SlideShare une entreprise Scribd logo
1  sur  47
Privacy and Education in the
Internet Age
Cliff Landis
Honors Freshman Seminar
Fall 2013
Cliff gets a phone call…
FERPA to the rescue!

http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html
You only have the rights that you know
you have and that you know how to
use and enforce.
Who is this
guy?
• Web Services
Librarian @ Georgia
State University
• Author, A Social
Networking Primer
for Librarians (2010)
• Researcher on the
intersection of
human culture and
technology
THE SLIDING SCALE:
PRIVACY VS CONVENIENCE
PRIVACY
What do we mean by privacy?

http://thosecrazyliberals.com/wp-content/uploads/2013/06/fourthamendment.jpg
Mr. Otis
regrets…
general
warrants

http://en.wikipedia.org/wiki/File:James_Otis.jpg
Supreme Court
Justice Louis
Brandeis

“the right
to be let
alone”
Harvard Law Review
Dec. 15, 1890, on
"The Right to Privacy."
http://en.wikipedia.org/wiki/File:Brandeisl.jpg
USA PATRIOT Act
• Uniting (and) Strengthening America (by) Providing
Appropriate Tools Required (to) Intercept (and) Obstruct
Terrorism Act of 2001.
• Includes:
–
–
–
–
–
–
–

Title I: Enhancing domestic security against terrorism
Title II: Surveillance procedures
Title III: Anti-money-laundering to prevent terrorism
Title IV: Border security
Title V: Removing obstacles to investigating terrorism
Title VI: Victims and families of victims of terrorism
Title VII: Increased information sharing for critical infrastructure
protection
– Title VIII: Terrorism criminal law
– Title IX: Improved Intelligence
– Title X: Miscellaneous
USA PATRIOT Act
• Criticisms Include:
– authorization of indefinite detentions of immigrants;
– the permission given law enforcement officers to search a home or
business without the owner’s or the occupant’s consent or
knowledge;
– the expanded use of National Security Letters, which allows the
Federal Bureau of Investigation (FBI) to search telephone, e-mail,
and financial records without a court order; and
– the expanded access of law enforcement agencies to business
records, including library and financial records
• On May 26, 2011, President Barack Obama signed the PATRIOT Sunsets
Extension Act of 2011, a four-year extension of three key provisions in the
USA PATRIOT Act: roving wiretaps, searches of business records (the
"library records provision"), and conducting surveillance of "lone
wolves"—individuals suspected of terrorist-related activities not linked to
terrorist groups
BIG DATA
The Stacks
• “In 2012 it made less and less sense to talk
about “the Internet,” “the PC business,”
“telephones,” “Silicon Valley,” or “the media,”
and much more sense to just study Google,
Apple, Facebook, Amazon and Microsoft.
These big five American vertically organized
silos are re-making the world in their image.”
-- Bruce Sterling
http://images.smh.com.au/2010/05/14/1450513/zuckerberg420-420x0.jpg
http://i.huffpost.com/gen/161782/FACEBOOK-PRIVACY.jpg
http://allfacebook.com/infographic-the-history-of-facebooks-privacy-changes_b116292
http://allfacebook.com/infographic-the-history-of-facebooks-privacy-changes_b116292
Another story…

http://casketglass.com/
http://i.i.cbsi.com/cnwk.1d/i/tim/2012/07/19/Harris_III_privacy_charts__final_7.17.12_Slide_1_Grocery,_Amazon,_more_trusted_than_FB_610x452.jpg
How many of you own an e-book that
you purchased from Amazon.com?
BIG EDUCATION
Learning Analytics

http://public.tableausoftware.com/static/images/Te/TestScoresOverTime/School-LevelEvaluation/1_rss.png
Who enforces
privacy?
WASHINGTON - February 1,
2010 -- The U.S. Education
Department has fired the top
federal official charged with
protecting student privacy, in
what the dismissed official
says was a conflict with the
agency's political leaders over
their zeal to encourage the
collection of data about
students' academic
performance.
http://www.insidehighered.com/news/2010/02/01/ferpa
Risky cloud computing
• Unsuitable Privacy Policies: "Cloud providers may deliberately
or inadvertently force schools to accept policies or terms of
service that authorize user profiling and online behavioral
advertising."
• Poor Consent Policies: "Some cloud privacy policies...stipulate
that individual data subjects (students) are also bound by
these policies, even when these subjects have not had the
opportunity to grant or withhold their consent."
• Commercial Data Mining: "It may be difficult for the cloud
provider to turn off [ad-supported user profiling features and
tracking algorithms] even when ads are not being served."
• Shady Contracts: "Some cloud providers leave the door open
to future imposition of online advertising as a condition for
allowing schools to continue receiving cloud services for free."
http://blogs.edweek.org/edweek/DigitalEducation/2013/09/cloud_computing_jeopardizes_st.html
All it takes is one person

http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/23/1372015020195/Edward-Snowden-008.jpg
SURVEILLANCE
Surveillance
monitoring of the
behavior, activities, or
other changing
information, usually of
people for the
purpose of
influencing, managing,
directing, or
protecting them
Lyon, David. 2007. Surveillance Studies:
An Overview. Cambridge: Polity Press.

http://crapaganda.com/wp-content/uploads/2012/11/surveillance_big.gif
http://www.youtube.com/watch?v=QGxNyaXfJsA
Robbins v. Lower Merion School
District

http://media.nbcphiladelphia.com/images/722*542/Webcamgate-photo.jpg
Sousveillance

http://en.wikipedia.org/wiki/File:SurveillanceSousveillanceLifeGloggingMannSensecamMemoto.jpg
THE INTERNET
Privacy concerns are growing
• The study reported that privacy concerns among Americans
are on the rise, with 50 per cent of internet users saying they
are worried about the information available about them
online, up from 33 per cent in 2009.
• Meanwhile, 86 per cent of people surveyed have tried at least
one technique to hide their activity online or avoid being
tracked, such as clearing cookies or their browser history or
using encryption.
• While trying to avoid snooping - at least in some
circumstances - is now commonplace, people cite varying
reasons for doing so. About one-third said they had tried to
conceal their activity from hackers or criminals, while 28 per
cent have tried to block advertisers. Others said they wanted
to keep information private from family members or spouses,
employers or the government.
http://www.theaustralian.com.au/higher-education/us-study-exposes-internet-privacy-fears/story-e6frgcjx-1226712002951
http://xkcd.com/1269/
Anonymity Online

https://drupal.org/files/project-images/proxy.png
http://upload.wikimedia.org/wikipedia/commons/thumb/1/15/Tor-logo-2011-flat.svg/306px-Tor-logo-2011-flat.svg.png
http://peterblogs.de/wp-content/uploads/2013/05/VPN-Lock.png
THE SLIDING SCALE:
PRIVACY VS CONVENIENCE
http://1.bp.blogspot.com/-Z9ZRKB-gihM/TXv0-_EsIGI/AAAAAAAAAPI/yRfPpubDBWE/s1600/convenience_vs_privacy_tension.jpg
CONTROLLING YOUR PRIVACY
Chose what you show the world
http://www.flickr.com/photos/95572727@N00/216941152
Multiple accounts
http://www.iatsmartdial.com/wp-content/uploads/2012/10/Clones.jpg
Know your audience

http://www.flickr.com/photos/71214885@N00/2093047797
If you tell it to one other person, it is
no longer private
http://www.flickr.com/photos/20722444@N00/224674200
Manage your privacy settings

http://www.flickr.com/photos/47691521@N07/4638981545
Watch out for changes to the TOS
http://www.tosback.org/timeline.php
http://tosdr.org/
Stalk yourself
For the truly paranoid…

http://www.magnet.fsu.edu/education/tutorials/tools/images/faradaycage.gif

Contenu connexe

Tendances

Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningJudy O'Connell
 
What's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly PublishingWhat's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly PublishingTeeTee
 
Beyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence OnlineBeyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence OnlineBonnie Stewart
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship ConversationsDarren Kuropatwa
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.Stephen Collins
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Useschalman
 
Networking education: Identities & Presence
Networking education: Identities & PresenceNetworking education: Identities & Presence
Networking education: Identities & PresenceBonnie Stewart
 
Impact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future LegislationImpact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future Legislationlbehrns
 
Going to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesGoing to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesBrian Gray
 
10 most successful college entrepreneurs
10 most successful college entrepreneurs10 most successful college entrepreneurs
10 most successful college entrepreneursQwaliti.com
 
Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front LinesChristopher Whitaker
 
Web 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeyWeb 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeymeenu pandey
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networkingtmdomish
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line PrivacyRecrue
 
Text generation
Text generationText generation
Text generationnmason1
 
Internet life skills wb
Internet life skills wbInternet life skills wb
Internet life skills wbJoAnn MIller
 

Tendances (20)

Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learning
 
What's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly PublishingWhat's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly Publishing
 
Beyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence OnlineBeyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence Online
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 
SOPA
SOPASOPA
SOPA
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
 
Rahm 2.0
Rahm 2.0Rahm 2.0
Rahm 2.0
 
Networking education: Identities & Presence
Networking education: Identities & PresenceNetworking education: Identities & Presence
Networking education: Identities & Presence
 
Impact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future LegislationImpact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future Legislation
 
Going to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesGoing to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library Services
 
10 most successful college entrepreneurs
10 most successful college entrepreneurs10 most successful college entrepreneurs
10 most successful college entrepreneurs
 
Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front Lines
 
Web2.0 Primer
Web2.0 PrimerWeb2.0 Primer
Web2.0 Primer
 
Web 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeyWeb 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandey
 
Peerto Peer File Sharing
Peerto Peer File SharingPeerto Peer File Sharing
Peerto Peer File Sharing
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networking
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Text generation
Text generationText generation
Text generation
 
Internet life skills wb
Internet life skills wbInternet life skills wb
Internet life skills wb
 

En vedette

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertisingmonchai sopitka
 
Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)LawScienceTech
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 

En vedette (12)

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Information Security
Information SecurityInformation Security
Information Security
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
E-Business & E-Commerce Basics
E-Business & E-Commerce BasicsE-Business & E-Commerce Basics
E-Business & E-Commerce Basics
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 

Similaire à Privacy and education in the internet age

The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloudTomppa Järvinen
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)Rob Jewitt
 
A Social Web, A Social World
A Social Web, A Social WorldA Social Web, A Social World
A Social Web, A Social WorldDavid Smith
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data" Tom Moritz
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionChris Marsden
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Social media background
Social media backgroundSocial media background
Social media backgroundMo Krochmal
 

Similaire à Privacy and education in the internet age (20)

The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
A Social Web, A Social World
A Social Web, A Social WorldA Social Web, A Social World
A Social Web, A Social World
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data"
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social media background
Social media backgroundSocial media background
Social media background
 

Plus de Cliff Landis

Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...Cliff Landis
 
Linked Open Data for Archives
Linked Open Data for ArchivesLinked Open Data for Archives
Linked Open Data for ArchivesCliff Landis
 
Get a (Library-ish) Job!
Get a (Library-ish) Job!Get a (Library-ish) Job!
Get a (Library-ish) Job!Cliff Landis
 
An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)Cliff Landis
 
Digitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case StudyDigitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case StudyCliff Landis
 
Archival Technologies 2014
Archival Technologies 2014Archival Technologies 2014
Archival Technologies 2014Cliff Landis
 
Archival Technologies
Archival TechnologiesArchival Technologies
Archival TechnologiesCliff Landis
 
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community BuildingGet the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community BuildingCliff Landis
 
Social Networking for Communities & Businesses
Social Networking for Communities & BusinessesSocial Networking for Communities & Businesses
Social Networking for Communities & BusinessesCliff Landis
 
Beyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library ServiceBeyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library ServiceCliff Landis
 
Tomorrow’s Technology, Tomorrow's User, Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User,  Tomorrow's LibraryTomorrow’s Technology, Tomorrow's User,  Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User, Tomorrow's LibraryCliff Landis
 
Starting a Text Reference Service
Starting a Text Reference ServiceStarting a Text Reference Service
Starting a Text Reference ServiceCliff Landis
 
Say What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for LibrariansSay What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for LibrariansCliff Landis
 
Library 2.0 and Beyond
Library 2.0 and BeyondLibrary 2.0 and Beyond
Library 2.0 and BeyondCliff Landis
 
Online Job Resources for Valdosta
Online Job Resources for ValdostaOnline Job Resources for Valdosta
Online Job Resources for ValdostaCliff Landis
 
Lets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the FutureLets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the FutureCliff Landis
 
Solving The Interest Problem
Solving The Interest ProblemSolving The Interest Problem
Solving The Interest ProblemCliff Landis
 

Plus de Cliff Landis (20)

Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...
 
Linked Open Data for Archives
Linked Open Data for ArchivesLinked Open Data for Archives
Linked Open Data for Archives
 
Get a (Library-ish) Job!
Get a (Library-ish) Job!Get a (Library-ish) Job!
Get a (Library-ish) Job!
 
An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)
 
Digitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case StudyDigitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case Study
 
Conflict!
Conflict!Conflict!
Conflict!
 
Archival Technologies 2014
Archival Technologies 2014Archival Technologies 2014
Archival Technologies 2014
 
Archival Technologies
Archival TechnologiesArchival Technologies
Archival Technologies
 
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community BuildingGet the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building
 
Social Networking for Communities & Businesses
Social Networking for Communities & BusinessesSocial Networking for Communities & Businesses
Social Networking for Communities & Businesses
 
Beyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library ServiceBeyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library Service
 
Tomorrow’s Technology, Tomorrow's User, Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User,  Tomorrow's LibraryTomorrow’s Technology, Tomorrow's User,  Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User, Tomorrow's Library
 
Starting a Text Reference Service
Starting a Text Reference ServiceStarting a Text Reference Service
Starting a Text Reference Service
 
Say What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for LibrariansSay What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for Librarians
 
Library 2.0 and Beyond
Library 2.0 and BeyondLibrary 2.0 and Beyond
Library 2.0 and Beyond
 
Online Job Resources for Valdosta
Online Job Resources for ValdostaOnline Job Resources for Valdosta
Online Job Resources for Valdosta
 
Tech
TechTech
Tech
 
Learn
LearnLearn
Learn
 
Lets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the FutureLets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the Future
 
Solving The Interest Problem
Solving The Interest ProblemSolving The Interest Problem
Solving The Interest Problem
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Dernier (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Privacy and education in the internet age

Notes de l'éditeur

  1. I had a parent call and complain moments after I gave a student an F for plagiarizing the conclusion on her paper.
  2. Educational institutions can’t give away a student’s educational information without appropriate authorization.
  3. A recurring theme throughout today’s talk
  4. until 1750, in fact, the only type of warrant defined in the handbooks for justices of the peace was the general warrant.[3] During what scholar William Cuddihy called the "colonial epidemic of general searches", the authorities possessed almost unlimited power to search for anything at any time, with very little oversight.[5]In mid-January 1761, a group of over 50 merchants represented by James Otis petitioned the court to have hearings on the issue. During the five-hour hearing on February 23, 1761, Otis vehemently denounced British colonial policies, including their sanction of general warrants and writs of assistance.[8] Future US President John Adams, who was present in the courtroom when Otis spoke, viewed these events as "the spark in which originated the American Revolution.”[9] However, the court ruled against Otis.[10]Seeing the danger general warrants presented, the Virginia Declaration of Rights (1776) explicitly forbade the use of general warrants. This prohibition became a precedent for the Fourth Amendment:[12]That general warrants, whereby any officer or messenger may be commanded to search suspected places without evidence of a fact committed, or to seize any person or persons not named, or whose offense is not particularly described and supported by evidence, are grievous and oppressive and ought not to be granted.[13]Because the Bill of Rights did not initially apply to the states, and federal criminal investigations were less common in the first century of the nation's history, there is little significant case law for the Fourth Amendment before the 20th century. The amendment was held to apply to the states in Mapp v. Ohio (1961).
  5. Brandeis defined modern notions of the individual right to privacy in a path-breaking article he published with his partner, Warren, in the Harvard Law Review of Dec. 15, 1890, on "The Right to Privacy." Stimulated by anger at offensive publicity concerning the social activities of Warren's family, it adumbrated a new legal concept that has had lasting influence. Building on diverse analogies in the law of defamation, of literary property, and of eavesdropping, Brandeis argued that the central, if unarticulated, interest protected in these fields was an interest in personal integrity, "the right to be let alone," that ought to be secured against invasion except for some compelling reason of public welfare. Brandeis saw emotions as a positive expression of human nature, and so desired privacy protection for them as protection against repression of the human spirit.[11]
  6. They want your identity, your allegiance, and all of your data.
  7. E. C. Steiner, (formerly King Unicorn), who was locked out of all his accounts by one of the Stacks.
  8. None of you. Because you don’t own the books that you purchase from Amazon.com, you lease them. They can be revoked at any point in time.Amazon has performed price-fixing on its products, selling products for higher prices to people who it recognizes will pay a higher price, based on their purchasing habitshttp://www.cnn.com/2005/LAW/06/24/ramasastry.website.prices/
  9. The ARGUS array is made up of several cameras and other types of imaging systems. The output of the imaging system is used to create extremely large, 1.8GP high-resolution mosaic images and video.
  10. The lawsuit was filed after 15-year-old high school sophomore Blake Robbins was disciplined at school, for his behavior in his home.[5][13] The school's "evidence" that triggered his discipline was a photograph that the school had secretly taken of him in his bedroom, via the webcam in his school-issued laptop. Without telling its students, the schools remotely accessed their school-issued laptops to secretly snap pictures of students in their own homes, their chat logs, and records of the websites they visited. The school then transmitted the snapshots to servers at the school, where school authorities reviewed them and shared the snapshots with others.[14] In one widely published photo, the school had photographed Robbins in his bed.[15] The Federal Bureau of Investigation (FBI), U.S. Attorney's Office, and Montgomery County District Attorney all initiated criminal investigations of the matter, which they combined and then closed because they did not find evidence "that would establish beyond a reasonable doubt that anyone involved had criminal intent". In addition, a U.S. Senate Judiciary subcommittee held hearings on the issues raised by the schools' secret surveillance, and Senator Arlen Specter introduced draft legislation in the Senate to protect against it in the future. Parents, media, and academics criticized the schools, and the matter was cited as a cautionary example of how modern technology can be used to infringe on personal privacy.[16]
  11. Multiple accounts can be used for different purposes to help organize your life.It can also be used to add noise to the system.