notes on a discussion regarding the use of third party applications in academic settings and the hurdles faculty needs to overcome in terms of standards and policies
1. THEVIRTUALITY OF
PRIVACY AND SECURITY
ONTHE MODERN CAMPUS:
the privacy and security issues of the “third-
party software” teaching and learning
Privacy & Security inToday’s Library by Amigos Library Services
http://www.amigos.org
September 21, 2017
Plamen Miltenoff, Ph.D., MLIS, @SCSUtechinstruc, https://www.facebook.com/InforMediaServices/
@AmigosLibServ @SCSUtechinstruc #facultytechnology #edtech #libtech #privacy #security
2. Plan
■ Working definition regarding “privacy” in academic environment
■ Working definition regarding “security” in academic environment
■ Discuss the balance between usage of institutionally-sanctioned and “third-party”
applications
– Advantages
– Disadvantages
■ Privacy
■ Security
■ Seeking the middle ground
https://www.pinterest.com/pin/528258231275219231/
3. Privacy and security – the American way
A study was released recently about the
thingsAmericans fear the most. It includes
literally everything.Terrorism and identity
theft. Corrupt companies and financial ruin.
Tornadoes and adultery.
From
http://www.spiegel.de/international/world/
what-two-years-of-living-in-america-
taught-me-a-1165557.html
FollowingAlexis deTocqueville
4. Privacy
■ Internet privacy involves the right or mandate of personal privacy concerning the
storing, repurposing, provision to third parties, and displaying of information
pertaining to oneself via of the Internet.[1][2] Internet privacy is a subset of data privacy.
https://en.wikipedia.org/wiki/Internet_privacy
http://hightechforum.org/life-liberty-pursuit-privacy/
■ ALA | Privacy Many states provide guarantees of
privacy in their constitutions and statute law.
Numerous decisions in case law have defined and
extended rights to privacy. ... Protecting user
privacy and confidentiality has long been an
integral part of the mission of libraries.
http://www.ala.org/Template.cfm?Section=interp
retations&Template=/ContentManagement/Cont
entDisplay.cfm&ContentID=34182
5. Security
■ Definition - What does Internet Security mean?
Internet security is a catch-all term for a very broad issue
covering security for transactions made over the Internet.
Generally, Internet security encompasses browser security, the
security of data entered through aWeb form, and overall
authentication and protection of data sent via Internet
Protocol.
https://www.techopedia.com/definition/23548/internet-
security
6. The role of the library in teaching with
technology unsupported by campus IT
the privacy and security issues of the “third-party software” teaching and learning
■ Why third party applications? (Adobe Connect pole)
– Pros
– Cons
■ Your preference: (Adobe Connect pole)
– Would you use (teach/learn) with standardized tools
– Would you outsource
■ Word of the day: #AppSmashing:
http://blog.stcloudstate.edu/ims/2017/06/22/app-smashing/
7. Campus reality: faculty
■ Moreover, research has shown that faculty regard online teaching as more difficult and
intensive than teaching traditional courses (Gerlich, 2005;Wegmann, and McCauley,
2008).They found that faculty believed online courses were to be more difficult to
teach because of workload increases due to more interaction with students, grading
paper, designing assignments, and assessments.This resulted in being overwhelmed
with stress, which lead to anger. Similarly, Sellani and Harrington (2002) found that
faculty became overwhelmed with designing online courses and their other demands
as faculty including research and service commitments interfered and cause
workplace stress… Lack of adequate technology led to feelings of anxiety, stress, and
anger associated with online learning and technology.
Kidd,T, Morris, L. (2017). Handbook of Research on Instructional
Systems and EducationalTechnology. IGI Global
8. Campus IT and technology
standartization
http://www.sandiego.edu/its/support/hardware/why-standardize.php
■ Why Standardize?
■ Why is this important?
– Cost value
– Compatibility
– Time savings
– Support
– Support costs
– Asset tracking
AdobeConnect survey:
Technology standardization:
– Yes
– No
– Indifferent
9. “Third-party” versus standartization
■ The increasing use of third-party logistics providers is a part of general
trend toward an emphasis on market rather than hierarchies to
accomplish corporate goals.
Lewis, I.,Talalayevsky,A. (2000). Journal Of Business Logistics, 21(2), pp.
173-186.
■ The model was tested using data from a survey of 335 firms. Results
indicate that uncertainty is the major deterrent to outsourcing, while
the level of technical skills is the most important reason to outsource.
Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT
outsourcing. Information & Management, 41(7), 921–932.
https://doi.org/10.1016/j.im.2003.09.001
10. Issues with “third-party”
■ Privacy and security
– FERPA
FERPA AND CAMPUS SAFETY: http://www.irb.vt.edu/documents/ferpa.pdf
– does campus IT support of third party
11. Is there a middle ground?
■ Between a “stagnant” standardization
And
■ Third-party perils
Where/what is the balance between safeguarding
privacy on campus and fostering security without
stifling innovation and creativity?
Can the library be the campus hub for education
about privacy and security, the sandbox for testing
and innovation and the body to expedite decision-
making?