Archive of ‘Digital rights management (DRM)’ category
Power, Privacy, and the Internet
- Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen:
- The Internet and the Future of the Press
- The Internet, Repression and Dissent
Merkel calls for separate EU internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
Digitization and Libraries
Thursday, September 10, 2015
2 PM Eastern | 1 PM Central
12 PM Mountain | 11 AM Pacific
Digitization is a rapidly growing area of librarianship. Whether you’re a community repository or you need to digitize old materials to save space, the ability to start a digitization project is becoming an essential skill for the modern librarian.
Join us for a new episode of American Libraries Live, Digitization and Libraries. Our expert panel will discuss digitization in both broad and specific terms, looking at current trends and long-term implications for the library community.
Our panel will include:
• Susanne Caro, Government Documents Librarian at University of Montana, author and frequent speaker on digitization and librarianship
• Alyce Scott, Professor, School of Library & Information Science San Jose State University
Tune in for this free, streaming video broadcast! You can pre-register here for this free event (pre-registration assures you a reminder before the event), or go to http://www.americanlibrarieslive.org on September 10 at 2:00 p.m. (Eastern) to view.
We are pleased to welcome the School of Information (iSchool) at San José State University as a sponsor for this episode. The iSchool prepares individuals for careers as information professionals. Graduates work in diverse areas of the information profession, such as user experience design, digital asset management, information architecture, electronic records management, information governance, digital preservation, and librarianship. Based in the heart of Silicon Valley, the iSchool is the best place to learn online.
The iSchool’s Master of Library and Information Science (MLIS) degree program was named Outstanding Online Program by the Online Learning Consortium. This prestigious national award recognizes the school’s commitment to delivering innovative, convenient, 100% online learning solutions for students across the globe. Find out more about the iSchool’s award-winning online educational programs at ischool.sjsu.edu.
New Documents and Reports Confirm AT&T and NSA’s Longstanding Surveillance Partnership
Please consider previous IMS blog entries on this topic:
Senate stalls on cybersecurity bill
How Students Should Use Pictures from the Web
The Truth About Teenagers, The Internet, And Privacy
danah boyd, a professor at Harvard University’s Berkman Center for the Internet and Society, argues that teenagers closely scrutinize what they share online because it is a way for them to negotiate their changing identities. In her book, It’s Complicated: The Social Lives of Networked Teens, she describes how teenagers carefully curate their feeds based on the audience they are trying to reach.
Adolescents have been migrating away from Facebook and Twitter over the last few years, showing preference for sites like Snapchat, Whisper, Kik, and Secret that provide more anonymity and privacy. Part of this transition can be explained by the fact that the older social media sites stopped being cool when parents joined them, but perhaps another reason could be that teenagers growing up in the post-Snowden era implicitly understand the value of anonymity. For teens, it’s not a matter of which platform to use, but rather which works best in a particular context.
WHAT ARE YOU REVEALING ONLINE? MUCH MORE THAN YOU THINK
Right now in the U.S. it’s essentially the case that when you post information online, you give up control of it.
Some companies may give you that right, but you don’t have a natural, legal right to control your personal data. So if a company decides they want to sell it or market it or release it or change your privacy settings, they can do that.
The point is, we really don’t know how this information will be used. For instance, say I’m a merchant — once I get information about you, I can use this information to try to extract more economic surplus from the transaction. I can price-discriminate you, so that I can get more out of the transaction than you will.
I’m interested in working in this area, not because disclosure is bad — human beings disclose all the time, it’s an innate need as much as privacy is — but because we really don’t know how this information will be used in the long run.
1 2 Next