Protecting privacy on the web

2018 ◽  
Vol 42 (6) ◽  
pp. 734-751 ◽  
Author(s):  
Patrick O’Brien ◽  
Scott W.H. Young ◽  
Kenning Arlitsch ◽  
Karl Benedict

Purpose The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users. Design/methodology/approach The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features. Findings Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization. Practical implications Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses. Originality/value Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.

2014 ◽  
Vol 30 (4) ◽  
pp. 15-17 ◽  

Purpose – This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach – This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings – Becoming increasingly reliant on the web as a principal source of finding information is altering our brains and the way that we obtain and hold knowledge. We are becoming less reliant on our memories to hold knowledge, instead using technology – and search engines like Google in particular – to deposit and retrieve information. Practical implications – The paper provides strategic insights and practical thinking that have influenced some of the world's leading organizations. Social implications – The paper provides strategic insights and practical thinking that can have a broader social impact. Originality/value – The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2014 ◽  
Vol 31 (4) ◽  
pp. 10-13 ◽  
Author(s):  
Sharon Q. Yang

Purpose – This study aims to ascertain the trends and changes of how academic libraries market and deliver information literacy (IL) on the web. Design/methodology/approach – The author compares the findings from two separate studies that scanned the Web sites for IL-related activities in 2009 and 2012, respectively. Findings – Academic libraries intensified their efforts to promote and deliver IL on the web between 2009 and 2012. There was a significant increase in IL-related activities on the web in the three-year period. Practical implications – The findings describe the status quo and changes in IL-related activities on the libraries’ Web sites. This information may help librarians to know what they have been doing and if there is space for improvement. Originality/value – This is the only study that spans three years in measuring the progress librarians made in marketing and delivering IL on the Web.


2019 ◽  
Vol 37 (3) ◽  
pp. 566-590 ◽  
Author(s):  
Isabel Mariann Silvis ◽  
Theo J.D. Bothma ◽  
Koos J.W. de Beer

PurposeThe purpose of this paper is to provide an integrated list of heuristics and an information architecture (IA) framework for the heuristic evaluation of the IA of academic library websites as well as an evaluation framework with practical steps on how to conduct the evaluation.Design/methodology/approachA set of 14 heuristics resulted from an integration of existing usability principles from authorities in the field of usability. A review of IA literature resulted in a framework for dividing academic library websites into six dialogue elements. The resulting heuristics were made applicable to academic library websites through the addition of recommendations based on a review of 20 related studies.FindingsThis study provides heuristics, a framework and workflow guidelines that can be used by the various evaluators of academic library websites, i.e. library staff, web developers and usability experts, to provide recommendations for improving its usability.Research limitations/implicationsThe focus of the usability principles is the evaluation of the IA aspects of websites and therefore does not provide insights into accessibility or visual design aspects.Originality/valueThe main problem that is addressed by this study is that there are no clear guidelines on how to apply existing usability principles for the evaluation of the IA of academic library websites.


Kybernetes ◽  
2018 ◽  
Vol 47 (5) ◽  
pp. 854-872 ◽  
Author(s):  
Kaiying Cao ◽  
Qiushi Bo ◽  
Yi He

Purpose This paper aims to study whether the recycling of a third party competes with the trade-in service of a manufacturer, and explores the optimal trade-in and third-party collection authorization strategies for the manufacturer. Design/methodology/approach According to whether to authorize a third party to collect its used products, the manufacturer has two choices: one is not authorization (NA); the other is authorization (A). This paper uses profit-maximization model to investigate the optimal decisions of the manufacturer and the third party under NA and A, respectively, and then explores which choice is better for the manufacturer. Findings It is observed that there is a competition between trade-in service and third-party recycling when the durability parameter of the used product is relatively small. Moreover, when the durability parameter of the used product is relatively large, A is always better choice for the manufacturer; otherwise, NA is a better choice except for the case that the unit trade-in subsidy is low and the salvage of the used product is high. Practical implications These results provide managerial insights for the manufacturer and the third party to make decisions in the field of recycling. Originality/value This paper is among the first papers to study the competition between trade-in program and third party’s collecting program under government’s trade-in subsidy policy. Moreover, this paper presents the conditions under which the manufacturer should authorize or not authorize the third party to collect its used products.


2020 ◽  
Vol 123 (1) ◽  
pp. 159-175
Author(s):  
Alberto Mazzoleni ◽  
Enrica Pollonini

PurposeWe developed a model to demonstrate how multiple interrelated aspects of a firm influence its recourse to third-party financing, which frequently depends on the characteristics of each food production chain.Design/methodology/approachWe conducted an empirical research on a relevant sample of small- and medium-sized Italian dairy firms. Our research methodology is inspired by the grounded theory (Glaser and Strauss, 1967).FindingsOur findings illustrated that firm indebtedness is the result of intertwined variables, linked to different firm dimensions, including growth, financial structure and economic dynamics.Research limitations/implicationsA portion of the analysed phenomenon is not explained using the sample and econometric tools.Practical implicationsThere are practical implications for the decision-makers in a firm (in particular, the managers and the shareholders) as the model allows to evaluate the influence of a set of mutually interdependent firm variables for the indebtedness level.Originality/valueFirst, we considered the recourse to third-party financing within the context of the systems theory (Millová and Blatný, 2015) and from the perspective of linked causes and mutually connected variables. Second, our research focussed on a well-defined food chain and on features of firms operating in this context. Last, our model considered the impact of the recent economic crisis, which motivated us to review the existing models.


2018 ◽  
Vol 34 (2) ◽  
pp. 91-100
Author(s):  
Wendy Walker ◽  
Teressa Keenan

Purpose The purpose of this paper is to describe methods for restructuring workflows and efficiently using staff members and volunteers to continue work on multiple, simultaneous digital collections as budgets and resources decline. Design/methodology/approach This paper describes one library’s varied approaches to several digital collections supported by literature or volunteers in libraries. Findings In the face of continually declining resources and new, time-sensitive priorities and compliance responsibilities, librarians can continue to maintain digital collections by modifying workflows, using the services of volunteers and communicating strategically. Practical implications This paper is relevant to librarians, archivists and others who are looking for ways to justify and capitalize on the use of unconventional personnel in digital collections programs. Originality/value This paper presents a case of the successful use of volunteers to accomplish digital collections-related tasks in an academic library and provides a communication-based strategy for addressing some of the challenges related to volunteers in academic libraries.


2020 ◽  
Vol 48 (3) ◽  
pp. 353-371
Author(s):  
Mandi Goodsett

Purpose The purpose of this study is to demonstrate how an academic library can use a library-led, public, positive, and broad faculty gratitude campaign to help a campus embrace a culture of open education. Design/methodology/approach Using a literature review of faculty outreach efforts in the area of open education and an examination of the psychology of persuasion, this library developed a gratitude campaign that consisted of a faculty video, letters from the provost, signed cards from students, door hangers, and the delivery of swag bags to faculty offices. Findings While it is challenging to assess how much an initiative may have changed campus culture, initial responses to the gratitude campaign have been overwhelmingly positive. In addition, it cost little or nothing to develop the campaign and materials can be reused in future events and initiatives. Practical implications Changing campus culture, maintaining momentum in a program with limited funding, and reaching reluctant faculty are all challenges for open education initiatives. Initiating a gratitude campaign can begin to address all of these by being public, positive, and inclusive. This case study describes how a campus could adopt any or all of the gratitude campaign strategies and it includes openly licensed examples, templates, and models for readers to use. Originality/value Open education and affordability efforts that use presentations, grant programs, and awards are common on academic campuses. However, when funding is tight or these efforts fail to reach new audiences, a gratitude campaign can make inroads where these traditional efforts are limited.


2019 ◽  
Vol 40 (8/9) ◽  
pp. 558-569 ◽  
Author(s):  
Carina Rey Martin ◽  
Concepción Rodriguez Parada ◽  
Enric Camón Luis

Purpose The purpose of this paper is to analyse the level of transparency of the libraries of Catalan universities that are members of the Consortium of University Services of Catalonia (CSUC). Design/methodology/approach The analysis involved reviewing the information available on the websites of the ten libraries belonging to CSUC. For each library’s website, the presence of 18 indicators was explored. These indicators had been defined by the Commitment and Transparency Foundation (Spain). Findings There is a notable difference between the level of transparency of Catalan universities and their libraries. Moreover, the universities’ culture of transparency is not reflected in that of the libraries. Four of the libraries can be considered transparent because they have accomplished from 12 to 18 indicators; three can be considered “translucent”, due to their indicators ranging from 11 to 7 points; and three are considered opaque as a result of obtaining from 1 to 5 indicators. Practical implications There is a need to review the volume and quality of information that can be consulted on library websites, considering that all services and entities funded with public money must inform citizens of the principles that govern their management and the results obtained. Originality/value The information regarding transparency is incomplete and should be organised with parameters that make it easier to find. Libraries that occupy the lowest positions in the ranking all belong to private universities. Their poor results are due to the lack of information justifying their management or providing information on how the service is organised. Some conclusions of this study are very similar to those of the study on Madrid’s Madroño Consortium (Pacios Lozano, 2016) which has been taken into account in this paper.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hedaia-t-Allah Nabil Abd Al Ghaffar

Purpose The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs. Design/methodology/approach The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage. Findings The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries. Practical implications Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns. Originality/value The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.


2020 ◽  
Vol 38 (3) ◽  
pp. 477-492
Author(s):  
Mahdi Zeynali Tazehkandi ◽  
Mohsen Nowkarizi

Purpose The purpose of this paper is to present a review on the use of the recall metric for evaluating information retrieval systems, especially search engines. Design/methodology/approach This paper investigates different researchers’ views about recall metrics. Findings Five different definitions for recall were identified. For the first group, recall refers to completeness, but it does not specify where all the relevant documents are located. For the second group, recall refers to retrieving all the relevant documents from the collection. However, it seems that the term “collection” is ambiguous. For the third group (first approach), collection means the index of search engines and, for the fourth group (second approach), collection refers to the Web. For the fifth group (third approach), ranking of the retrieved documents should also be accounted for in calculating recall. Practical implications It can be said that in the first, second and third approaches, the components of the retrieval algorithm, the retrieval algorithm and crawler, and the retrieval algorithm and crawler and ranker, respectively, are evaluated. To determine the effectiveness of search engines for the use of users, it is better to use the third approach in recall measurement. Originality/value The value of this paper is to collect, identify and analyse literature that is used in recall. In addition, different views of researchers about recall are identified.


Sign in / Sign up

Export Citation Format

Share Document