ukfederation.org.uk/content/Documents/AvailableServices (Accessed 26 October, 2019). - 5“Privacy and Security Whitepaper: Account Center Employee Database Integration (EDI) and Single Sign-On (SSO),” LinkedIn, December, 2016: 7,
https://business.linkedin.com/content/dam/me/business/en-us/sales-solutions/resources/pdfs/privacy-and-security-whitepaper.pdf (accessed 22 October 2019). - 6Roshan Sumbaly, Jay Kreps, and Sam Shah, “The Big Data Ecosystem at LinkedIn,” Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (June 2013), DOI: 10.1145/2463676.2463707 (accessed 22 October 2019).
- 7
“Recommendations for use of Personal Data Version 4.1,” UK Access Management Federation for Education and Research, July 2018,https://www.ukfederation.org.uk/library/uploads/Documents/recommendations-for-use-of-personal-data.pdf (accessed 22 October 2019). It is the creation of a multi-service identifier that is cited in the recent and well-publicized complaint by the Irish Data Commission against Google for suspected infringement of GDPR – since a multi-service ID is a means by which Google can sell a user’s identity to firms which are competing to learn as much as they can about their online customers’ behaviour. EdupersonTargetedID is a pseudonymous identifier that is specifically designed to prevent this: Jane Wakefield, “Google’s ‘secret web tracking rages’ explained,” BBC News, September 5, 2019,https://www.bbc.co.uk/news/technology-49593830 (accessed 22 October 2019). - 8Shiyali Ramamrita Ranganathan,
“The five laws of library science,” (Madras: The Madras Library Association, 1931), DOI: 10.1145/2463676.2463707 (accessed 22 October 2019). - 9Ken Chad and Helen Anderson, “The new role of the library in teaching and learning outcomes,” Higher Education Library Technology (HELibTech) briefing paper, no. 3 (June 2017), DOI: 10.13140/RG.2.2.14688.89606/1 (accessed 22 October 2019).
- 10“Privacy and Security Whitepaper,” 3.
- 11
“Data protection by design and default,” Information Commissioner’s Office,https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-by-design-and-default/ (accessed 22 October 2019). - 12“Data Protection Code of Conduct, Version 1.0,” GÉANT (June, 2013),
http://www.geant.net/uri/dataprotection-code-of-conduct/v1 (accessed 11 September 2019). - 13Speaking in 2013, when MOOCs were a popular venture, Lanier also observed that ‘at the moment, public institutions, particularly the universities, are racing to join into this digital system that will lead them to oblivion … you’ll have your Harvards and your Stanfords, who will survive as a brand, then you kill all the intermediate schools.’
“LIVE from the NYPL: Jaron Lanier,” New York Public Library (October, 2013),https://www.nypl.org/sites/default/files/livelanier_10.10transcript_0.doc (accessed 22 October 2019). - 14Gina Pingitore, Vikram Rao, Kristin Cavallaro, and Kruttika Dwivedi, “To share or not to share: What consumers really think about sharing their Personal Information,” Deloitte Insights (September, 2017),
https://www2.deloitte.com/us/en/insights/industry/retail-distribution/sharing-personal-information-consumer-privacy-concerns.html (accessed 22 October 2019). - 15
“Recommended Practices for Improved Access to Institutionally-Provided Information Resources: Results from the Resource Access in the 21st Century (RA21) Project,” National Information Standards Organization (2019),https://groups.niso.org/apps/group_public/download.php/21376/NISO_RP-27-2019_RA21_Identity_Discovery_and_Persistence-public_comment.pdf (accessed 22 October 2019).
