Monday, March 26, 2018

For the visual learners out there!




Brantley, Peter, Marshall Breeding, Eric Hellman, and Gary Price. 2015. “CNI: Swords, Dragons, and Spells: Libraries and User Privacy.” YouTube video, 44:23. January 23, 2015. https://www.youtube.com/watch?v=KQeK0rCQpmo



-----------------------------------------------------------------------------

This video is a presentation from the Coalition for Networked Information Fall 2014 Membership Meeting, held in Washington, D. C. This recorded session is specifically about user privacy in libraries, and what the major issues are in that area. Adobe Editions’ recording of user data is referenced as a revelation for many people. Social media, and the Library 2.0 customization that is impending, is a major concern when it comes to privacy and intellectual freedom. This presentation covers privacy and electronic security in libraries overall, and is an excellent primer in the topic. Eric Hellman focuses on social media and their potentially insidious intentions, and how advertisements connect our browser history to our social media and beyond.

The ethical implications of these problems is not as central to the presentation as the technology involved, but it is there. Intellectual freedom and the privacy-protecting mission of libraries is addressed, and with some amount of ruefulness and concern. The presenters don’t just question the intentions of social media companies and other internet entities, they name them as infiltrators of our lives. 

This recording falls more into the “internet safety + privacy + intellectual freedom” flavor of this blog, and while it does reference social media, it goes far beyond it as well. Web savviness goes further than digital citizenship and netiquette, and this video reveals the types of complex problems that libraries are facing as Library 2.0 becomes a reality. The presenters offer some guidance, but mostly this is a call to awareness, as many users and library professionals may not be aware of just how easy it is to expose your data and compromise privacy.



No comments:

Post a Comment