CNI: Coalition for Networked Information

  • About CNI
    • Membership
    • CNI Collaborations
    • Staff
    • Steering Committee
    • CNI Awards
    • History
    • CNI News
  • Program Plan
    • Current Program Plan
    • Program Plan Archive
  • Topics
  • Events & Projects
    • Membership Meetings
    • Workshops & Projects
    • Other Events
    • Event Calendar
  • Resources
    • Publications by CNI Staff
    • Program Plan
    • Pre-Recorded Project Briefing Series
    • Videos & Podcasts
    • Follow CNI
    • Historical Resources
  • Contact Us

Swords, Dragons, and Spells: Libraries and User Privacy

Home / Project Briefing Pages / CNI Fall 2014 Project Briefings / Swords, Dragons, and Spells: Libraries and User Privacy

December 6, 2014

Peter Brantley
Director Digital Library Applications
New York Public Library

Marshall Breeding
Independent Consultant
Library Technology Guides

Eric Hellman
Chief Executive Officer
Gluejar

Gary Price
Library Consultant
infoDOCKET.com

 

As libraries become more reliant on networked-based services, they are increasingly swept between a Scylla and Charybdis of user data, with mandated user protections on one side and the desire to build personalized services on the other. The proliferation of search engine optimization (SEO), Web analytics, and user tracking results in much greater leakage of user data across the Web, particularly into ad-sharing and social networks, while at the same time libraries seek to utilize these identical tools to construct their own content recommending and service integrations that make use of online libraries as seamless as other well-designed Internet sites, while generating new data that are increasingly susceptible to hacking. The panel will discuss these conflicting privacy challenges and survey the real-world data environments that libraries are working in. The session will also cover the ramifications of new services more resembling commercial Web tools than the mainframe online public access catalogs (OPAC) of yore, and the need to shift the debate on privacy guidelines to a more realistic baseline. Examples of unexpectedly widespread user tracking and data dissemination on the open Internet from existing library services, some managed by third parties, will be shared, as will a survey of the security practices of the major integrated library system (ILS) vendors, with particular attention on back end data encryption practices.

 Presentation (Hellman)
Presentation (Price)

Share this:

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Filed Under: CNI Fall 2014 Project Briefings, Information Access & Retrieval, Privacy, Project Briefing Pages, User Services
Tagged With: cni2014fall, Project Briefings & Plenary Sessions, Videos

Last updated:  Thursday, July 21st, 2022

 

Contact Us

21 Dupont Circle
Suite 800
Washington, DC, 20036
202.296.5098

Contact us
Copyright © 2023 CNI

  • Copyright Policy
  • Privacy Policy
  • Site map

Keeping up with CNI

CNI-ANNOUNCE is a low-volume electronic forum used for information about the activities and programs of CNI, and events and documents of interest to the CNI community.
Sign up

Follow CNI

  • View cni.org’s profile on Facebook
  • View cni_org’s profile on Twitter
  • LinkedIn
  • YouTube
  • Vimeo

A joint project