SlideShare a Scribd company logo
1 of 22
Privacy and the library patron: an
ongoing ethical challenge
David McMenemy
Computer and Information Sciences
University of Strathclyde
(@d_mcmenemy)
Slides available on: https://www.slideshare.net/dmcmenemy
Overview
 Why privacy is our problem
Scoping the ethical space
Tensions inherent in our societal responsibilities
 Emerging murky waters
 Challenging our practice
Gorman’s Enduring Values of
Librarianship
1. Stewardship
2. Service
3. Intellectual Freedom
4. Equity of Access
5. Privacy
6. Literacy and Learning
7. Rationalism
8. Democracy Gorman, Michael (2015) Our Enduring Values: Revisited.
ALA Publishing
Privacy & the information profession
 Crucial elements of privacy are in our professional
space
 Informational privacy: information about citizens, how
it is shared, how it should be protected, what rights
citizens have.
 Privacy and access: what rights should citizens have
when accessing knowledge, and what limits should be
placed on such access
Surveillance – a modern trial?
 Balancing national security versus the right of privacy
is an ongoing challenge
 As a profession we must be mindful of the “chilling
effect” of laws, actions or activities, from both state
and non-state actors, that can modify the actions of
others
 Governments can chill the rights of citizens through
sloppy legislation, but professionals can also do so
through sloppy practice and procedure
 Columbia Law Review. 1969. “The Chilling Effect in Constitutional Law.” Columbia Law
Review 69 (5): 808-842. http://www.jstor.org/stable/1121147.
Corporate surveillance
 Cambridge Analytica/Facebook controversy is likely to
raise stakes for all professions engaging in data analytics
and other non-standard uses of data
 Are we ready, and prepared, to defend our potential
invasions of patron privacy?
 Are we sure users understand what we do with data?
https://imgur.com/gallery/uZ8pp
Privacy and library and information
services
Privacy and LIS
 Our commitment to patron privacy is potentially
challenged by some of our own activities, e.g. :
 Use of 3rd parties in service delivery:
are we open about who, why, and what they will do
with user data?
 Learner analytics:
are we in effect spying on our users’ activities?
 We should be mindful of the differences between
informed consent (essential under GDPR), and the
engineering of consent
Service development vs rights?
 The following DP statement was sent to
members of a UK public library service
What are the issues?
 Not agreeing to the new statement meant membership
would have to be revoked
 Public libraries are a legal right
 Blanket 3rd party exemptions
 Why should the public have to trust we will not use 3rd
parties they would not approve of?
 Such changes to practice play on our trusted, societal,
role, and arguably corrupt it
An extreme example?
 Oral Roberts University’s “Whole Person Education” allows
students to have Fitbit devices recording their physical
activity and loaded into the university’s learning
management system
 Jones, Kyle M. L. and Salo, Dorothea (2018), Learning Analytics and the Academic Library: Professional
Ethics Commitments at a Crossroads, College & Research Libraries, 79 (3) pp.303-323. Available at
: https://crl.acrl.org/index.php/crl/article/view/16603
The reality…
 Our patrons rely on us to protect their interests
Their interests should never be conflated solely
with our service innovation and/or improving our
efficiency, or our bottom line
 CA/Facebook controversy highlights our ethical
responsibility to be mindful of privacy rights in
practice and the need to advocate for them
One approach…
Nissenbaum, Helen. (2010) Privacy in Context: Technology, Policy, and the
Integrity of Social Life. Stanford University Press.
The real dilemma?
 “…what bothers people, what we see as dangerous,
threatening, disturbing, and annoying, what makes us
indignant, resistant, unsettled, and outraged in our
experience of contemporary systems and practices of
information gathering, aggregation, analysis, and
dissemination is not that they diminish our control and
pierce our secrecy, but that they transgress context-
relative informational norms.” (p.186)
Framework of contextual integrity
 Contexts:
 structured social settings characterized by canonical activities,
roles, relationships, power structures, norms (or rules), and
internal values (goals, ends, purposes)
 Informational norms:
 “breaches of context-relative informational norms” is the
key component in breaching privacy (p.140).
 Actors:
 senders of information, recipients of information, and
information subjects
Framework of contextual integrity
 Attributes
e.g. who is data for? who should have access to
borrowing histories? Who should access a student’s
grades in a school or university?
 Transmission principles
“a constraint on the flow (distribution, dissemination,
transmission) of information from party to party in a
context” (p.145)
 Crucially, novel systems and practices can sometimes
challenge traditional norms enough to justify changing
them
Nissenbaum case study: CASSIE
 Computer Access Software Solution
 Managed access to PCs in libraries
 Also allowed viewing of patron browsing
 Using the FCI, CASSIE presented a significant prima
facie violation of contextual integrity
 The tension: “between patrons’ freedom and autonomy,
on the one hand, and institutional efficiency, on the
other” (p.183).
CASSIE: the questions to ask?
 1. Public library purpose
Q> Does the ability to watch what patrons are
browsing impact on purpose?
A > Yes, if purpose is to provide access to knowledge,
the “chilling effect” of being aware of surveillance may
restrict what patrons do
 2. Types of data held
Previously libraries would store borrowing records, but
not what patrons had looked for
FCI and moving patron data to
cloud
 1. Library purpose
Is purpose challenged if patrons are aware 3rd
parties (unknown) have access to their data
 2. Citizens’ rights
Should a legal right be as arbitrary as to be able to
be removed based on an organisational efficiency
decision?
A legal right transforms into a citizen placing blind
faith in service that 3rd parties they deal with will not
abuse their data?
FCI and learner analytics
 1. Purpose
Educational role could justify learner analytics if it
enhances outcomes of students?
But, could knowledge of potential surveillance cause
“chilling effect” on students?
 2. Attributes
Should my lecturers be able to know how often I visit
library? How long I spend there?
Even anonymization of such data poses challenges
P is privacy….and purpose..
 Tools like Nissenbaum’s Framework, help us consider
challenges to privacy more fully
 We may not like the answers, but that only means the
question had to be asked
 The purpose of our services, their mission, should be the key
driver in all decisions
 CA/Facebook may change rules of game as public more
aware of what is being done with their data
 Informed consent, not engineered consent!
Thank you!
Reminder, slides available on:
https://www.slideshare.net/dmcmenemy

More Related Content

What's hot

Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Silvia Puglisi
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksHarshitha Reddy
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social InfluencesCori Faklaris
 
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...UKC Library and IT
 
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...UKC Library and IT
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3lroddesign
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookKristine Simpson
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 

What's hot (19)

Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Exploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social NetworksExploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social Networks
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...
InfoFest Kent 2017: Information literacy frameworks in Higher Education, Dr C...
 
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online...
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff Braybrook
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
computer ethics
computer ethicscomputer ethics
computer ethics
 

Similar to Privacy and the library patron: an ongoing ethical challenge

Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Information Professions Professionals
Information Professions ProfessionalsInformation Professions Professionals
Information Professions ProfessionalsMerra Mae Ramos
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...University of South Africa (Unisa)
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commonsprofessormadison
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...dmcmenemy
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 
Understanding personal privacy in the age of big online data
Understanding  personal privacy  in the age of big online dataUnderstanding  personal privacy  in the age of big online data
Understanding personal privacy in the age of big online dataMathieu d'Aquin
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 SMerrileeDelvalle969
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsTore Hoel
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 

Similar to Privacy and the library patron: an ongoing ethical challenge (20)

Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Information Professions Professionals
Information Professions ProfessionalsInformation Professions Professionals
Information Professions Professionals
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 
Understanding personal privacy in the age of big online data
Understanding  personal privacy  in the age of big online dataUnderstanding  personal privacy  in the age of big online data
Understanding personal privacy in the age of big online data
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
9th
9th9th
9th
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 S
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Ethics & Privacy for Learning Analytics
Ethics & Privacy for Learning AnalyticsEthics & Privacy for Learning Analytics
Ethics & Privacy for Learning Analytics
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 

Privacy and the library patron: an ongoing ethical challenge

  • 1. Privacy and the library patron: an ongoing ethical challenge David McMenemy Computer and Information Sciences University of Strathclyde (@d_mcmenemy) Slides available on: https://www.slideshare.net/dmcmenemy
  • 2. Overview  Why privacy is our problem Scoping the ethical space Tensions inherent in our societal responsibilities  Emerging murky waters  Challenging our practice
  • 3. Gorman’s Enduring Values of Librarianship 1. Stewardship 2. Service 3. Intellectual Freedom 4. Equity of Access 5. Privacy 6. Literacy and Learning 7. Rationalism 8. Democracy Gorman, Michael (2015) Our Enduring Values: Revisited. ALA Publishing
  • 4. Privacy & the information profession  Crucial elements of privacy are in our professional space  Informational privacy: information about citizens, how it is shared, how it should be protected, what rights citizens have.  Privacy and access: what rights should citizens have when accessing knowledge, and what limits should be placed on such access
  • 5. Surveillance – a modern trial?  Balancing national security versus the right of privacy is an ongoing challenge  As a profession we must be mindful of the “chilling effect” of laws, actions or activities, from both state and non-state actors, that can modify the actions of others  Governments can chill the rights of citizens through sloppy legislation, but professionals can also do so through sloppy practice and procedure  Columbia Law Review. 1969. “The Chilling Effect in Constitutional Law.” Columbia Law Review 69 (5): 808-842. http://www.jstor.org/stable/1121147.
  • 6. Corporate surveillance  Cambridge Analytica/Facebook controversy is likely to raise stakes for all professions engaging in data analytics and other non-standard uses of data  Are we ready, and prepared, to defend our potential invasions of patron privacy?  Are we sure users understand what we do with data? https://imgur.com/gallery/uZ8pp
  • 7. Privacy and library and information services
  • 8. Privacy and LIS  Our commitment to patron privacy is potentially challenged by some of our own activities, e.g. :  Use of 3rd parties in service delivery: are we open about who, why, and what they will do with user data?  Learner analytics: are we in effect spying on our users’ activities?  We should be mindful of the differences between informed consent (essential under GDPR), and the engineering of consent
  • 9. Service development vs rights?  The following DP statement was sent to members of a UK public library service
  • 10. What are the issues?  Not agreeing to the new statement meant membership would have to be revoked  Public libraries are a legal right  Blanket 3rd party exemptions  Why should the public have to trust we will not use 3rd parties they would not approve of?  Such changes to practice play on our trusted, societal, role, and arguably corrupt it
  • 11. An extreme example?  Oral Roberts University’s “Whole Person Education” allows students to have Fitbit devices recording their physical activity and loaded into the university’s learning management system  Jones, Kyle M. L. and Salo, Dorothea (2018), Learning Analytics and the Academic Library: Professional Ethics Commitments at a Crossroads, College & Research Libraries, 79 (3) pp.303-323. Available at : https://crl.acrl.org/index.php/crl/article/view/16603
  • 12. The reality…  Our patrons rely on us to protect their interests Their interests should never be conflated solely with our service innovation and/or improving our efficiency, or our bottom line  CA/Facebook controversy highlights our ethical responsibility to be mindful of privacy rights in practice and the need to advocate for them
  • 13. One approach… Nissenbaum, Helen. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
  • 14. The real dilemma?  “…what bothers people, what we see as dangerous, threatening, disturbing, and annoying, what makes us indignant, resistant, unsettled, and outraged in our experience of contemporary systems and practices of information gathering, aggregation, analysis, and dissemination is not that they diminish our control and pierce our secrecy, but that they transgress context- relative informational norms.” (p.186)
  • 15. Framework of contextual integrity  Contexts:  structured social settings characterized by canonical activities, roles, relationships, power structures, norms (or rules), and internal values (goals, ends, purposes)  Informational norms:  “breaches of context-relative informational norms” is the key component in breaching privacy (p.140).  Actors:  senders of information, recipients of information, and information subjects
  • 16. Framework of contextual integrity  Attributes e.g. who is data for? who should have access to borrowing histories? Who should access a student’s grades in a school or university?  Transmission principles “a constraint on the flow (distribution, dissemination, transmission) of information from party to party in a context” (p.145)  Crucially, novel systems and practices can sometimes challenge traditional norms enough to justify changing them
  • 17. Nissenbaum case study: CASSIE  Computer Access Software Solution  Managed access to PCs in libraries  Also allowed viewing of patron browsing  Using the FCI, CASSIE presented a significant prima facie violation of contextual integrity  The tension: “between patrons’ freedom and autonomy, on the one hand, and institutional efficiency, on the other” (p.183).
  • 18. CASSIE: the questions to ask?  1. Public library purpose Q> Does the ability to watch what patrons are browsing impact on purpose? A > Yes, if purpose is to provide access to knowledge, the “chilling effect” of being aware of surveillance may restrict what patrons do  2. Types of data held Previously libraries would store borrowing records, but not what patrons had looked for
  • 19. FCI and moving patron data to cloud  1. Library purpose Is purpose challenged if patrons are aware 3rd parties (unknown) have access to their data  2. Citizens’ rights Should a legal right be as arbitrary as to be able to be removed based on an organisational efficiency decision? A legal right transforms into a citizen placing blind faith in service that 3rd parties they deal with will not abuse their data?
  • 20. FCI and learner analytics  1. Purpose Educational role could justify learner analytics if it enhances outcomes of students? But, could knowledge of potential surveillance cause “chilling effect” on students?  2. Attributes Should my lecturers be able to know how often I visit library? How long I spend there? Even anonymization of such data poses challenges
  • 21. P is privacy….and purpose..  Tools like Nissenbaum’s Framework, help us consider challenges to privacy more fully  We may not like the answers, but that only means the question had to be asked  The purpose of our services, their mission, should be the key driver in all decisions  CA/Facebook may change rules of game as public more aware of what is being done with their data  Informed consent, not engineered consent!
  • 22. Thank you! Reminder, slides available on: https://www.slideshare.net/dmcmenemy