I’m sitting in a coffee shop on the outskirts of LAX waiting for Tiff to get back into town and I realized something while talking with the barista and listening to Iron and Wine… I am really jealous of men who can grow beards. Damn you genetics. Damn you straight to hell.
I like the idea (there is a “but” coming). It’s like lightening round librarianship. Info-improv. You dive into the fire hose and see if you can remain standing. BUzzzzzzzzzzzzzzzz.
What if a reference librarian was assigned to a college course, to be on hand to suggest books, online links, or other resources based on class discussion? A media-studies course at Baylor University tried the idea last semester, with an “embedded librarian” following the class discussion via Twitter.
At the start of each class session, the professor, Gardner Campbell, asked the 11 students to open their laptops, fire up Twitter, and say hello to their librarian, who was following the discussion from her office. During the hourlong class, the librarian, Ellen Hampton Filgo, would do what she refers to as “library jazz,” looking at the questions and comments posed on Twitter by the students, responding with suggestions of links or books, and anticipating what else might be helpful that students might not have known to ask.
“I could see the sort of germination of an idea, and what they wanted to talk about,” she said, noting that it let her in on the process of students’ research far sooner than usual. “That was cool for me,” she added. “When I work with students at the reference desk, usually they’re already at a certain midpoint of their research.”
BUT! how frazzled would a person be after doing that a few times a week? And what, really, is the benefit to the students who, rather than thinking deeply about the subject at hand, are instead scrambling to catch all the articles and citations being thrown at them by the librarian? I’m an information professional, not a circus monkey.
The March 2011 issue of Wired Magazine has an article by Andrew Keen, the author of The Cult of the Amateur, in which Keen discusses the implications of sharing enormous amounts of personal information online. What these implications may be, he is not exactly clear about. There is a strange mix of paranoia and nostalgia underlying his words, motivations that don’t usually offer specific examples.
He oversimplifies the nature of sharing (“we will all know what everyone is doing all the time” and be able to inspect everyone “every instant”), he blames the tools and the tool makers rather than the users (“[the] increasingly ubiquitous social network” that “invades” our private spaces), and he assumes that everyone online is motivated primarily by their need “to broadcast [their] uniqueness to the world” (Ok, I’ll give him that one).
On the other hand, Keen brings up a number of legitimate concerns. As businesses and advertisers learn how to monetize social networks, all the information that we normally consider private (or, at least, wouldn’t normally give to a person holding a clipboard in a mall) is ripe for harvesting.
And I would add, personally, that there is something to the idea that the increasingly public nature of our daily lives changes us, sometimes in undesirable ways. (For a more than dramatic example, check out the documentary on dot com boomer, Josh Harris, We Live In Public). We come to expect more of ourselves, perhaps too much as we continually project ourselves into cyberspace and await the feedback of the masses.
But I digress. Give Keen’s article a read and let me know what you think. There is much here to disagree with, but what is there in this article that we can agree on?
I took the advice of a friend and decided not to change the channel.
On the commute to work this morning (1 hr to go 16 miles), I listened to the latest New York Times Book Review podcast on my iPod. Instead of immediately flipping over to NPR’s All Songs Considered, I swiped the off switch and sat a few moments in silence with the 4 million other drivers on the road.
I started daydreaming something I’ve been daydreaming for a few days now. The excitement swells, and then the fear, and then despair washes it all away. (Typical daydream story arc, right?). The dream is the idea of completely disconnecting from the internet, or at least most of it. Stop blogging (which no one reads or enjoys), stop tweeting (which is more distracting than helpful), stop posting to photos (which I rarely do), stop trying to populate digital spaces in which I’m the only person in the room.
I develop these elaborate plans. Gantt charts that outline a plan of retreat, backing out of one space after the other, leaving only a witty envoi behind (like “[lacunae]” or “connection lost”). First Twitter, then all the minor spaces, then Facebook, and finally the blog (I would chronicle this, of course). Within a few weeks, the only way to reach me would be via email or phone. I would spend time developing relationships (something I’ve yet to really do in 3 years of living in LA), being with my family, and exploring the city. My days wouldn’t be full of news streams and status updates, but books and music and seascapes (gods, did I mention I live by the ocean? I can hear it from my doorstep. But do you know it’s been months since I’ve seen it?).
It all seems like a brilliant idea and then fear sets in. I’m still not a full fledged librarian: how will I show potential employers that I’m interacting with the profession and appropriately tech-savvy? Luddites are very much not in vogue right now in the library world. How will I stay up to date with the news and tech that is allegedly so essential for modern info professionals? Who am I if I am not (1) successful, (2) full of ambition, (3) at the top of my class, (4) “engaged.”
Of course, these future employers seem to be the only ones that care about this.
Then the despair. There’s no way I could quit it. I would always feel compelled to get back in the game. No one would take me seriously. There it is: this unnatural (perhaps illusory) feeling of being trapped by a spectre. Gods I hate that. So let’s just ignore it and write another blog post.
And here we are again. Happy Friday to all of us who live in public. =)
This morning, the USC librarians had an all-hands-on-deck meeting to discuss the results of a recent survey and our new strategic plan. Toward the end, one of our Library IT staff (who, let me tell you, is the coolest guy) said he had seen the Libraries mentioned in the platform statements of the Student Government candidates. Moreover, he had noticed that the students wanted more 2-credit courses and he said this would be a great opportunity for the Libraries to create semester-long Information Literacy course.
I couldn’t agree more. And this got me thinking: what would this course look like? Would it be interdisciplinary or a broad overview? How would it differ from a full, 3-credit course? I haven’t completely fleshed out these thoughts but I wanted to get some of them out there and hear what you think.
The course that I have in mind would be called “Information Architecture.” The objective of the course would be to introduce students to the information ecosystem of the 21st century and teach them the skills necessary to succeed (however we choose to define that) in an information-rich environment. Here’s a basic breakdown of the course:
Unit 1: Introduction. Covers: what we define as information, how we encounter it in daily life, how we choose to divide it (work vs. play), and the importance of access.
Unit 2: Information Organization and Structure. Covers: Types of information systems, how to navigate specific systems, how info is organized in these systems and implications of such organization.
Unit 3: Basic research skills. Covers: Types of information sources, database searching, using controlled vocabulary and folksonomies, personal information management.
Unit 4: Production of Information. Covers: history of publishing and dissemination, current formal and informal methods of production.
Unit 5: Medium and Message. Covers: how medium affects message, politics of choosing one over another, implication of transferring between media.
Unit 6: Ethics of Information. Covers: Proprietary information, open access, copyright, intellectual property, and proper vs. improper use of information. (big section!)
Unit 7: Advanced research skills. Covers: Types of information resources for specific subjects, human and institutional resources, archives.
Unit 8: Final project focus.
The course would offer students (undergraduates) two tracks: (1) general research skills and (2) topic-specific skills. Depending on the student’s major and academic year, she could be assigned (or choose) either Track 1 or Track 2. Track 1 (general research skills) would be geared toward undeclared majors and 1st-2nd years. Track 2 (topic-specific skills) would be geared toward declared majors and 3rd-4th years.
Both tracks would require keeping a weekly log (written, typed, blogged, recorded, etc.) of experiences (problems, feelings, successes) encountered while doing research. The final project would include a reflection paper (or other format) and a brief annotated bibliography consisting of a variety of sources. Those on Track 1 would select a topic of their choice on which to focus their research. Track 2 students would connect their research to their declared major. Both tracks would be encouraged to use coursework in another class as a guide (per instructor’s approval).
I won’t go into more detail than that. I’m still trying to work out what is the essential content of the course (so much to teach and the time so precious!). Of course, I would work in digital technologies, collaborative work, self-assessment and peer-feedback, but the critical thing is that it integrates with other courses. What do you think? Does your university teach a semester-long IL course? Is it successful? Tell me about it in the comments!
“I am no particular fan of genealogy. But it certainly produces more substantial knowledge than ranking academics and universities and persecuting students who are held to a standard of originality by which their professors manifestly do not abide.”
Peter Stallybrass, “Against Thinking.” PMLA 122(5), p. 1585.
As an academic librarian, what do you need to know about your library’s privacy and confidentiality policy?
Today’s move by the U.S. House of Representatives to deny extending certain provision of the US Patriot Act (one of which pertains to libraries) and the call for protests leading up to it remind us that privacy is still an important issue for libraries. This caused me to think about my own library’s privacy policies and what we would do if approached by federal officials requesting information.
I’ve spent the last few days looking over the privacy statements of university libraries and reviewing the American Library Association’s stand on privacy. The following is what I consider to be the essential questions that academic librarians should be asking in order to understand where their library stands concerning the privacy and confidentiality of personally identifiable information gathered through everyday library use.
What do I mean by privacy? Is it a right? A condition? Defining privacy is difficult because no matter how you slice it, most claims tend to assume privacy to be essential value. Perhaps it is, but it is tricky to argue that point.
Let us assume for the sake of argument that privacy is indeed an essential value; what does it apply to? I think we can divide privacy into three categories: informational privacy, behavioral privacy, and locational privacy. The first includes information that a person or a society generally assumes to be private. This can include health information, financial data, and personal opinions. The second type of privacy is often equated (one could say, incorrectly) with the right to personal choice and includes the right to abortion, sexual rights, or the right to view pornographic material. The third refers to activities that, because they function within a private space, are themselves considered to be private and include those activities violated by invasions into one’s home or office space.
As academic librarians, we are primarily concerned with the first of these: information privacy (though many of us are advocates for certain behavioral privacy rights as well).
What You Need To Know
What personally identifiable information does your library collect? In order to set up a borrower’s account, the library usually needs certain pieces of personally identifiable information (PII) from a student,* including his/her name, email address, local address, student ID, and degree level. Where does this information come from? Is it provided by the student or the records department? Does the student need to give consent for the library to use this information or is there a university policy that grants consent?
In the course of daily operations, the library may collect all types of information, including what a user checks out or requests via Inter-library loan, what library websites they navigate to and from, or what items they are searching for in the online catalog. This information is extremely useful to librarians and can be used for collection development, improving online services, and budgeting. But how much of this information is retained, for how long, and how much of it is personally identifiable? These are questions that librarians should have answers to or clearly state in their privacy statements. Many libraries collect a minimum amount of user information, much of it not personally identifiable, and regularly scrub that information from their servers.
What other privacy or confidentiality policies also apply? Whether you are developing a policy for a library or trying to better understand you own, you need to understand other policies that may already be in place. At a federal level, all libraries are affected by the U.S.A. Patriot Act. Universities receiving federal aid are additionally affected by the Federal Educational Rights and Privacy Act of 1974, which regulates what student information is considered private and who is permitted to access that information. Some states, like Illinois and North Carolina, have laws specifically referencing the confidentiality of library records. Librarians should also consider any university statements on student privacy and the privacy policies of the American Library Association.
In a 2010 College & Research Libraries article, Trina Maji of the University of Vermont concluded that
the privacy policies of major vendors of online library resources fail to express a commitment to many of the standards articulated by the librarian profession and information technology industry for the handling and protection of user information. […] They are unspecific in disclosing how they protect that information from unauthorized access or disclosure, and they offer no clear recourse for users who feel the terms of the policy have been violated.
This conclusion is based on content analysis of vendor privacy statement and not a reached by examining actual practice. Nonetheless, I think we are wise to be wary of any company that does not publicize its stance on the confidentiality of user data, especially given the rising value of personal information in a market partially based on behavioral targeting practices. We should advise our students that the library has little or no control over what data they share online once they move to a third-party site.
What if someone requests personally identifiable information? Nine times out of ten, the answer to this question is “Don’t give it to them!” but there are some exceptions. Through a subpoena or court order, records can be accessed by state and federal officials. Currently under the provisions of the U.S. Patriot Act (unless they are allowed to expire), federal officials can demand access to library user data. There is nothing that restricts libraries from scrubbing the PII beforehand, unless there are state laws in place demanding the retention of “public records,” which can include any email sent to and from librarians (state employees) or via the campus network, server logs, and data submitted via online forms.
In short, it can get sticky. That’s why it’s important for librarians to know who is the appropriate authority (usually the University Librarian) to make the decision whether or not the data should be handed over in legitimate circumstance. But additionally, librarians and student workers alike should have a strong knowledge of local policies, practices and privacy expectations.
Recommendations For Developing a Privacy Statement
To quickly sum things up, here are my recommendations for academic libraries that have yet to develop a privacy statement or are thinking to revise their current one.
- Publicize your statement on privacy and confidentiality.
- Detail the information that you collect, how you collect it, what you plan to use it for, and how users can opt out (if that is an option).
- Provide information on local, state, and federal privacy standards.
- State your intended response to inquiries from individuals or agencies seeking user information.
- Warn users about third-party vendors.
- Give users contact info for expressing their concerns.
Examples of Academic Library Privacy Statements
- University of California — Los Angeles
- Harvard University
- University of North Carolina — Chapel Hill
- Princeton University
- University of Illinois at Urbana-Champaign
Magi, T. (2010). A content analysis of library vendor privacy policies: Do they meet our standards? College & Research Libraries, 71(3), 254–72.
*To make things simple, I’ll just use the term student, but I’m actually referring to anyone who uses an academic library: students, staff, faculty, visiting scholars, international students, and non-enrolled, non-staff patrons.
“The point is that authority has migrated from critics to ordinary folks, and there is nothing – not collusion or singleness of purpose or torrents of publicity – that the traditional critics can do about it. They have seen their monopoly usurped by what amounts to a vast technological word-of-mouth of hundreds of millions of people.” Source: Neal Galber
This month, I’ll be focusing my off-the-clock reading habits on issues of privacy in academic libraries. The term “privacy” carries a lot of baggage and calls to mind many different issues. In the context of the internet and social networks, the discourse tends to focus on regulation (who should do it, how much should be done) and advertising (esp. behavioral targeting). In the context of health or medical privacy, there are concerns over access to patient records, both print and electronic. On the whole, privacy discussions in the popular media tend to focus on information collection, storage, and use and the difficulty of determining which information should be public and which should be private.
Some of these issues relate to academic libraries, though many do not. In future posts, I’ll be looking at the privacy statements of academic libraries, issues in the blogosphere, and ALA’s official stance on current issues related to individual and consumer privacy, especially online and through mobile devices. In the meantime, I’ve put together a short list of useful resources for learning more about privacy in today’s cultural environment.
- Electronic Privacy and Information Center: a public interest research center in Washington, D.C created “to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values.” Check out the “Hot Issues” topic in the left sidebar for latest news and thorough summaries of current issues.
- Center for Democracy and Technology’s Guide to Online Privacy: a guide developed “to educate Internet users about online privacy and offer practical suggestions and policy recommendations.” It includes privacy basics, current issues, existing regulations, and national surveys. The CDT site also contains information on health privacy, internet openness, and free expression.
- Cornell University Law School’s Legal Information Institute: this page contains info on existing privacy laws, rights extended by the constitution, and court decisions.
- Electronic Frontier Foundation: the “first line of defense” when freedoms in the networked world come under attack. EFF works with citizens and other advocacy groups to influence legislation in favor of individual privacy rights.
- CQ Researcher: If you have access to this resource, check out Patrick Marshall’s 2009 article on privacy. It includes a bibliography, a summary of current issues, pros and cons of various federal actions, directions for further research. (Marshall, P. (2009, November 6). Online privacy. CQ Researcher, 19, 933–956.)
- Wikipedia on Privacy: always a good starting place.
What resources on privacy do you recommend? What issues on privacy are most important to academic librarians? Share your thoughts in the comments!
I’m a huge advocate for building and engaging in online communities. Recently, I wrote an article for the SLIS Descriptor, a publication of San Jose State University’s ALA Student Chapter, detailing how and why LIS students should get involved in communities online.
The mind can discover some remarkable things when moved beyond the pressures of the classroom and the compulsion to perform. All it requires is space in which to play and other minds with which to engage. As students in an online program that favors asynchronous communication and lacks a physical, communal space, how can we recreate these experiences?
Online communities offer surrogate spaces for these interstitial moments by providing some of the benefits of physical information commons (or “information grounds” as they are sometimes called) , but in digital form: a shared space (the software or platform), a shared culture (interests, hobbies, or in our case, LIS studies), and a shared language (netiquette). Just as a physical campus has predefined pathways between buildings that can facilitate chance meetings and conversations, online communities provide various opportunities for serendipitous discovery through shared links, shared digital interfaces, and common connections (e.g. friends of friends).
You can read the full article at the SLIS Descriptor blog.