Archival Views on Challenges and Opportunities

Slides:



Advertisements
Similar presentations
What is Advance Care Planning?. Advance care planning “A process of discussion between an individual and their care providers irrespective of discipline.
Advertisements

DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
+ HEALTH INSURANCE: UNDERSTANDING YOUR COVERAGE Navigator Name Blank County Extension UGA Health Navigators.
"What works in a wiki? Redesigning collaborative learning" Eileen Kennedy.
S. hulme CHILD PROTECTION DISCLOSURE. s. hulme DISCLOSURE WHAT DISCLOSURE IS HOW DISCLOSURE MIGHT HAPPEN WHAT YOU SHOULD DO THIS PRESENTATION DEALS WITH.
An introduction to Child Protection and Safeguarding
Fulbright Scholar Program for U.S. Faculty Much of this is taken from
Chapter 7 Applying for a Job Chapter 7 Applying for a Job Lesson 7.2 Putting Your Best Foot Forward Lesson 7.2 Putting Your Best Foot Forward.
Organ Donation RAISING AWARENESS THROUGH SOCIAL STUDIES.
Confidentiality Clue Board Game Edition Roy Mays August 1, 2012.
Management is not a Natural Act Megan Winget - Co-Project Manager Managing the Digital University Desktop: Introduction and Preliminary Findings.
Social and Economic Impacts of IT Professor Matt Thatcher.
Contextual Inquiry Katayoon Etemad November 2007.
The Newcastle Electronic Corpus of Tyneside English (NECTE) of linguistic archaeology and the ethical and legal consequences AHRB project code: RE11776.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
SOCIAL MEDIA CLINICS POCKLINGTON SCHOOL. TWITTER You don’t have to put your age when you register! SHOULD BE 13! It is by no means private! Do you know.
PHIL 2020 Day 3 Week 2 Critical Thinking Applications.
THE CAREER CENTER THE UNIVERSITY OF ALABAMA Making a Professional Impression.
On-Demand Success Have a plan of attack! Tips for Writing On- Demand Sometimes it’s hard to write when you’re under pressure and put on the spot. Here.
Interpersonal relations as a health professional
Illinois Action for Children Media 101: Making the Press Work for You.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
Medical Advocacy and Advance Directives Session 3 Staying in the Circle of Life.
Documenting Completion of your PDP
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
Jan How useful is this source as evidence about women in the 1950s in Britain? Use details of the source and your knowledge to explain your answer.
Finding your dream internship. What is an internship? Career related work experience, usually full-time in the summer. A chance to test the waters. Not.
TKT COURSE SUMMARY UNIT –14 Differences between l1 and l2 learning learners characteristics LEARNER NEEDS DIANA OLIVA VALDÉS RAMÍREZ.
√ Check out the details!!. Click on Questions to find the answers!
1 Communication and Ethics for International Medical Graduates in Australia R Woodward-Kron, E Flynn, C Delany The University of Melbourne for Postgraduate.
CPS SOAR Faculty Presentation Mary Kate Witry. What is SOAR?  Soar is the online catalog system used by CPS for all paper and online resources  These.
Strategic Communications Training Crisis Communications X State MDA 1.
2Build a Profile. What is 2Build a Profile? We use it as a tool to make observations of your child’s learning in school. Using our tablets we take a photo,
Language Learning for Busy People These documents are private and confidential. Please do not distribute.. Pre-Intermediate: Interview Skills 5 Discussing.
Online Reputation A guide for children aged 7+
Welcome to our Tapestry Workshop
Signs of Safety Toni Morkin, Senior Manager
Registration May not be available till tomorrow
Community Survey Report
New Breaks, New Horizons
Identity on the Internet
Stéphane Levesque, DG of Operations, PCO 13 June 2017
Community Conversations: Sister to Sister Women’s Health Initiative CHNA17 Mental Health Grant September 2016 Model of community engagement addressing.
Learning Usage of English KWICly with WebLEAP/DSR
4. Intellectual Property and Ethics on the Web
Tyler Page, M.A. Ph.D. Student Brooke Liu, Ph.D.
HOME VISIT.
Cover Letters That Do The Job
Effective communication
Applying for a Job Presenting Yourself
Improvement 101 Learning Series
NOTES FOR PRESENTERS: This presentation is designed to help people who implement shared plans of care to explain the practice to other professionals.
Youngwummin: Ethics and Data Collection Methods
Engaging families. Creating communities.
Agenda Setting One thing I want to get out of this session Activity:
Introduction to Computers
Move this to online module slides 11-56
Minds On… What words come to mind when you think of Mental Health?
Cover Letters That Do The Job
Subject/Verb Agreement
Applying for a Job “My First Résumé”
Data Management Ethical considerations for educational research
Welcome! I’m so glad you are here!
Chapter 6 Finding a Job.
1.7.2 People who help me and look after me – When I have a question or a worry I can identify the adults in my life who care for me and look after me.
IST346: What Is IT?.
1.7.2 People who help me and look after me: When I have a question or a worry I can identify the adults in my life who care for me and look after me.
Measuring the Mountain
People who help me and look after me: When I have a question or a worry I can identify the adults in my life who care for me and look after me. I can.
Presentation transcript:

Protecting Sensitive Email Archival Views on Challenges and Opportunities Katie Shilton, Amy Wickner, Douglas W. Oard (University of Maryland) & Jimmy Lin (University of Waterloo)

Email: Vital Record, Privacy Nightmare

Providing Access to Non-Sensitive Email Project to build an email search tool that excludes sensitive information Retrieval & machine learning expertise But – what counts as sensitive information? A social science question Sensitive information is contextual Social context, role, information uses, transmission principles all matter Email crosses social contexts. What factors matter most?

Asking experts: Digital archivists Work in progress: interviews with 10 archivists who have processed email collections Questions focused on concerns about sensitivity or secrecy shared by donors, concerns discovered by archivists, and current solutions for addressing those concerns.

Findings: Roles of Concern Protection FROM vs. protection FOR “Newspapers. Public media. Around here, if I’m talking to a distinguished alum, or I’m talking to a faculty member, almost always, if they’re concerned about something, it’s, ‘I don't want it on the front page of [the local paper],’ or, ‘I don't want it on the front page of [the student newspaper].’ That is their single biggest concern, is the media distorting what their intention was.” “So a lot of them are concerned about their family members being present. There’s a donor … he initially was like, “You don't need anything with my family, so if you screen anything out, that’s fine.” But then … he actually talked with his adult children a lot about his work, and they kind of gave him feedback, so that's gonna be a much stickier wicket than we had initially anticipated.”

Findings: Information Type Legally-protected information: PII Banking information Health information Student records Information relating to pending litigation Business secrets: Trade and strategy secrets Internal security information Contracts Nondisclosure agreements

Findings: Reputational Risk Information that, if revealed, might risk a donor’s reputation. Memberships and beliefs (“his grandfather or great-grandfather…was a member of the Klan and he was scandalized about that”) Evidence of stigmatized activity (e.g. drug use). Using foul language in work emails Gossiping, making “unfiltered” or “very very frank” remarks Expressing emotional content in professional situations Battles: “Usually, [sensitivity] is almost entirely going to be something that happened in their career that was contentious. Some controversy that they were part of, some event where they were at loggerheads with another person … and they would prefer not to have that made public.” Reputations of others: “So for example, we have the papers of a very prominent religious speaker and she gets a lot of letters from people about spiritual crises they’re going through. And in some cases that involve… heavy things like abortions, she has asked that the identifying information, the name of the person who sent her that letter be anonymized.”

Next Steps Can we automatically identify reputational risks? Soliciting a corpus of secrets Asking Turkers to contribute (anonymized) sensitive and non-sensitive emails Factorial vignette surveys To rank importance of information types, roles, contexts Building classifiers from the data and testing them on email corpora

Does it Work?

Thank You! kshilton@umd.edu Ethics & Values in Design (EViD) Lab http://evidlab.umd.edu/ Computational Linguistics & Information Processing (CLIP) Lab http://clip.umiacs.umd.edu This research supported by NSF award IIS-1618695.