Posts Tagged ‘privacy issues’

Privacy & Security in Today’s Library

Privacy & Security in Today’s Library by Amigos Library Services

The virtuality of privacy and security on the from Plamen Miltenoff

From: Jodie Borgerding [mailto:Borgerding@amigos.org]
Sent: Wednesday, July 05, 2017 3:07 PM
To: Miltenoff, Plamen <pmiltenoff@stcloudstate.edu>
Cc: Nicole Walsh <WALSH@AMIGOS.ORG>
Subject: Proposal Submission for Privacy & Security Conference

Hi Plamen,

Thank you for your recent presentation proposal for the online conference, Privacy & Security in Today’s Library, presented by Amigos Library Services. Your proposal, The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party,” has been accepted. I just wanted to confirm that you are still available to present on September 21, 2017 and if you have a time preference for your presentation (11 am, 12 pm, or 2 pm Central). If you are no longer able to participate, please let me know.

Nicole will be touch with you shortly with additional details and a speaker’s agreement.

Please let me know if you have any questions.

Thanks!
___________________

Jodie Borgerding Consulting & Education Services Manager Amigos Library Services 1190 Meramec Station Road, Suite 207 | Ballwin, MO  63021-6902 800-843-8482 x2897 | 972-340-2897(direct) http://www.amigos.org | borgerding@amigos.org

+++++++++++++++++

Bio

Dr. Plamen Miltenoff is an Information Specialist and Professor at St. Cloud State University. His education includes several graduate degrees in history and Library and Information Science and terminal degrees in education and psychology.

His professional interests encompass social media, multimedia, Web development and design, gaming and gamification, and learning environments (LEs).

Dr. Miltenoff organized and taught classes such as LIB 290 “Social Media in Global Context” (http://web.stcloudstate.edu/pmiltenoff/lib290/) and LIB 490/590 “Digital Storytelling” (http://web.stcloudstate.edu/pmiltenoff/lib490/) where issues of privacy and security are discussed.

Twitter handle @SCSUtechinstruc

Facebook page: https://www.facebook.com/InforMediaServices/

The virtuality of privacy and security on the modern campus:

The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party software” teaching and learning

Abstract/Summary of Your Proposed Session

The virtualization reality changes rapidly all aspects of learning and teaching: from equipment to methodology, just when faculty have finalized their syllabus, they have to start a new, if they want to keep abreast with content changes and upgrades and engagement of a very different student fabric – Millennials.

Mainframes are replaced by microcomputers, microcomputers by smart phones and tablets, hard drives by cloud storage and wearables by IoT. The pace of hardware, software and application upgrade is becoming unbearable for students and faculty. Content creation and methodology becomes useless by the speed of becoming obsolete. In such environment, faculty students and IT staff barely can devote time and energy to deal with the rapidly increasing vulnerability connected with privacy and security.

In an effort to streamline ever-becoming-scarce resources, campus IT “standardizes” campus use of applications. Those are the applications, which IT chooses to troubleshoot campus-wide. Those are the applications recommended to faculty and students to use.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal, attention on campuses is drown to the fact that cyberattacks shift now from mobile devices to IoT and campus often are struggling even with their capability to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party application might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

Abstract

The pace of changes in teaching and learning is becoming impossible to sustain: equipment evolves in accelerated pace, the methodology of teaching and learning cannot catch up with the equipment changes and atop, there are constant content updates. In an even-shrinking budget, faculty, students and IT staff barely can address the issues above, less time and energy left to address the increasing concerns about privacy and security.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal (https://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/), attention on campuses is drawn to the fact of cyberattacks shifting from mobile devices to IoT but campus still struggling to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party applications might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

https://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/

Anything else you would like to add

3 take-aways from this session:

  • Discuss and form an opinion about the education-pertinent issues of privacy and security from the broad campus perspective, versus the narrow library one
  • Discuss and form an opinion about the role of the library on campus in terms of the greater issues of privacy and security

Re-examine the thin red line of the balance between standardization and innovation; between the need for security and privacy protection a

++++++++++++++
presentation:
https://www.slideshare.net/aidemoreto/the-virtuality-of-privacy-and-security-on-the 

chat – slide 4, privacy. please take 2 min and share your definition of privacy on campus. Does it differ between faculty and students?  what are the main characteristics to determine privacy

chat – slide 5, security. please take 2 min and share your definition of security on campus regarding electronic activities. Who’s responsibility is security? IT issue [only]?

poles: slide 6, technology unsupported by campus IT, is it worth considering? 1. i am a great believer in my freedom of choice 2. I firmly follow rules and this applies to the use of computer tools and applications 3. Whatever…

chat –  slide 6, why third party applications? pros and cons. E.g. pros – familiarity with third party versus campus-required

pole, slide 6, appsmashing. App smashing is the ability to combine mobile apps in your teaching process. How do you feel about it? 1. The force is with us 2. Nonsense…

pole slide 7 third party apps and the comfort of faculty. How do you see the freedom of using third party apps? 1. All I want, thank you 2. I would rather follow the rules 3. Indifference is my middle name

pole slide 8 Technology standardization? 1. yes, 2. no, 3. indifferent

chat slide 9 if the two major issues colliding in this instance are: standardization versus third party and they have impact on privacy and security, how would you argue for the one or the other?

++++++++++++++++
notes from the conference

 

 

Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

http://journal.code4lib.org/articles/11413

Bill Walker: http://www.amigos.org/innovating_metadata

 

+++++++++++++++
more on security in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=security

more on privacy in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

not on your work computer

6 things you should never do on your work computer

Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM

http://www.businessinsider.com/things-you-should-never-do-on-your-work-computer-2017-3

cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.

  1. DON’T: Save personal passwords in your work device keychain.
  2. DON’T: Make off-color jokes on messaging software.
  3. DON’T: Access free public wi-fi while working on sensitive material.
  4. DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
  5. DON’T: Store personal data.
  6. DON’T: Work on your side hustle while at the office.

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims?s=surveillance

big data in ed

New Report Examines Use of Big Data in Ed

By Dian Schaffhauser  05/17/17

https://campustechnology.com/articles/2017/05/17/new-report-examines-use-of-big-data-in-ed.aspx

new report from the National Academy of Education “Big Data in Education,” summarizes the findings of a recent workshop held by the academy

three federal laws: Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA) and the Protection of Pupil Rights Amendment (PPRA).

over the last four years, 49 states and the District of Columbia have introduced 410 bills related to student data privacy, and 36 states have passed 85 new education data privacy laws. Also, since 2014, 19 states have passed laws that in some way address the work done by researchers.

researchers need to get better at communicating about their projects, especially with non-researchers.

One approach to follow in gaining trust “from parents, advocates and teachers” uses the acronym CUPS:

  • Collection: What data is collected by whom and from whom;
  • Use: How the data will be used and what the purpose of the research is;
  • Protection: What forms of data security protection are in place and how access will be limited; and
  • Sharing: How and with whom the results of the data work will be shared.

Second, researchers must pin down how to share data without making it vulnerable to theft.

Third, researchers should build partnerships of trust and “mutual interest” pertaining to their work with data. Those alliances may involve education technology developers, education agencies both local and state, and data privacy stakeholders.

Along with the summary report, the results of the workshop are being maintained on a page within the Academy’s website here.

+++++++++++++++++
more on big data in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=big+data

facebook and privacy

Facebook canceled a student’s internship after he highlighted a massive privacy issue

 http://www.businessinsider.com/facebook-aran-khanna-internship-rescinded-marauders-map-messenger-privacy-2015-8#ixzz3j5nwM8yw
not the first time Facebook has such issues; please read other IMS blog posts:

https://blog.stcloudstate.edu/ims/2014/07/03/research-and-ethics-if-facebook-can-tweak-our-emotions-and-make-us-vote-what-else-can-it-do/

https://blog.stcloudstate.edu/ims/2015/02/13/facebook-censorship/

1 2