Advertisement

Creating a Library Privacy Policy by Focusing on Patron Interactions

  • Shandra MorehouseEmail author
  • Jessica Vitak
  • Mega Subramaniam
  • Yuting Liao
Conference paper
  • 178 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12051)

Abstract

As sensitive transactions continue to move online, public libraries are becoming a critical resource to patrons without access to the internet. This paper shares insights on how library staff negotiate privacy risks when working with patrons handling sensitive and private information. Based on findings from an analysis of library policies on technology use, as well as focus groups and participatory design sessions with library staff from around the United States, we categorize primary risks patrons face when using library computers to complete information tasks requiring submission of sensitive information, as well as how library staff navigate the tensions between their professional values and privacy concerns. We conclude the paper with a discussion of how these findings are informing our development of a framework that library staff can use to navigate privacy risks patrons face.

Keywords

Libraries Information needs Privacy Security Information policy 

References

  1. 1.
    Mobile Technology and Home Broadband 2019. https://www.pewinternet.org/2019/06/13/mobile-technology-and-home-broadband-2019/. Accessed 16 Sept 2019
  2. 2.
    Altman, I.: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks/Cole Publishing Co., Monterey (1975)Google Scholar
  3. 3.
    Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)Google Scholar
  4. 4.
    Vitak, J., Liao, Y., Kumar, P., Subramaniam, M.: Librarians as information intermediaries: navigating tensions between being helpful and being liable. In: Chowdhury, G., McLeod, J., Gillet, V., Willett, P. (eds.) iConference 2018. LNCS, vol. 10766, pp. 693–702. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-78105-1_80CrossRefGoogle Scholar
  5. 5.
    Privacy Tool Kit. http://www.ala.org/advocacy/privacy/toolkit. Accessed 15 Sept 2019
  6. 6.
    Library Privacy Guidelines. http://www.ala.org/advocacy/privacy/guidelines. Accessed 07 Sept 2019
  7. 7.
    Library Privacy Checklists. http://www.ala.org/advocacy/privacy/checklists. Accessed 07 Sept 2019
  8. 8.
    Pekala, S.: Privacy and user experience in 21st century library discovery. Inf. Technol. Libr. 36(2), 48–58 (2017).  https://doi.org/10.6017/ital.v36i2.9817CrossRefGoogle Scholar
  9. 9.
    Houghton, S.: The challenge of balancing customer service with privacy. J. Intell. Freedom Privacy 4(1), 8–9 (2019)Google Scholar
  10. 10.
    Klinefelter, A.: Privacy and library public services: or, I know what you read last summer. Legal Ref. Serv. Q. 26(1–2), 253–279 (2007).  https://doi.org/10.1300/J113v26n01_13CrossRefGoogle Scholar
  11. 11.
    Core Values of Librarianship. http://www.ala.org/advocacy/intfreedom/corevalues. Accessed 07 Sept 2019
  12. 12.
    Bonsignore, E., et al.: Embedding participatory design into designs for learning: an untapped interdisciplinary resource. In: CSCL 2013 (2013)Google Scholar
  13. 13.
    Thompson, K.M., Jaeger, P.T., Taylor, N.G., Subramaniam, M., Bertot, J.C.: Digital Literacy and Digital Inclusion: Information Policy and the Public Library. Rowman & Littlefield, Lanham (2014)Google Scholar
  14. 14.
    Gomez, R., Gould, E.: The “cool factor” of public access to ICT: Users’ perceptions of trust in libraries, telecentres and cybercafés in developing countries. Inf. Technol. People 23, 247–264 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Shandra Morehouse
    • 1
    Email author
  • Jessica Vitak
    • 1
  • Mega Subramaniam
    • 1
  • Yuting Liao
    • 1
  1. 1.University of MarylandCollege ParkUSA

Personalised recommendations