scholarly journals A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

2010 ◽  
Vol 71 (3) ◽  
pp. 254-272 ◽  
Author(s):  
Trina J. Magi

Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics.

Author(s):  
Neil Geddes

We present a brief history of the beginnings, development and achievements of the worldwide Large Hadron Collider Computing Grid (wLCG). The wLCG is a huge international endeavour, which is itself embedded within, and directly influences, a much broader computing and information technology landscape. It is often impossible to identify true cause and effect, and they may appear very different from the different perspectives (e.g. information technology industry or academic researcher). This account is no different. It represents a personal view of the developments over the last two decades and is therefore inevitably biased towards those things in which the author has been personally involved.


Author(s):  
Houssem Gasmi ◽  
Abdelaziz Bouras ◽  
Fadi Ghemri ◽  
Laurent Veillard ◽  
Stéphanie Tralongo ◽  
...  

2011 ◽  
pp. 84-99
Author(s):  
Asim El-Sheikh ◽  
Abdullah Abdali Rashed ◽  
A. Graham Peace

Software piracy costs the information technology industry billions of dollars in lost sales each year. This chapter presents an overview of the software piracy issue, including a review of the ethical principles involved and a summary of the latest research. In order to better illustrate some of the material presented, the results of a small research study in the country of Jordan are presented. The findings indicate that piracy among computer-using professionals is high, and that cost is a significant factor in the decision to pirate. Finally, some potential preventative mechanisms are discussed, in the context of the material presented previously in the chapter.


Sign in / Sign up

Export Citation Format

Share Document