To Subscribe

Total Page:16

File Type:pdf, Size:1020Kb

To Subscribe Smart Libraries Newsletter American Library Association NON PROFIT 50 East Huron Street US POSTAGE Chicago, IL 60611-2795 USA PAID PERMIT 3020 A LA TechSource BIRMINGHAM, AL www.techsource.ala.org February 2008 Open Source ILS Gains Ground with Academic Libraries Smart Libraries Newsletter Smart Libraries Newsletter delivers hard data and innovative insights about the world of library technology, every month. Contributing Editor Marshall Breeding TO SUBSCRIBE 615-343-6094 [email protected] To reserve your subscription, contact the Customer Service Center at 800-545-2433, press 5 for assistance, or visit www.techsource.ala.org. Interim Editor Tom Peters The 2008 subscription price is just $85 US. 816-228-6406 [email protected] Production and design by Kimberly Saar Richardson, Administrative Assistant American Library Association Production Services. Judy Foley Smart Libraries Newsletter is published monthly by ALA TechSource, 800-545-2433, ext. 4272 a unit of the publishing division of the American Library Association. 312-280-4272 [email protected] Copyright American Library Association 2008. All rights reserved. Newsletter TM A LA TechSource www.techsource.ala.org Formerly Library Systems Newsletter™ 50 East Huron Street, Chicago, Illinois 60611-2795, USA Open Source ILS Gains Ground with Academic Libraries IN THIS ISSUE Interest in open source alternatives to the commercial offerings of integrated library system (ILS) vendors has been a dominant trend in the past year. Until Open Source ILS Gains Ground now, the open source ILS implementations have taken place primarily in pub- with Academic Libraries lic libraries with no large academic libraries in the United States or Canada mak- PAGE 1 ing the leap. That situation recently changed, with a consortium of U.S. academic Youniquely4U From Checkpoint libraries and a major Canadian academic library making official commitments to PAGE 3 implement open source library automation systems. Compendia of Knowledge: Google’s Grassy Knol PAGE 4 February 2008 XXVIII Volume Number 2 Where’s WALDO? American Schoolyard Fight: Westchester Academic Library Directors Organization (WALDO), a New York Intel and One Laptop Per Child Part Ways based consortium, has contracted with LibLime to implement Koha ZOOM for PAGE 6 17 member libraries—thirteen of the libraries are now sharing a common con- Spartan Kindles sorital system, one other operates a standalone system, and the remaining three PAGE 6 are Florida based libraries moving from yet another consortial system. WALDO’s associate and limited members, libraries of different types throughout New York, Connecticut, New Jersey, Massachusetts, Pennsylvania, New Hampshire, and Ver- mont, can also elect to use the contract negotiated with LibLime to gain access to the same pricing, discounts, terms, and conditions. Key to WALDO’s approach to the open source environment is a preliminary pilot implementation during the Summer of 2008 at St John’s University, Queens, New York, the largest member of the group. This pilot is seen by WALDO as a replacement for the traditional RFP approach to vendor selection. The pilot will implement a number of enhancements to the current Koha ZOOM release that ISSN 1541-8820 were identified in a scoping study performed jointly by LibLime and WALDO in the Spring of 2007. Successful completion of the pilot project will activate migra- tion for the remaining New York libraries in the Summer of 2009. The fourteen New York academic libraries that have signed contracts to implement Koha ZOOM through WALDO include libraries at the College of Mount Saint Vincent, the College of Westchester, Concordia College in Bronxville, NY, the Manhattan College Libraries, Marymount Manhattan College, Mercy Col- lege, Monroe College, New York Academy of Medicine, Nyack College and Alli- ance Theological Seminary, Sarah Lawrence College, Saint John’s University, Saint Receive Smart Libraries via e-mail Thomas Aquinas College, the Seminary of the Immaculate Conception, and Wag- ner College. Subscribers that would like an e-mailed ver- sion of the newsletter each month should for- ward one e-mail address and all of the mailing label information printed on page 8 of the Continued on next page newsletter to [email protected]. Type “e-mail my Smart Libraries” into the subject line. In addi- tion to your monthly printed newsletter, you will receive an electronic copy via e-mail (to one address per paid subscription) at no extra1 charge each month. A LA TechSource www.techsource.ala.org tem contract, it faced uncertainty An Evergreen Grows in The commitment regarding the state of the commercial library automation marketplace due Canada Laurentian University, located in Sud- of these academic to the spate of consolidations and pri- bury, Ontario, announced that it intends vate equity acquisitions. WALDO repre- libraries to to implement the Evergreen automation sentatives could not discern significant system, initially developed for the PINES implement open differences among the offerings of the consortium in Georgia. The press release remaining commercial vendors. Rather confirms the University’s commitment to source automation than initiate a procurement process contribute to the development of Ever- through an RFP, WALDO investigated systems warrants green and that it intends to migrate from the open source alternatives, eventually its current SirsiDynix Unicorn system to attention, because determining that Koha ZOOM with sup- Evergreen at an unspecified time in the port from LibLime is their preferred it appears to be the future. alternative. The commitment of these academic beginning of a trend. Koha has not been previously imple- libraries to implement open source auto- mented in large academic libraries. As mation systems warrants attention, Thirteen of the libraries have been a result, it lacks essential functionality because it appears to be the beginning of using their current system since 2005, for an academic library, such as course a trend. In the larger context, the com- reserves. The contract with LibLime implemented as a remotely hosted ser- panies offering proprietary systems con- includes custom development to provide vice by the vendor. Previously, the con- tinue to prosper and attract new library the new functionality designed to meet sortium libraries used PALS, a system customers. Polaris Library Systems, for WALDO’s specifications, which, consis- created and maintained by libraries in example, has recently been selected by tent with the open source model, will be Minnesota. In some ways, PALS can be both the Phoenix Public Library and the available to other libraries that use Koha considered a precursor to the current Dallas Public Library. While open source ZOOM. The WALDO libraries will share open source ILS movement in that it was ILS seems to be gaining momentum, the an implementation of Koha hosted by software developed by libraries outside the majority of libraries continue to use com- LibLime, following the same Software as ownership of a commercial company. mercially developed systems. The degree a Service model that they currently have As WALDO passed the mid-point to which open source gains ground in the in place with their vendor. of its current five-year commercial sys- overall ILS landscape depends very much on the success of these early adopters. —Marshall Breeding More Info. @: WALDO Website: http://www.waldolib.org/ LibLime Website: http://liblime.com/ Laurentian University Press Release: http://laurentian.ca/Laurentian/ Home/News/Evergreen+library +system+08jan08.htm 2 Smart Libraries Youniquely4U From Checkpoint The December 2007 issue of Smart Librar- The categories currently pro- of the software according to the size of ies Newsletter covered the new business grammed into the service include: fam- the library and the number of active reg- relationship between Checkpoint Sys- ily, young adult, small business, smart istered borrowers. tems and 3M, where 3M will assume money, personal technology, health care, Businesses pay advertising fees to marketing and support for Checkpoint’s home improvement, pet care, hobbies, fit- have their coupons distributed by the RFID and security products targeting ness and wellness, cultural offerings, local library through the Youniquely4U service. libraries. Checkpoint continues in the offerings, and fiction. When a patron ini- The library can receive a portion of the library arena by offering a new service tially registers on the Youniquely4U site, revenue stream generated from the adver- called Youniquely4U, designed to help the system activates categories based on tising, depending on the deal constructed libraries market their services and pro- the codes entered. The patron can also with the partner. The library also can mote targeted resources to their patrons. manually select or deselect categories. offer free promotions to local businesses. Youniquely4U is the flagship product of Once signed in to the Youniquely4U By year-end 2007, about 50 libraries had the Patron Services Division of Check- Web site, library patrons can select any subscribed to Youniquely4U. Subscribing point Systems, Inc. category from the menu. When invoked, libraries include the East Brunswick Pub- Checkpoint formed its Patron Ser- each of the top-level menus will display lic Library and the Wayne Public Library vices Division in 2006 under the leader- sub-menus of additional sub-categories. in New Jersey, Terrebonne Parish Library ship of Michael Jermyn, who joined the Advertisements
Recommended publications
  • Modern Competences on the International Labor Market
    Associate Professor Adam Jabło ński Head of Scientific Institute of Management WSB University in Pozna ń, Faculty in Chorzów, POLAND 6th International Week 3rd to 7th June 2019 in Viana do Castelo, Portugal ERASMUS+ training opportunities for students: a gateway to the International Labor Market Adam Jabło ński is an Associate Professor in WSB University in Poznan Faculty in Chorzow, e-mail: [email protected] . He is also President of the Board of a reputable management consulting company “OTTIMA plus” Ltd. of Katowice , and Vice-President of the “Southern Railway Cluster” Association of Katowice , which supports development in railway transport and the transfer of innovation, as well as cooperation with European railway clusters (as a member of the European Railway Clusters Initiative). He holds a postdoctoral degree in Economic Sciences , specializing in Management Science . Having worked as a management consultant since 1997, he has broadened his experience and expertise through co-operation with a number of leading companies in Poland and abroad. Adam Jabło ński is the author of a variety of studies and business analyses on business models, value management, risk management, the balanced scorecard and corporate social responsibility. He has also written and co-written several monographs and over 100 scientific articles in the field of management. Adam’s academic interests focus on the issues of modern and efficient business model design, including Sustainable Business Models and the principles of company value building strategy that includes the rules of Corporate Social Responsibility. Plan of Presentation: 1. Introduction to modern competences on the International Labor Market.
    [Show full text]
  • Artificial Intelligence, Big Data and Cloud Computing 144
    Digital Business and Electronic Digital Business Models StrategyCommerceProcess Instruments Strategy, Business Models and Technology Lecture Material Lecture Material Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 1 Table of Contents I Page Part I - Introduction 4 Chapter 1: Foundations of Digital Business 5 Chapter 2: Mobile Business 29 Chapter 3: Social Media Business 46 Chapter 4: Digital Government 68 Part II – Technology, Digital Markets and Digital Business Models 96 Chapter 5: Digital Business Technology and Regulation 97 Chapter 6: Internet of Things 127 Chapter 7: Artificial Intelligence, Big Data and Cloud Computing 144 Chapter 8: Digital Platforms, Sharing Economy and Crowd Strategies 170 Chapter 9: Digital Ecosystem, Disintermediation and Disruption 184 Chapter 10: Digital B2C Business Models 197 © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 2 Table of Contents II Page Chapter 11: Digital B2B Business Models 224 Part III – Digital Strategy, Digital Organization and E-commerce 239 Chapter 12: Digital Business Strategy 241 Chapter 13: Digital Transformation and Digital Organization 277 Chapter 14: Digital Marketing and Electronic Commerce 296 Chapter 15: Digital Procurement 342 Chapter 16: Digital Business Implementation 368 Part IV – Digital Case Studies 376 Chapter 17: Google/Alphabet Case Study 377 Chapter 18: Selected Digital Case Studies 392 Chapter 19: The Digital Future: A Brief Outlook 405 © Bernd W.
    [Show full text]
  • David Balto There Can Be Little Question That Internet Search Has
    Internet Search Competition: Where is the Beef? David Balto1 There can be little question that Internet search has revolutionized how we live, communicate, learn and engage in commerce. Internet search gives hundreds of millions of people access to a wealth of information heretofore unattainable. Barriers to information and communication have fallen as the Internet has become the great marketplace of ideas and commerce. Internet search must be organized as any information system. Search providers all have developed sophisticated algorithms to try to determine relevancy and order information in a timely fashion. Some firms have suggested that search is being misused as a competitive weapon. The target du jour is Google. Google‘s critics have crystallized allegations of anticompetitive conduct under the banner of ―Search Neutrality.‖2 While the allegations take many forms, they boil down to three complaints. First, it is alleged that Google has penalized certain types of websites in its search results rather than basing its results on some objective, universal concept of relevance (if there is such a thing). Second, Google‘s critics allege that Google unfairly favors its own content in its search results as part of its Universal Search. Lastly, Google‘s critics challenge Google‘s transparency with respect to its algorithm and ranking standards. The European Commission decided to give the Search Neutrality arguments more legs, as it announced on November 30, 2010 that it has opened a formal investigation of Google‘s business practices pertaining
    [Show full text]
  • Marketing Your Books Online Enhance Your Website, Easily and for Free
    Marketing Your Books Online Enhance your website, easily and for free Google Blogger What is it? A blog is a web journal that can be updated as often as you’d like. The most effective blog forms for presses tend to be publicity or news blogs, CEO or Publisher blogs, and author blogs. Where can I learn more? blogger.com (or do a Google search to find other free blogging tools) Google Calendar What is it? A public calendar that is easily added to your website and allows you to keep your readers abreast of readings and events. Where can I learn more? google.com/calendar Google Books for your site What is it? • Cobranded Search A search box for your homepage that searches the full text of all books you have in Google Books • Google Preview Individual book previews that can be embedded right into your website. Where can I learn more? Ask your Partner Manager for information on Cobranded Search and Google Preview. © Copyright 2009. Google is a trademark of Google Inc. All other company and product names may be trademarks of the respective companies with which they are associated. Marketing Your Books Online Drive readers to your website and books Google Books What is it? A powerful tool that displays books in response to regular Google queries. Your e-commerce site appears first among the “Buy this book” links, and because anyone with a website can embed book previews, your titles show up safely and securely all over the web. Where can I learn more? Ask your Partner Manager to fill you in on recent Google Books developments.
    [Show full text]
  • A Systematic Review of Food Insecurity Among US Students in Higher Education
    Journal of Hunger & Environmental Nutrition ISSN: 1932-0248 (Print) 1932-0256 (Online) Journal homepage: https://www.tandfonline.com/loi/when20 A systematic review of food insecurity among US students in higher education Aydin Nazmi, Suzanna Martinez, Ajani Byrd, Derrick Robinson, Stephanie Bianco, Jennifer Maguire, Rashida M. Crutchfield, Kelly Condron & Lorrene Ritchie To cite this article: Aydin Nazmi, Suzanna Martinez, Ajani Byrd, Derrick Robinson, Stephanie Bianco, Jennifer Maguire, Rashida M. Crutchfield, Kelly Condron & Lorrene Ritchie (2018): A systematic review of food insecurity among US students in higher education, Journal of Hunger & Environmental Nutrition, DOI: 10.1080/19320248.2018.1484316 To link to this article: https://doi.org/10.1080/19320248.2018.1484316 View supplementary material Published online: 22 Jun 2018. Submit your article to this journal Article views: 311 View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=when20 JOURNAL OF HUNGER & ENVIRONMENTAL NUTRITION https://doi.org/10.1080/19320248.2018.1484316 A systematic review of food insecurity among US students in higher education Aydin Nazmia, Suzanna Martinez b, Ajani Byrdc, Derrick Robinsond, Stephanie Biancoe, Jennifer Maguiref, Rashida M. Crutchfieldg, Kelly Condrona, and Lorrene Ritchieh aFood Science and Nutrition Department, California Polytechnic State University, San Luis Obispo, USA; bNutrition Policy Insitute, University of California, Oakland, USA; cExtended
    [Show full text]
  • Total Mesorectal Excision Technique—Past, Present, and Future
    134 Total Mesorectal Excision Technique—Past, Present, and Future Joep Knol, MD1 Deborah S. Keller, MS, MD2 1 Department of Abdominal Surgery, Jessa Hospital, Hasselt, Belgium Address for correspondence Joep Knol, MD, Department of 2 Division of Colorectal Surgery, NewYork-Presbyterian/Columbia Abdominal Surgery, Jessa Hospital, Hasselt, Belgium University Medical Center, New York, New York (e-mail: [email protected]). Clin Colon Rectal Surg 2020;33:134–143. Abstract While the treatment of rectal cancer is multimodal, above all, a proper oncological resection is critical. The surgical management of rectal cancer has substantially evolved over the past 100years, and continues to progress as we seek the best treatment. Rectal cancer was historically an unsurvivable disease, with poor understanding of the embryological planes, lymphatic drainage, and lack of standardized technique. Major improvements in recurrence, survival, and quality of life have resulted from advances in preoperative staging, pathologic assessment, the development and timing of multi- modal therapies, and surgical technique. The most significant contribution in advanc- ing rectal cancer care may be the standardization and widespread implementation of total mesorectal excision (TME). The TME, popularized by Professor Heald in the early Keywords 1980s as a sharp, meticulous dissection of the tumor and mesorectum with all ► rectal cancer associated lymph nodes through the avascular embryologic plane, has shown universal ► total mesorectal reproducible reductions in local recurrence and improvement in disease-free and excision (TME) overall survival. Widespread education and training of surgeons worldwide in the TME ► transanal total have significantly impact outcomes for rectal cancer surgery, and the procedure has mesorectal excision become the gold standard for curative resection of rectal cancer.
    [Show full text]
  • Children's Bonding with Popular Youtube Vloggers and Their
    Children’s bonding with popular YouTube vloggers and their attitudes toward brand and product endorsements in vlogs: an explorative study Frans Folkvord, Kirsten Elizabeth Bevelander, Esther Rozendaal and Roel Hermans Abstract Frans Folkvord is based at Purpose – The purpose of this study has three primary aims. The first is to examine the amount of time the Tilburg School of children spend per week on viewing vlogs. Second, the authors explored children’s awareness and Humanities, Tilburg understanding of the brand or product placement in vlogs. Finally, the authors explored children’s self- University, Tilburg, The perceived susceptibility to the potential persuasive effects of these vlogs. Netherlands, and Open Design/methodology/approach – Self-reported measurements were assessed among children (N = Evidence Research, 127, 10-13 years of age). Barcelona, Spain. Findings – Results indicate that the majority of children frequently view vlogs and that their degree of bonding with the vlogger predicted the time spend on viewing vlogs. Children recalled products and Kirsten Elizabeth brands that were shown in vlogs, which were mostly food and beverages and considered themselves Bevelander and Esther and others affected by endorsements in vlogs. Rozendaal are both based Research limitations/implications – Only cross-sectional data were collected; these data cannot be at the Behavioral Science used to analyze behavior over a period of time or draw causal inferences. Institute, Radboud Practical implications – Considering the popularity of vlogs among young people, it is important to University, Nijmegen, The acquire more insight into the frequency and amount of time children spend on viewing vlogs and Netherlands. Roel Hermans children’s processing of persuasive messages in vlogs.
    [Show full text]
  • This Week in the Ctre
    VOLUME 1, ISSUE 1 THIS WEEK IN THE CTRE NOVEMBER 13—19, 2011 CHICAGO STATE UNIVERSITY UPCOMING TRAINING GOOGLE NINJAS IN THE CTRE! 11/15 On November 3-4, Theodis cally how Google and its “32 Ways to Use Google MOODLE NOON LIB 144 Garth and Rochelle John- many products can help Apps in the Classroom,” GRADEBOOK & son of the CTRE traveled to students learn, instructors highlighting such pro- 7:00PM ONLINE the Glacier Canyon Lodge in teach, and everyone to grams as Moderator, Wisconsin Dells to attend navigate the sea of apps SketchUp, and Knol. 11/17 MOODLE 11:00 the Google Sum- Stigliz was LIB 144 BASICS joined by 3 of & mit Midwest con- 7:00PM ference. her Google ONLINE peers at the For two days MOODLE 11/19 conference, GRADEBOOK 1:00PM straight, attendees who all came ONLINE talked, debated, to demonstrate MOODLE 11/20 and learned about how such time BASICS 3:00PM all things Google, ONLINE -tested applica- from Google Docs tions as Gmail to Picasa to the and Google Docs are still newly unveiled Chrome- that are available. evolving to allow for bet- SHOULD book. ter user experiences and CSU GO Julia Stigliz of Google’s The focus of the conference greater productivity. WITH Apps for Education team, was on education, specifi- AMBROSE? for example, presented on (continued on back) Let us know! Click here to look at HD VIDEO STREAMING AT CSU Ambrose Video’s list of programs, then A new HD video streaming Digital video streaming ser- and Discovery Education is send your thoughts— service may be coming to vice.
    [Show full text]
  • Chris Palma on Google Book Search at the Text & Academic Authors
    Chris Palma on Google Book Search at the Text & Academic Authors Association Annual Meeting 2008 M: I have the pleasure of introducing an old friend. I met him last year, and when you meet people at these conferences, they’re old friends immediately. Chris Palma, who you can see so you don’t need me to tell you, is the strategic partner/development manager of Google Book Search, and I’m going to make all of my introductions today err on the side of brevity because I think the best way of showing respect to speakers is not to talk a lot about them but just to let them talk. But I am just going to take one moment for one very egocentric part of this introduction to say that I had never heard of Google Book Search last year and I was absolutely fascinated by the presentation, and I immediately took charge of my life and sent my books to Google and waited for them to do the old-fashioned kind of scanning, a page at a time, with their machines, I guess, to get it in, figuring it’s better to ask forgiveness than permission, so I didn’t want to ask my publisher to do it, because what if they said no? And then we discovered later that the publisher, well, of course was going to do this and did it redundantly and was told the author already did it. And the really wonderful part of the egocentric story is when I go on their website and I check things, first of all, I see the many, many people who are looking, but also, more importantly to me, they make my book look so much better than it really is because the selling point of my book is it’s more visual than anything in the competition and every single one of the sample pages that they have to show you about my book is one of the most visual moments from the book.
    [Show full text]
  • The Challenges of 'Friending' China
    THE CHALLENGES OF ‘FRIENDING’ CHINA: Social Media Attempts to Scale the Great Firewall Kimberly Ryan General University Honors Capstone The Kogod School of Business Business Administration, Marketing Specialization and Interdisciplinary in International Corporate Practices Richard Linowes and Jen Oetzel Spring 2011 April 25, 2011 TABLE OF CONTENTS I. Executive Summary ………………………………………………………………….4 II. An Introduction to Social Media……………………………………………………4 a. History of Social Networking III. Facebook ……………………………………………………………………………...6 a. History b. Product c. Operations d. Finances IV. The Internet in China ………………………………………………………………..9 a. Foreign Investment b. Internet Censorship V. Social Media in China ………………………………………………………………11 a. History of Facebook in China b. Major Chinese Social Networks VI. Threats to Facebook’s Successful Operations in China ………………………….13 a. Local Competition ………………………………………………………………13 i. Renren 1. History 2. Product 3. Finances 4. Censorship b. Social Media Revolutions ……………………………………………………....17 i. Facebook’s Role in Egypt c. Compliance and Risks of Intellectual Property ………………………………19 i. The Case of Google in China ii. Lessons from Google in China for Facebook VII. Strategy Recommendation for Facebook ………………………………………….24 a. Concerns for Facebook as a Censored or an Isolated Network b. Capitalize on Developing Mobile Industry c. The China Mobile Market VIII. Conclusion …………………………………………………………………………..29 2 | P a g e IX. References …………………………………………………………………………...30 X. Appendices …………………………………………………………………………..33 a. Appendix A: History of Facebook Product Timeline b. Appendix B: Facebook Statistics and Accomplishments c. Appendix C: Facebook Organizational Structure d. Appendix D: Facebook Estimated Revenues e. Appendix E: Facebook Revenue per Unique User f. Appendix F: Chinese Networking Site Duplication g. Appendix G: World Map of Facebook’s Global Presence h. Appendix H: Chinese Social Media Equivalents i.
    [Show full text]
  • Debate on Antitrust Scrutiny of Google
    FROM: ACSBLOG DEBATE ON ANTITRUST SCRUTINY OF GOOGLE Benjamin G. Edelman† vs. Joshua D. Wright* GOOGLE’S DOMINANCE – AND WHAT TO DO ABOUT IT Benjamin G. Edelman he Senate Antitrust Subcommittee recently held a hearing1 to investigate persistent allegations of Google abusing its market power. Witnesses Jeff Katz (CEO of Nextag) and TJeremy Stoppelman (CEO of Yelp) demonstrated Google giving its own services an advantage other sites cannot match. For example, when a user searches for products for possible purchase, Google presents the user with Google Product Search links front-and- center, a premium placement no other product search service can obtain. Furthermore, Google Product Search shows prices and im- ages, where competitors get just text links. Meanwhile, a user † Associate Professor of Business Administration, Harvard Business School. * Professor, George Mason University School of Law and Department of Economics. Orig- inals at www.acslaw.org/acsblog/all/edelman-wright-debate-on-antitrust-scrutiny-of-goo gle (Oct. 3-7, 2011; vis. July 5, 2012). Each of the four main posts (they are presented here in chronological order) begins as follows: Editor’s Note: This is the first [or second or third or final] post in an ACSblog debate on antitrust scrutiny of Google between Harvard Business School Professor Benjamin G. Edel- man and George Mason University School of Law Professor Joshua D. Wright. This online debate follows a recent U.S. Senate hearing [www.acslaw.org/acsblog/senate-antitrus t-hearing-to-examine-google-practices] on whether Google’s business practices “serve consumers” or “threaten competition.” Comments on a post are reproduced after the end of that post.
    [Show full text]
  • Show Me Your Cookie and I Will Tell You Who You Are
    Show Me Your Cookie And I Will Tell You Who You Are Vincent Toubiana Vincent Verdot Alcatel-Lucent Bell Labs — Application Domain Route de Villejust, 91620 Nozay, France [lastname.firstname]@alcatel-lucent.com ABSTRACT i.e. unprotected. Furthermore, this cookie is sent when- With the success of Web applications, most of our data is ever the user accesses to a service hosted on google.com, now stored on various third-party servers where they are pro- increasing attack opportunities. In this paper we show how cessed to deliver personalized services. Naturally we must the sid cookie could be misused by an attacker, providing be authenticated to access this personal information, but ungranted access to Google Search personalized results and the use of personalized services only restricted by identifi- history. cation could indirectly and silently leak sensitive data. We We study an information leakage attack that exploits analyzed Google Web Search access mechanisms and found the current Google's access policy regarding personalized that the current policy applied to session cookies could be services (i.e. unauthenticated access). More specifically, used to retrieve users' personal data. We describe an at- we hijack a sid cookie to circumvent Google protection and tack scheme leveraging the search personalization (based on access a user's personal data who | possibly forced by the the same sid cookie) to retrieve a part of the victim's click attacker | transmitted her cookie in clear text. We empha- history and even some of her contacts. We implemented a size the risk of using unauthenticated personalized services proof of concept of this attack on Firefox and Chrome Web over a shared network with the following contributions.
    [Show full text]