Blogs

wnylibrarian's picture

The Privacy Battle

In keeping with the privacy theme this week here is a link to a NPR interview with Mikko Hyppönen -- described as a "white hat" hacker. The NPR article identifies the moniker as one of the good hackers.

 

He makes a clear distinction on what this privacy battle is all about. He states,

This is not a question of privacy against security. It's a question of freedom against control.

wnylibrarian's picture

Privacy vs eBooks

This is a great blog post regarding privacy vs. eBooks. Specifically, libraries adhere to a privacy standard of users circulation:

The nature of the electronic book almost precludes this notion. Anything electronic it can be tracked -- by someone. If it can be tracked it can be analyzed, repackaged, and sold off to third parties. So then, what happens to the privacy of circulation records?

See blog post:

wnylibrarian's picture

Privacy Concerns in K-12 Sector

Everyone is concerned about privacy these days, and rightfuly so. Big data, analytics, and data mining are great tools manifesting great research capability for decision makers, but at what cost? How does it effect the K-12 industry as well?

A total of 14 companies have addressed this issue by at the very least acknowledging the importance of it. Indeed it maybe a drop in the ocean, but when such things are in their infancy its usually the small drops that create the bigger ripples.

See article for further details.

wnylibrarian's picture

SLMS in Elementary Libraries

A link to NYLA/SSL's official statement regarding school library media specialists at the elementary level:

(PDF) NYLA/SSL Position Statement Elementary School Librarians in Every School, 2014

wnylibrarian's picture

Shellshock Resources

Unfortunately I feel this will be happening more and more. It was late this past Spring many Internet sites were rocked with the Heartbleed vulnerability. Heartbleed was a serious vulnerability that effected sites using OpenSSL, how Internet information is transferred and encrypted, and how by reading the system memory that encrypted information could be hacked and read.

Pages

Subscribe to RSS - blogs