September 2, 2015 Dear Kilton Library Community, As Guardians Of
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library
ACRL Publications in Librarianship No. 72 Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library Editors Peter D. Fernandez and Kelly Tilton Association of College and Research Libraries A division of the American Library Association Chicago, Illinois 2018 The paper used in this publication meets the minimum requirements of Ameri- can National Standard for Information Sciences–Permanence of Paper for Print- ed Library Materials, ANSI Z39.48-1992. ∞ Cataloging-in-Publication data is on file with the Library of Congress. Copyright ©2018 by the Association of College and Research Libraries. All rights reserved except those which may be granted by Sections 107 and 108 of the Copyright Revision Act of 1976. Printed in the United States of America. 22 21 20 19 18 5 4 3 2 1 Contents Contents Introduction .......................................................................................................ix Peter Fernandez, Head, LRE Liaison Programs, University of Tennessee Libraries Kelly Tilton, Information Literacy Instruction Librarian, University of Tennessee Libraries Part I Contemplating Library Values Chapter 1. ..........................................................................................................1 The New Technocracy: Positioning Librarianship’s Core Values in Relationship to Technology Is a Much Taller Order Than We Think John Buschman, Dean of University Libraries, Seton Hall University Chapter 2. ........................................................................................................27 -
Faulty Math: the Economics of Legalizing the Grey Album
File: BambauerMerged2 Created on: 1/31/2008 4:34 PM Last Printed: 2/13/2008 3:38 PM FAULTY MATH: THE ECONOMICS OF LEGALIZING THE GREY ALBUM Derek E. Bambauer* ABSTRACT ................................................................................................. 346 I. INTRODUCTION ....................................................................................... 346 II. MISSED OPPORTUNITIES ..................................................................... 348 III. COPYRIGHT’S UNUSUAL ECONOMICS................................................. 354 IV. ECONOMIC THEORIES SUPPORTING THE DERIVATIVE WORKS RIGHT 357 A. Reducing Transaction Costs........................................................... 358 1. Theory: Copyright as Clearinghouse ....................................... 358 2. Analysis: Second-Best at Cutting Costs.................................... 359 B. Enabling Price Discrimination....................................................... 361 1. Theory: Broadening Access, Boosting Returns ........................ 361 2. Analysis: Movie Rentals and Other Weaknesses...................... 364 a. Access................................................................................. 364 b. Production.......................................................................... 367 c. Shortcomings...................................................................... 368 C. Exploiting Markets Efficiently........................................................ 368 1. Theory: Digging Dry Wells ..................................................... -
Uloga Knjižnice U Zaštiti Privatnosti Na Internetu I Borbi Protiv Masovnog Nadziranja
Uloga knjižnice u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Džapo, Paula Master's thesis / Diplomski rad 2016 Degree Grantor / Ustanova koja je dodijelila akademski / stručni stupanj: University of Zadar / Sveučilište u Zadru Permanent link / Trajna poveznica: https://urn.nsk.hr/urn:nbn:hr:162:257447 Rights / Prava: In copyright Download date / Datum preuzimanja: 2021-10-06 Repository / Repozitorij: University of Zadar Institutional Repository of evaluation works Sveučilište u Zadru Odjel za informacijske znanosti Diplomski sveučilišni studij Informacijske znanosti - knjižničarstvo Paula Džapo Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Diplomski rad Zadar, 2016. Sveučilište u Zadru Odjel za informacijske znanosti Diplomski sveučilišni studij Informacijske znanosti - knjižničarstvo Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Diplomski rad Student/ica: Mentor/ica: Paula Džapo doc. dr. sc. Martina Dragija Ivanović Zadar, 2016. Izjava o akademskoj čestitosti Ja, Paula Džapo, ovime izjavljujem da je moj diplomski rad pod naslovom Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja rezultat mojega vlastitog rada, da se temelji na mojim istraživanjima te da se oslanja na izvore i radove navedene u bilješkama i popisu literature. Ni jedan dio mojega rada nije napisan na nedopušten način, odnosno nije prepisan iz necitiranih radova i ne krši bilo čija autorska prava. Izjavljujem da ni jedan dio ovoga rada nije iskorišten u kojem drugom radu pri bilo kojoj drugoj visokoškolskoj, znanstvenoj, obrazovnoj ili inoj ustanovi. Sadržaj mojega rada u potpunosti odgovara sadržaju obranjenoga i nakon obrane uređenoga rada. Zadar, 30. rujan 2016. Sadržaj 1. Uvod ...............................................................................................................................6 2. -
Strategies for Unbridled Data Dissemination: an Emergency Operations Manual
Strategies for Unbridled Data Dissemination: An Emergency Operations Manual Nikita Mazurov PhD Thesis Centre for Cultural Studies, Goldsmiths, University of London 1 Declaration To the extent that this may make sense to the reader, I declare that the work presented in this thesis is my own. Nikita Mazurov 2 Acknowledgements The notion that the work in a thesis is ‘one’s own’ doesn’t seem quite right. This work has benefited from countless insights, critiques, commentary, feedback and all potential other manner of what is after all, work, by those who were subjected to either parts or the entirety of it during encounters both formal and informal. To say nothing of the fact that every citation is an acknowledgement of prior contributory work in its own right. I may have, however, mangled some or all of the fine input that I have received, for which I bear sole responsibility. Certain images were copied from other publications for illustrative purposes. They have been referenced when such is the case. Certain other images were provided by sources who will rename anonymous for reasons of safety. Assistance with technical infrastructure in establishing a server for part of the project was provided by another anonymous source; anonymous for the same reason as above. 3 Abstract This project is a study of free data dissemination and impediments to it. Drawing upon post-structuralism, Actor Network Theory, Participatory Action Research, and theories of the political stakes of the posthuman by way of Stirnerian egoism and illegalism, the project uses a number of theoretical, technical and legal texts to develop a hacker methodology that emphasizes close analysis and disassembly of existent systems of content control. -
The Private-Sector Ecosystem of User Data in the Digital
on current controversies in communications Maya has a track record of helping technologists Liz Woolery policy, online intermediary liability, privacy, and successfully navigate complex regulations to Senior Policy Analyst, copyright. Olivier has been on the local NPR achieve their design and product goals. Most Center for Democracy and Technology station and an invited speaker at universities recently, she was on the healthcare team at Liz Woolery is a senior policy analyst at the and conferences around the world. He is part the United States Digital Service, which aims to Center for Democracy and Technology, where of a team of legal scholars, research engineers, improve the way government delivers services to her work focuses on the intersection of free and social entrepreneurs to whom The National the American people through better technology expression and the digital world. Prior to CDT, Science Foundation in fall 2017 awarded a three- and user-centered design. Maya worked directly she was with New America’s Open Technology year one-million-dollar grant to prototype an with engineers, data scientists, designers, and Institute (OTI) as a senior policy analyst on the “edge-cloud” network that is to be owned and product managers on the launch of the All of Us secure internet team, where her work addressed operated as a “commons resource” for Harlem Research Program at the National Institutes of free speech, privacy, and transparency online. residents. Health. She also worked with the Centers for Previously she was a Google Policy Fellow at OTI, Medicare and Medicaid Services to improve At Fordham, Olivier teaches Legislation & interned with the Berkman Center for Internet data sharing with physicians participating in Regulation, Administrative Law, Information and Society’s Chilling Effects Clearinghouse the Quality Payment Program, and transition Law, and information law related courses. -
Verified, Tracked, and Visible: a History of The
VERIFIED, TRACKED, AND VISIBLE: A HISTORY OF THE CONFIGURATION OF THE INTERNET USER by CHRISTOPHER J. ST. LOUIS A THESIS Presen ed " #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n an! #e Grad'( e S$#""l "& #e Un)+ers) y "& Oreg"n )n -art)al &'%&)%%*en "& #e re.')remen s &"r #e !egree "& Master "& S$)en$e Sep ember 0123 THESIS APPROVAL PAGE S '!en : C#rist"-#er J. S . L"')s T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#)s #esis #as been ($$ep ed an! (--ro+ed )n -art)al &'%&)%%*en "& #e req')remen s &"r #e Master "& S$)en$e !egree )n #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n by: Peter A%)%'nas C#()rperson B)swaru- Sen Member Tara F)$kle Member an! Sara D. H"!,es In eri* V)$e Pr"+"st an! Dean "& #e Gra!'( e S$#""l Or),)nal (--r"+al s),n( 'res are "n &)%e 5) # #e Un)+ers) y "& Oreg"n Grad'( e S$#""l. Degree (5arded Sep ember 0123. ii 6 0123 C#r)s "-#er J. S . L"')s SO/E RIGHTS RESERVED T#)s 5"r4 )s %)$ense! 'n!er ( Cre( )+e C"**"ns Attribution-ShareAlike 4.0 International License # -s:77$re( )+e$"**"ns."r,7%)$enses7by8s(79.17 iii THESIS ABSTRACT Chr)st"-#er J. S . L"')s Master "& S$)en$e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n Sep ember 0123 T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#e &),'re "& #e 'ser )s "& en "+erlo"ked )n In ernet #)st"r)es, 5#)$# &re.'en ly &"$'s "n %arger reat*en s "& )n&rastru$ 're, ,"+ernan$e, "r *(:"r $"n r)b' )"ns "& spec)&)$ )n!)+)!'als. -
The Digital Divide in the Post-Snowden Era.Pdf
! " # $ %# $ "$ " ! " $ $ # $ "& # ! $# ' "$ " $ ( # )# ( * ! + " ! *$ , " " -!. / 0 1 22 !22"$2-!.3# # "# $ # + $ ! 4! 5 15.673 !6895 1 Introduction In late 2012/early 2013, Edward Snowden, a contractor working for the National Security Agency (NSA), approached two journalists with information about a programme of mass surveillance conducted by the US government (Carmon, 2013). The NSA’s security operations were designed to collect vast amounts of data regarding the internet use of everyone online. Furthermore, the revelations of surveillance operations suggested a relationship between the state and large corporations (MacAskill, 2013). His realisation of the extent of the surveillance of the American population (and beyond) prompted Snowden to approach Laura Poitras and Glenn Greenwald with information about the programmes being conducted (Maass, 2013). These revelations have forced us to confront the reality of the internet. Despite the technology's potential to broaden engagement in the democratic process, it has been increasingly utilised as a tool to manage and direct populations (Lyon, 2015). State and commercial surveillance has grown to such an extent, that its operation is comparable to that adopted by totalitarian states (Giroux, 2015). Rather than strengthening -
Annual Report 2012 Leadership and Core Tor Team
Annual Report 2012 Leadership and Core Tor Team Andrew Lewman Roger Dingledine Nick Mathewson Dr. Paul Syverson Also Jacob Appelbaum Karen Reilly Melissa Gilroy Moritz Bartl Erinn Clark Arturo Filastò Nathan Freitas Aaron Gibson Dr. Ian Goldberg Sathyanarayanan Gunasekaran Sebastian Hahn Dr. Rob Jansen Damian Johnson George Kadianakis Dr. Karsten Loesing Steven Murdoch Shava Nerad Linus Nordberg Peter Palfrader Runa Sandvik Wendy Seltzer Andrea Shepard Philipp Winter And more than 3,200 Tor relay volunteers and supporters From the Executive Director In 2002, we released the first version of Tor. Over the past 10 years, we have grown and evolved with the demands of the technology landscape, the needs of the world, and a firm commitment to freedom of expression for everyone. Today, with over 2.4 billion people online, our commitment and passion continue. At Tor, we work tirelessly to increase the performance of the Tor network and to develop cutting- edge technology solutions. Every day we enlist a growing number of volunteers to join our relay network. We actively engage worldwide supporters and funders to help continue our mission. We fearlessly step up and speak out as the leading experts in privacy, censorship circumvention, anonymity and related research. Tor’s success is in large part thanks to our funding partners, including the Knight Foundation, The Broadcasting Board of Governors, SRI International, The United States Department of State, Swedish International Development Agency and many generous individual donors. In addition, thanks to our research partners at the University of Waterloo (Canada), the University of Cambridge (United Kingdom), Georgia Institute of Technology and many others around the globe we are able to leverage research and academic advancements to pioneer ground breaking circumvention and privacy solutions. -
¿Qué Es TOR? ¿Qué Es TOR? Introducción
Proyecto TOR ¿Qué es TOR? ¿Qué es TOR? Introducción TOR (The Onion Routing): Una red de anonimato ¿Qué es TOR? No es una red P2P: aunque es una red entre particulares Es software: procede de investigación, pero no es una red dedicada Algo de historia: de proyecto militar a organización sin ánimo de lucro. 2013-12-04 • El Enrutamiento de cebolla es una red de túneles virtuales de comunicación superpuesta a Internet que garantiza el anonimato de sus usuarios y de los enrutadores que median en la comunicación y proporciona integridad y confidencialidad de los datos que se intercambian. • Usuarios y encaminadores tienen distintos roles y existen servidores de directorio. Los enrutadores son individuales o empresas que prestan su ancho de banda. También hay servicios (web, mensajería) llamados hidden services que se prestan anónimamente (no se TOR (The Onion Routing): Una red de anonimato conoce su ubicación, ni quién los gestiona, desde donde, etc.) • Anteriormente un complemento de Firefox (Tor Button) ahora es un navegador seguro (Tor Browser Bundle y Vidalia) en múltiples No es una red P2P: aunque es una red entre particulares idiomas y varios proyectos de software más relacionados. Otros programas: Tails (SO seguro), Orbot (Tor para Android), Stem Es software: procede de investigación, pero no es una red dedicada (biblioteca python para controlar Tor, muy fácil para jugar con Tor), TorBirdy (Tor para Thunderbird), etc. • Tor se inició como un proyecto de investigación de la Marina de EE.UU. llamado Onion Routing, alla por 1996, para la construcción de Algo de historia: de proyecto militar a organización sin ánimo de lucro. -
Abstract from Grant Proposal Submitted to IMLS by Prof. Howard Besser of NYU on June 8, 2017
Abstract from Grant Proposal Submitted to IMLS by Prof. Howard Besser of NYU on June 8, 2017 New York University (NYU), in partnership with the Library Freedom Project (LFP), a nonprofit organization fiscally sponsored by the Tor Project, Inc., seeks a two-year Laura Bush 21st Century Librarian project grant to facilitate the use of privacy tools in libraries and their communities through the development of a privacy-focused train-the-trainer program for librarians, which we will call the Library Freedom Institute (LFI). Building on their successful shorter programs, the project team will construct an extensive curriculum and use it to train 40 geographically dispersed Privacy Advocates, who can then serve as nodes of expertise in their regions by conducting workshops for community members and helping their own libraries become more privacy conscious. With almost weekly revelations of massive privacy attacks (on email providers, health care companies, governmental agencies, political campaigns, and other targets, including libraries), the public has developed a heightened awareness of the vulnerability of their private information. For marginalized people, the Internet is particularly hostile; Edward Snowden’s revelations about overbroad government surveillance, for example, showed that immigrants and Muslims are frequent targets. Data-driven advertising builds upon algorithmic bias to market exploitative products directly to consumers identified as economically disadvantaged. Elderly people lacking access to quality computer education are more likely to be the victims of fraud and identity theft. Recent headlines confirm the nature of the problem. Vice Media’s Motherboard recently proclaimed, “Digital Surveillance is Class Warfare,” citing a Data & Society Research Institute study that demonstrated greater reliance on smartphones for Internet browsing among poor families relative to wealthier ones—a troubling discovery, given that mobile phone usage is more vulnerable to surveillance than is browsing activity on the average laptop (Jordan Pearson, May 15, 2017). -
Skills for (Private) Life: a Review and Multi- Site Case Study of Digital Privacy Initiatives In
Skills for (private) life: A review and multi- site case study of digital privacy initiatives in UK public libraries Camille Regnault Department of Information Studies, University College London Abstract: Digital inclusion – a proposal to provide equal opportunities access to the benefits of the Internet – is a national initiative supported by 3000 public libraries in the UK. This article focuses on the activities of exemplary public library services in the UK, in order to report on the character of their digital privacy initiatives and in doing so, identify their rationales. The research explores their relevance to existing service strategies, the risks and barriers to implementation, and the potential for wider replication within the UK and produced a number of key findings: responses confirmed that each of the libraries had collaborated with an outside organisation to offer digital privacy initiatives, including ‘cryptoparties’; all of the respondents largely agreed that public libraries should engage with digital privacy issues as part of their commitment to library ethics and in order to support users make informed decisions. Keywords: Big data, cryptoparties, digital inclusion, encryption, intellectual privacy, mass surveillance, threat model. This is an Open Access article distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Journal of New Librarianship, 3 (2018) pp. 297-368 10.21173/newlibs/5/18 Introduction Background information Since at least the beginning of the 18th century, libraries in Britain have sought to lend agency to their citizenry and expand access to knowledge, as they shifted from closed parochial libraries (where books were often chained to desks) to lending libraries (Feather, 2008; Thomas, 1966). -
Privacy in Libraries (RE‐95‐17‐0076)
RE-95-17-0076-17 New York University New York University & Library Freedom Project: Privacy in Libraries (RE‐95‐17‐0076) Abstract New York University (NYU), in partnership with the Library Freedom Project (LFP), a nonprofit organization fiscally sponsored by the Tor Project, Inc., seeks a two-year Laura Bush 21st Century Librarian project grant to facilitate the use of privacy tools in libraries and their communities through the development of a privacy-focused train-the-trainer program for librarians, which we will call the Library Freedom Institute (LFI). Building on their successful shorter programs, the project team will construct an extensive curriculum and use it to train 40 geographically dispersed Privacy Advocates, who can then serve as nodes of expertise in their regions by conducting workshops for community members and helping their own libraries become more privacy conscious. With almost weekly revelations of massive privacy attacks (on email providers, health care companies, governmental agencies, political campaigns, and other targets, including libraries), the public has developed a heightened awareness of the vulnerability of their private information. For marginalized people, the Internet is particularly hostile; Edward Snowden’s revelations about overbroad government surveillance, for example, showed that immigrants and Muslims are frequent targets. Data-driven advertising builds upon algorithmic bias to market exploitative products directly to consumers identified as economically disadvantaged. Elderly people lacking