C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 9, 2008.

Slides:



Advertisements
Similar presentations
Off Campus Library Services Your virtual library.
Advertisements

Library.centennialcollege.ca Distance Access You need an active library account to use the library; e.g. borrow books, access full text e- resources from.
Introduction to Online Resources Aeronautics & Astronautics, Mechanical Engineering and Ship Science Michael Whitton November 2011 & February 2012 University.
Resources for GOVT 387, Fall 2006 Dr. Tony Fonseca Serials Librarian
The libraries of Xavier University are housed in two fully-airconditioned buildings: the three-storey Main Library and the five-storey Library Annex.
Using Off Campus Library Services © Off Campus Library Services.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Fair Information Practice.
Introduction to Online Resources Aeronautics & Astronautics, Mechanical Engineering and Ship Science Michael Whitton February/March 2013 University Library.
Science and Engineering Library Your Information Center.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
Hacking the Library Tools, Tips, and Tricks to Find, Organize, and Keep Up to Date on Current Research in Your Field Janet Fransen Librarian for Computer.
SOC 229D-A: Cultural Anthropology Research Project Proposal / Bibliography Dr. Adams - Fall 2010 Alison Gregory
Introduction to Library Research Gabriela Scherrer Reference Librarian for English Languages and Literatures, University Library of Bern.
WISER Social Sciences: Education Kate Williams and Judy Reading January 2007.
Introduction to Library Research Gabriela Scherrer Reference Librarian for English Languages and Literatures, University Library of Bern.
DART 261 Library Research Melinda Reinhart Visual Arts Librarian October 2010.
Literature Review: Mechanical Engineering Masters Project Linda Knaack Instructional Services Librarian
Library Orientation for Architecture Students Martin Aurand Architecture Librarian
Welcome to Library 101!. When is the Library Open? during classes –most days: 7:45am - midnight during finals –most days: 7:45am - 2:00am open during.
Literature Review Week 3 Lecture 1. School of Information Technologies Faculty of Science, College of Sciences and Technology The University of Sydney.
Tony Wilson Academic Liaison Librarian for Computer Science May 2011.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 7, 2010.
Starting Research and Finding Sources Comm Arts II Mr. Wreford.
Copyright © Allyn & Bacon (2007) Conducting Library Research Graziano and Raulin Research Methods: Appendix C This multimedia product and its contents.
Research Resources Jacqueline A. Gill, Associate Professor Reference Librarian and Information Literacy Coordinator Ext. 6089
Focus on Readers Service for Education How to Use Library Services and Resources Effectively USST Library.
CS 101 Students Presented by Ken Ryan Winter, 2008 GETTING THE MOST OUT OF THE LIBRARY OUT OF THE LIBRARY.
PPAS 3190: Introduction to Library Research Timothy Bristow – Scott Library Political Science & Public Policy Librarian.
PLUG-INs Information Fujariah Colleges
Information Literacy Jen Earl: Academic Support Librarian- HuLSS.
Searching ERIC Some quick tips for effectively searching ERIC for educational research. Laura A. Ewald Assistant Librarian in Public Services Ruby E. Dare.
SFU Library services, resources, and research tips for SIAT researchers (or: How libraries are still useful in the age of the Digital Revolution and Breaking.
The Library and your Literature Review James Webley 26 September 2014.
RESEARCHING TIPS & STRATEGIES Summer 2008 Melanie Wilson Academic Success Center MSC 207.
Senior Thesis: Review of Literature Samples, Citation help, Search techniques.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Fair Information Practice.
Literature Review Getting started. “ a researcher cannot perform significant research without first understanding the literature in the field ” (Boote.
Content Curation and Critical Thinking: Teaching Students How to Manage, Create, and Share Information in the Digital Age Presented by: Kelly Korenek,
Introduction to Library Research Gabriela Scherrer Reference Librarian for English Languages and Literatures, University Library of Bern.
Literature in Theory & Practice Frederic Murray Assistant Professor MLIS, University of British Columbia BA, Political Science, University of Iowa Instructional.
Summer students lecture, 06 July 2011T. Basaglia, A. Gentil-Beccot - GS-SIS The CERN Library: an Accelerator of Science.
FKCC Library Overview Welcome to the Florida Keys Community College’s Learning Resources Center / Library Our mission is to connect students and faculty.
1 Library Services. 2 Benefits of using the Library To find resources for your assignments and identify areas of interest To produce extra good papers.
ECE 600: Graduate Orientation Research NCSU Libraries.
Introduction to the Library UTS Library Why can’t I just use Google? The vast majority of academic literature suitable for university assignments.
Literature Review CIE 1001 Presented by Monique Flaccavento OISE Library October 28, 2009.
English 115 Subject Databases Hudson Valley Community College Marvin Library Learning Commons 1.
Keep Current Digitally! Fall Today’s Agenda Where we find current research – overview Table of Contents alerts –Electronic journals Topic Alerts.
Research resources for 3 rd /4 th year projects James Webley Subject Librarian Mathematics 13 October 2014.
UBC JumpStart workshop By Eugene Barsky Science & Engineering Librarian Irving K. Barber Learning Centre, UBC Fall 2008.
Science and Engineering Library Your Information Center.
Cleveland State University EEC 414/503, ESC 720 Writing in Electrical and Computer Engineering Lecture 4 – How to Read Dan Simon.
Introduction To Ohio University Libraries Araba Dawson-Andoh Africana Librarian Alden Library Room 122A
Summer students pres., 03 July 2013T. Basaglia - GS-SIS The CERN Library: an Accelerator of Knowledge.
Definition and search of scientific articles Tord Heljeberg
Journal Searching Nancy B. Clark, M.Ed. Director of Medical Informatics Education FSU College of Medicine 1 All recourses are available online in Medical.
Finding literature for 3 rd /4 th year projects James Webley Subject Librarian Mathematics 19 October 2015.
English 115 Subject Databases Hudson Valley Community College Marvin Library Learning Commons 1.
Electrical & Computer Engineering Graduate Seminar: Library Resources May Yan BASc MISt Electronic Resources Librarian Ryerson University.
Unit 5 Commercial Databases. Can You Find an Answer? n Connect to Social Sciences Abstracts n Search: u Cold war (keyword): ______ items u Cold war (title):______.
Welcome Back, Students & Faculty! university photos courtesy of Carnegie Mellon Photo Archive.
Library presentation, 28 September 2010T. Basaglia, A. Gentil-Beccot - GS-SI What can CERN Library do for TE department?
Click on Course Guides Select Spanish Research Seminar.
“The illiterate of the future will not be the person who cannot learn. It will be the person who does not know how to learn.” – Alvin Toffler.
1 ACCESSING THE PURDUE LIBRARY DATABASES AND ONLINE JOURNALS September 14, 2006.
DISCOVERING LIBRARY RESEARCH COLLECTIONS IN THE 21ST CENTURY Maureen Couacaud Acting Faculty Librarian: Faculty of Business & Law.
Fiona Quinlan Subject Librarian Science & Engineering James Hardiman Library Library Resources for Research MScSED.
Research Methods and the Researched Argument Essay.
National History Day Helpful Hints. Students will Day One: Review how to access the library catalog and the library databases Review and practice MLA.
Presentation transcript:

C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 9, 2008

C MU U sable P rivacy and S ecurity Laboratory 2 Assignments for HW2 #4  TRUSTe  Network Advertising Initiative  Safe Harbor  The Privacy Act of 1974  The Federal Wiretap Act  The Fair Credit Reporting Act  HIPPA  The Gramm-Leach Bliley Act  The Video Privacy Protection Act  Children's Online Privacy Protection Act  Family Educational Rights and Privacy Act (FERPA)  CPNI rules  Cable TV Privacy Act  EU Directive  PIPEDA (Canadian privacy law)  Japanese Personal Information Protection Act (PIPA)  California SB-1386  Australian Federal Privacy Law  Other US laws?  Other international laws?

C MU U sable P rivacy and S ecurity Laboratory 3 Using Library Resources

C MU U sable P rivacy and S ecurity Laboratory 4 CMU Libraries   Engineering and Science (a.k.a. E&S) –Location: Wean Hall, 4th floor –Subjects: Computer Science, Engineering, Mathematics, Physics, Science, Technology  Hunt (CMU’s main library) –Location: Its own building (possibly 2nd ugliest on campus behind Wean), between Tepper and Baker –Subjects: Arts, Business, Humanities, Social Sciences  Software Engineering Institute (a.k.a. SEI) –Location: SEI Building (4500 Fifth Avenue), 3rd floor –Subjects: Security, Software, Technology

C MU U sable P rivacy and S ecurity Laboratory 5 START HERE: Cameo  Cameo is CMU’s online library catalog –  Catalogs everything CMU has: books, journals, periodicals, multimedia, etc.  Search by key words, author, title, periodical title, etc.

C MU U sable P rivacy and S ecurity Laboratory 6 CAMEO: Search Result for “Cranor” Number of copies and status Library

C MU U sable P rivacy and S ecurity Laboratory 7 CAMEO: Search Result for “Solove” Due date

C MU U sable P rivacy and S ecurity Laboratory 8 If it’s not in Cameo, but you need it today: Local Libraries  Carnegie Library of Pittsburgh –Two closest locations Oakland: Practically on campus (4400 Forbes Ave.) Squirrel Hill: Forbes & Murray (5801 Forbes Ave.) –  University of Pittsburgh Libraries –16 libraries! Information science, Engineering, Law, Business, etc. –

C MU U sable P rivacy and S ecurity Laboratory 9 If it’s not in Cameo, and you can wait: ILLiad and E-ZBorrow  ILLiad and E-ZBorrow are catalogs of resources available for Interlibrary Loan from other libraries nationwide (ILLiad) and in Pennsylvania (E-ZBorrow)  Order items online (almost always free)  Wait for delivery – average 10 business days  Find links to ILLiad and E-ZBorrow online catalogs at

C MU U sable P rivacy and S ecurity Laboratory 10 Other Useful Databases  Links to many more databases, journal collections –Must be accessed on campus or through VPN –  Lexis-Nexis –Massive catalog of legal sources – law journals, case law, news stories, etc.  IEEE and ACM journal databases –IEEE Xplore and ACM Digital Library  INSPEC database –Huge database of scientific and technical papers  JSTOR –Arts & Sciences, Business, Mathematics, Statistics

C MU U sable P rivacy and S ecurity Laboratory 11 And of course…  Reference librarians are available at all CMU libraries, and love to help people find what they need – just ask!

C MU U sable P rivacy and S ecurity Laboratory 12 Writing a Literature Review

C MU U sable P rivacy and S ecurity Laboratory 13 Writing a literature review  What is a literature review? –A critical summary of what has been published on a topic What is already known about the topic Strengths and weaknesses of previous studies –Often part of the introduction or a section of a research paper, proposal, or thesis  A literature review should –be organized around and related directly to the thesis or research question you are developing –synthesize results into a summary of what is and is not known –identify areas of controversy in the literature –formulate questions that need further research Dena Taylor and Margaret Procter The literature review: A few tips on conducting it.

C MU U sable P rivacy and S ecurity Laboratory 14 Literature review do’s and don’ts  Don’t create a list of article summaries or quotes  Do point out what is most relevant about each article to your paper  Do compare and contrast the articles you review  Do highlight controversies raised or questions left unanswered by the articles you review  Do take a look at some examples of literature reviews or related work sections before you try to create one yourself –For an example, of a literature review in a CS conference paper see section 2 of

C MU U sable P rivacy and S ecurity Laboratory 15 Privacy terminology  Data subject  Data controller  Secondary use of data

C MU U sable P rivacy and S ecurity Laboratory 16 OECD fair information principles  _34255_ _1_1_1_1,00.html _34255_ _1_1_1_1,00.html  Collection limitation  Data quality  Purpose specification  Use limitation  Security safeguards  Openness  Individual participation  Accountability

C MU U sable P rivacy and S ecurity Laboratory 17 US FTC simplified principles  Notice and disclosure  Choice and consent  Data security  Data quality and access  Recourse and remedies US Federal Trade Commission, Privacy Online: A Report to Congress (June 1998),

C MU U sable P rivacy and S ecurity Laboratory 18 USACM Policy Recommendations on Privacy (June 2006)  y.htm y.htm

C MU U sable P rivacy and S ecurity Laboratory 19 Discussion

C MU U sable P rivacy and S ecurity Laboratory 20 The Prada NYC dressing room  e.com/ e.com/  What aspects seem privacy invasive?  How could the design be changed to reduce privacy concerns?

C MU U sable P rivacy and S ecurity Laboratory 21 Discussion questions  Which technologies are privacy invasive?  Which technologies are privacy protective?  Can we turn one into the other?  How can we use the FIPs in our analysis?

C MU U sable P rivacy and S ecurity Laboratory 22 Applying the FIPs  Google Street View  Gmail advertising  Hillman Library Web Cam  Amazon.com book recommendations  Giant Eagle Advantage Card  Transportation Security Administration watch lists