The Data Hazards project looks at the problems in applying traditional ethical values to research that uses machine learning and artificial intelligence.
Minhaj Rais looks at possible solutions for beneficial data mining activities that don’t infringe on user privacy.
Should library patrons be concerned about how Elsevier uses ThreatMetrix and how it tracks users? It’s complicated.
Some were surprised GetFTR wasn’t immediately welcomed by the library community. @lisalibrarian analyzes why.
How can an authentication system be granular and protect privacy? @TAC_NISO describes RA21 and attribute release for single sign on systems and how it supports privacy.
Now, of course copyright owners of “free” resources have the right to set the terms of access. They can put up a datawall that demands the exchange of personal information (and thus enables data tracking, reporting, and maybe even aggregation with other datasets) for the otherwise free article. I wonder how far we will see this extend.
Can you prioritize privacy in user research? Simply put – yes.
The apparently different approaches Kopernio, Unpaywall, and Anywhere Access are taking might have a common assumption at their hearts — the status quo.
What might the recent backlash to revelations about how Facebook was exploited mean for the scholarly ecosystem?
We continue to battle the tidal wave of data with a bucket brigade of individual privacy settings. Maybe it’s time to pause and consider a state-level solution, ala Estonia.
Publishers are understandably concerned about piracy, but the STM/NISO initiative RA21 “to align and simplify pathways to subscribed content across participating scientific platforms” has scoped its problem the wrong way. Simply put: It’s not about security. It’s about identity. Every individual should be in control of their own identity. Can RA21 realize its potential to serve the broader interests of scientists and academia, not just the understandable objectives of publishers and vendors?
RA21 aims to replace IP address authentication (and proxy servers) with federated identity authentication – but have we thought through the implications?
Judy Luther and Todd Carpenter look at the technological challenges of providing access to content in an increasingly dispersed and mobile world.
How much privacy are you willing to relinquish for convenience? How much effort are you willing to expend for security? This month we asked the chefs: Where Is The Balance Between Security, Authentication, Marketing, and Privacy?
How much is the privacy of academics worth? Judging by the behavior of most people, seemingly very little.