SlideShare a Scribd company logo
1 of 3
Download to read offline
Online Privacy and the Librarian: A Selected Bibliography
American Library Association. (2010, May). Online privacy vanishing? Newsletter on Intellectual
Freedom, 59(3), 100-101.
Online Privacy Vanishing is an ALA article which discusses the problems involved in privacy and
technology, particularly technology with social networking. The article states that experts say that even
information that doesn't appear to identify a person online can be gathered and reassembled by
computers to create a much more complete image of a person than most people would expect,
sometimes including the Social Security Number. This article may not be the best choice for younger
students, but might be interesting with older teens or college students after building relationships within
a class or club. It would also be useful in building a case for media education programming.
Gallagher, F. (2011, January/February). Hand in hand: Media literacy and internet safety. Library
Media Connection, 29(4), 16,18.
Hand in Hand: Media Literacy and Internet Safety is a wonderful article with a laundry list of
resources at the end, each and every one worth exploring. Frank Gallagher has made a down-to earth,
common sense argument encouraging education for internet safety and, more importantly,
responsibility over parental controls. A recent article, this presents the idea that internet safety in the
21st
century is less about those who might prey upon youth internet users and more about ethical
mistakes that those youth may make, which can follow them for the rest of their lives on the web. This
was the best article I have read on this topic.
Herring, M. Y. (2010, November). Hacked off in the web. Against the Grain, 40. http://www.against-
the-grain.com
Caustic, rude, and overly paranoid, Hacked Off in the Web contains little information that one would
ever want to use in the internet. What it does is begin with some great statistics and make a strong case
for why adults and some teens shouldn't be allowed to go on the internet. I don't agree with this source,
but I can see how some might, and the statistics at the beginning really are very useful in making a case
for media literacy.
Notess, G. R. (2009, July/August). Privacy in the age of the social web. Online, 44(4), 41-43.
Privacy in the Age of the Social Web was a terrifying article that I believe every adult who uses the
internet regularly should read, but is probably too intense for use with teens. This article discusses
many things which can go wrong with private information on the web. The usefulness of this article is
in emphasizing the seriousness of our task as Information Professionals in our role as media educators.
Read the article, or simply go to www.criminaljusticeusa.com/blog/2009/25-surprising-things-that-
google-knows-about-you to see what I mean.
Panter, S. L. (2009, May/June). Teaching elementary students to be safe on the internet. Library Media
Connect, 27(6), 32-33.
In Teaching Elementary Students to be Safe on the Internet, Susan L Panter delivers a practical guide to
teaching internet safety to children K-5. She offers a small selection of useful curriculum tools ,
relevant anecdotes, and applicable, easy to understand rules to help guide young students in learning to
navigate the web safely. The three guidelines she provides are as simple as look both ways before
crossing the street and don't take candy from strangers. They are simple, but they work.
US Census Bureau. (2009). Household internet usage in and outside of the home by selected
characteristics [Table 1153-1154]. Retrieved March 21, 2011, from
http://www.census.gov/compendia/statab/cats/information_communications/internet_
publishing_and_broadcasting_and_internet_usage.html
The US Census Bureau provides information on a variety of data that is useful in making the case for
media education in public libraries. This particular sheet shows the prevalence of internet connection
in libraries and homes with notes on division between dial-up and broadband.
Yates, K. (2009). Reaching out to young people about online privacy-one kid at a time. Feliciter, 55(3),
114-115.
This Canadian publication is particularly useful in several ways. First, it has wonderful statistics on YA
perceptions of the internet and media usage, if you live in Canada. It also provides tips and concepts
that are designed to remind YA users to think about their usage. I particularly like “When doing online
surveys or making purchases, question why people want your personal information,” and “Be discreet.
Remember—what you post stays online forever”. While not 100% true, these statements do address
some commonly held beliefs about the internet that can be damaging to users.

More Related Content

What's hot

Life After 2.0
Life After 2.0Life After 2.0
Life After 2.0hblowers
 
Inquiry part 4 - Mandy Taylor
Inquiry part 4 - Mandy TaylorInquiry part 4 - Mandy Taylor
Inquiry part 4 - Mandy TaylorMandy Taylor
 
Ferrier research agenda-2016
Ferrier research agenda-2016Ferrier research agenda-2016
Ferrier research agenda-2016Michelle Ferrier
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)shaunaeleacy
 
Reaching Forward MySpace/Facebook 2008
Reaching Forward MySpace/Facebook 2008Reaching Forward MySpace/Facebook 2008
Reaching Forward MySpace/Facebook 2008cgray
 
Social Media Adoption: U.S., Individual Level, Teens & Young Adults
Social Media Adoption: U.S., Individual Level, Teens & Young AdultsSocial Media Adoption: U.S., Individual Level, Teens & Young Adults
Social Media Adoption: U.S., Individual Level, Teens & Young AdultsDr. V Vorvoreanu
 
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Dr. Mokter Hossain
 
What is social media
What is social mediaWhat is social media
What is social mediatessausman
 
Using The Internet In Education
Using The Internet In EducationUsing The Internet In Education
Using The Internet In EducationEwa Nawrot
 
Libraries Bridging the Digital Divide
Libraries Bridging the Digital DivideLibraries Bridging the Digital Divide
Libraries Bridging the Digital DivideBobbi Newman
 
Digital Divide
Digital DivideDigital Divide
Digital Dividecronegeek
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 
BSF Internship Project
BSF Internship ProjectBSF Internship Project
BSF Internship ProjectAllysse Shank
 
The Vortex: Experiments in Online Collaboration
The Vortex: Experiments in Online CollaborationThe Vortex: Experiments in Online Collaboration
The Vortex: Experiments in Online CollaborationNancy Wright White
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerD Boyer Consulting
 

What's hot (20)

Life After 2.0
Life After 2.0Life After 2.0
Life After 2.0
 
Inquiry part 4 - Mandy Taylor
Inquiry part 4 - Mandy TaylorInquiry part 4 - Mandy Taylor
Inquiry part 4 - Mandy Taylor
 
Ferrier research agenda-2016
Ferrier research agenda-2016Ferrier research agenda-2016
Ferrier research agenda-2016
 
(küber)koolikius
(küber)koolikius(küber)koolikius
(küber)koolikius
 
Flipbook
FlipbookFlipbook
Flipbook
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)
 
Reaching Forward MySpace/Facebook 2008
Reaching Forward MySpace/Facebook 2008Reaching Forward MySpace/Facebook 2008
Reaching Forward MySpace/Facebook 2008
 
Social Media Adoption: U.S., Individual Level, Teens & Young Adults
Social Media Adoption: U.S., Individual Level, Teens & Young AdultsSocial Media Adoption: U.S., Individual Level, Teens & Young Adults
Social Media Adoption: U.S., Individual Level, Teens & Young Adults
 
Resisting technology
Resisting technologyResisting technology
Resisting technology
 
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
 
What is social media
What is social mediaWhat is social media
What is social media
 
Using The Internet In Education
Using The Internet In EducationUsing The Internet In Education
Using The Internet In Education
 
Libraries Bridging the Digital Divide
Libraries Bridging the Digital DivideLibraries Bridging the Digital Divide
Libraries Bridging the Digital Divide
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 
Social Software
Social SoftwareSocial Software
Social Software
 
BSF Internship Project
BSF Internship ProjectBSF Internship Project
BSF Internship Project
 
The Vortex: Experiments in Online Collaboration
The Vortex: Experiments in Online CollaborationThe Vortex: Experiments in Online Collaboration
The Vortex: Experiments in Online Collaboration
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyer
 
Netgen Notes
Netgen NotesNetgen Notes
Netgen Notes
 

Viewers also liked

Business etiquette handout
Business etiquette handoutBusiness etiquette handout
Business etiquette handoutabeldridge
 
Creating a prezi handout
Creating a prezi handoutCreating a prezi handout
Creating a prezi handoutabeldridge
 
Business etiquette
Business etiquetteBusiness etiquette
Business etiquetteabeldridge
 
SWANA Leading Generations X and Y
SWANA Leading Generations X and Y SWANA Leading Generations X and Y
SWANA Leading Generations X and Y MarissaSlides
 
The shining – opening crdits
The shining – opening crditsThe shining – opening crdits
The shining – opening crdits049293
 
Effective Procrastination with HiveMinder
Effective Procrastination with HiveMinderEffective Procrastination with HiveMinder
Effective Procrastination with HiveMinderpjf
 
4 tips for avoid gossips
4 tips for avoid gossips4 tips for avoid gossips
4 tips for avoid gossipsAhammed Azrin
 
Office Etiquette for Employees
Office Etiquette for EmployeesOffice Etiquette for Employees
Office Etiquette for EmployeesJo Woolery
 
What makes a good employee
What makes a good employeeWhat makes a good employee
What makes a good employeeDusten Keppner
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationMonica Dhoundiyal
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteRIU6
 
Fish philosophy 2
Fish philosophy  2Fish philosophy  2
Fish philosophy 2GB Srithar
 
Advantages and disadvantages of different channels of communication
Advantages and disadvantages of different channels of communicationAdvantages and disadvantages of different channels of communication
Advantages and disadvantages of different channels of communicationShivani Rana
 
PSFK Future of Work Report
PSFK Future of Work ReportPSFK Future of Work Report
PSFK Future of Work ReportPSFK
 

Viewers also liked (20)

Business etiquette handout
Business etiquette handoutBusiness etiquette handout
Business etiquette handout
 
Creating a prezi handout
Creating a prezi handoutCreating a prezi handout
Creating a prezi handout
 
Business etiquette
Business etiquetteBusiness etiquette
Business etiquette
 
SWANA Leading Generations X and Y
SWANA Leading Generations X and Y SWANA Leading Generations X and Y
SWANA Leading Generations X and Y
 
The shining – opening crdits
The shining – opening crditsThe shining – opening crdits
The shining – opening crdits
 
Effective Procrastination with HiveMinder
Effective Procrastination with HiveMinderEffective Procrastination with HiveMinder
Effective Procrastination with HiveMinder
 
4 truths about Gossip
4 truths about Gossip4 truths about Gossip
4 truths about Gossip
 
4 tips for avoid gossips
4 tips for avoid gossips4 tips for avoid gossips
4 tips for avoid gossips
 
Email etiquette[1] (1)
Email etiquette[1] (1)Email etiquette[1] (1)
Email etiquette[1] (1)
 
Gossip girl
Gossip girlGossip girl
Gossip girl
 
Office Etiquette for Employees
Office Etiquette for EmployeesOffice Etiquette for Employees
Office Etiquette for Employees
 
What makes a good employee
What makes a good employeeWhat makes a good employee
What makes a good employee
 
Important Telephone Etiquette Tips
Important Telephone Etiquette TipsImportant Telephone Etiquette Tips
Important Telephone Etiquette Tips
 
Email Etiquette at work
Email Etiquette at workEmail Etiquette at work
Email Etiquette at work
 
Email Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better CommunicationEmail Etiquette: Tips For Better Communication
Email Etiquette: Tips For Better Communication
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Fish philosophy 2
Fish philosophy  2Fish philosophy  2
Fish philosophy 2
 
Advantages and disadvantages of different channels of communication
Advantages and disadvantages of different channels of communicationAdvantages and disadvantages of different channels of communication
Advantages and disadvantages of different channels of communication
 
PSFK Future of Work Report
PSFK Future of Work ReportPSFK Future of Work Report
PSFK Future of Work Report
 

Similar to Online privacy and the librarian

English 1 Essay
English 1 EssayEnglish 1 Essay
English 1 EssayJunXiang97
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In CmcDaywalk3r
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation techabdi rashid
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxjacksnathalie
 
From digital consumption to production and interaction
From digital consumption to production and interactionFrom digital consumption to production and interaction
From digital consumption to production and interactiondavidbrake
 
Iamcr 2010 presentation
Iamcr 2010 presentationIamcr 2010 presentation
Iamcr 2010 presentationdavidbrake
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Computer network and interent
Computer network and interentComputer network and interent
Computer network and interentTUC
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalismvpriddle
 
The Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docxThe Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docxmehek4
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 

Similar to Online privacy and the librarian (16)

English 1 Essay
English 1 EssayEnglish 1 Essay
English 1 Essay
 
ASS3SUM2
ASS3SUM2ASS3SUM2
ASS3SUM2
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In Cmc
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation tech
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Information overload
Information overloadInformation overload
Information overload
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
 
From digital consumption to production and interaction
From digital consumption to production and interactionFrom digital consumption to production and interaction
From digital consumption to production and interaction
 
Iamcr 2010 presentation
Iamcr 2010 presentationIamcr 2010 presentation
Iamcr 2010 presentation
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Computer network and interent
Computer network and interentComputer network and interent
Computer network and interent
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalism
 
The Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docxThe Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docx
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 

Online privacy and the librarian

  • 1. Online Privacy and the Librarian: A Selected Bibliography American Library Association. (2010, May). Online privacy vanishing? Newsletter on Intellectual Freedom, 59(3), 100-101. Online Privacy Vanishing is an ALA article which discusses the problems involved in privacy and technology, particularly technology with social networking. The article states that experts say that even information that doesn't appear to identify a person online can be gathered and reassembled by computers to create a much more complete image of a person than most people would expect, sometimes including the Social Security Number. This article may not be the best choice for younger students, but might be interesting with older teens or college students after building relationships within a class or club. It would also be useful in building a case for media education programming. Gallagher, F. (2011, January/February). Hand in hand: Media literacy and internet safety. Library Media Connection, 29(4), 16,18. Hand in Hand: Media Literacy and Internet Safety is a wonderful article with a laundry list of resources at the end, each and every one worth exploring. Frank Gallagher has made a down-to earth, common sense argument encouraging education for internet safety and, more importantly, responsibility over parental controls. A recent article, this presents the idea that internet safety in the 21st century is less about those who might prey upon youth internet users and more about ethical mistakes that those youth may make, which can follow them for the rest of their lives on the web. This was the best article I have read on this topic.
  • 2. Herring, M. Y. (2010, November). Hacked off in the web. Against the Grain, 40. http://www.against- the-grain.com Caustic, rude, and overly paranoid, Hacked Off in the Web contains little information that one would ever want to use in the internet. What it does is begin with some great statistics and make a strong case for why adults and some teens shouldn't be allowed to go on the internet. I don't agree with this source, but I can see how some might, and the statistics at the beginning really are very useful in making a case for media literacy. Notess, G. R. (2009, July/August). Privacy in the age of the social web. Online, 44(4), 41-43. Privacy in the Age of the Social Web was a terrifying article that I believe every adult who uses the internet regularly should read, but is probably too intense for use with teens. This article discusses many things which can go wrong with private information on the web. The usefulness of this article is in emphasizing the seriousness of our task as Information Professionals in our role as media educators. Read the article, or simply go to www.criminaljusticeusa.com/blog/2009/25-surprising-things-that- google-knows-about-you to see what I mean. Panter, S. L. (2009, May/June). Teaching elementary students to be safe on the internet. Library Media Connect, 27(6), 32-33. In Teaching Elementary Students to be Safe on the Internet, Susan L Panter delivers a practical guide to teaching internet safety to children K-5. She offers a small selection of useful curriculum tools , relevant anecdotes, and applicable, easy to understand rules to help guide young students in learning to navigate the web safely. The three guidelines she provides are as simple as look both ways before crossing the street and don't take candy from strangers. They are simple, but they work.
  • 3. US Census Bureau. (2009). Household internet usage in and outside of the home by selected characteristics [Table 1153-1154]. Retrieved March 21, 2011, from http://www.census.gov/compendia/statab/cats/information_communications/internet_ publishing_and_broadcasting_and_internet_usage.html The US Census Bureau provides information on a variety of data that is useful in making the case for media education in public libraries. This particular sheet shows the prevalence of internet connection in libraries and homes with notes on division between dial-up and broadband. Yates, K. (2009). Reaching out to young people about online privacy-one kid at a time. Feliciter, 55(3), 114-115. This Canadian publication is particularly useful in several ways. First, it has wonderful statistics on YA perceptions of the internet and media usage, if you live in Canada. It also provides tips and concepts that are designed to remind YA users to think about their usage. I particularly like “When doing online surveys or making purchases, question why people want your personal information,” and “Be discreet. Remember—what you post stays online forever”. While not 100% true, these statements do address some commonly held beliefs about the internet that can be damaging to users.