How much privacy are you willing to relinquish for convenience? How much effort are you willing to expend for security? This month we asked the chefs: Where Is The Balance Between Security, Authentication, Marketing, and Privacy?
Can you prioritize privacy in user research? Simply put – yes.
Facebook argues that its erosions of privacy reflect changing social norms. But is what it’s doing just plain wrong?
Privacy is something we trade in all the time. The questions are about the best trades to make.
Defining privacy is tricky, and it’s moreso in the digital-soaked world we live in. How can we frame our thinking on the issue?
Recently, pronouncements by online mega-players (Google, Facebook) have been lighting up the boards as Eric Schmidt and Mark Zuckerberg particularly have made incendiary comments about the future and value of privacy. Here’s Eric Schmidt, in a brief clip, saying things […]
As university presses become more involved with D2C marketing, they are going to confront the need for clearly articulated privacy policies. The time to put those policies in place is now.
Privacy concerns seem aimed at the small stuff, but could expand into a system of censorship.
Mimi Calter, Deputy University Librarian for Stanford, offers a useful framework for libraries as they consider patron privacy.
The team behind SeamlessAccess discuss why identity federation promotes security and privacy despite coordinated attacks on access systems
We continue to battle the tidal wave of data with a bucket brigade of individual privacy settings. Maybe it’s time to pause and consider a state-level solution, ala Estonia.
Today, we grapple with privacy issues as consumers, as citizens, and as voters. As an industry, we should be thinking about how to draw not only on policy but also on technical architecture to balance privacy and innovation. When the stars align, an entirely different architecture for the control of user data is possible. What would such a shift mean for scholarly publishing and academic libraries?
Should library patrons be concerned about how Elsevier uses ThreatMetrix and how it tracks users? It’s complicated.
At the opening of the Frankfurt Book Fair this year, a pre-meeting session was held called CONTEC. This follow-up to the much beloved, but now defunct, O’Reilly Tools of Change conference brought together an interesting mix of leadership from traditional […]
How can an authentication system be granular and protect privacy? @TAC_NISO describes RA21 and attribute release for single sign on systems and how it supports privacy.