Abstract
As sensitive transactions continue to move online, public libraries are becoming a critical resource to patrons without access to the internet. This paper shares insights on how library staff negotiate privacy risks when working with patrons handling sensitive and private information. Based on findings from an analysis of library policies on technology use, as well as focus groups and participatory design sessions with library staff from around the United States, we categorize primary risks patrons face when using library computers to complete information tasks requiring submission of sensitive information, as well as how library staff navigate the tensions between their professional values and privacy concerns. We conclude the paper with a discussion of how these findings are informing our development of a framework that library staff can use to navigate privacy risks patrons face.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
A privacy audit is often the first step in creating or revising a privacy policy. It evaluates current policies and practices in the library and can reveal strengths and weaknesses of existing policies and library culture.
References
Mobile Technology and Home Broadband 2019. https://www.pewinternet.org/2019/06/13/mobile-technology-and-home-broadband-2019/. Accessed 16 Sept 2019
Altman, I.: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks/Cole Publishing Co., Monterey (1975)
Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
Vitak, J., Liao, Y., Kumar, P., Subramaniam, M.: Librarians as information intermediaries: navigating tensions between being helpful and being liable. In: Chowdhury, G., McLeod, J., Gillet, V., Willett, P. (eds.) iConference 2018. LNCS, vol. 10766, pp. 693–702. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78105-1_80
Privacy Tool Kit. http://www.ala.org/advocacy/privacy/toolkit. Accessed 15 Sept 2019
Library Privacy Guidelines. http://www.ala.org/advocacy/privacy/guidelines. Accessed 07 Sept 2019
Library Privacy Checklists. http://www.ala.org/advocacy/privacy/checklists. Accessed 07 Sept 2019
Pekala, S.: Privacy and user experience in 21st century library discovery. Inf. Technol. Libr. 36(2), 48–58 (2017). https://doi.org/10.6017/ital.v36i2.9817
Houghton, S.: The challenge of balancing customer service with privacy. J. Intell. Freedom Privacy 4(1), 8–9 (2019)
Klinefelter, A.: Privacy and library public services: or, I know what you read last summer. Legal Ref. Serv. Q. 26(1–2), 253–279 (2007). https://doi.org/10.1300/J113v26n01_13
Core Values of Librarianship. http://www.ala.org/advocacy/intfreedom/corevalues. Accessed 07 Sept 2019
Bonsignore, E., et al.: Embedding participatory design into designs for learning: an untapped interdisciplinary resource. In: CSCL 2013 (2013)
Thompson, K.M., Jaeger, P.T., Taylor, N.G., Subramaniam, M., Bertot, J.C.: Digital Literacy and Digital Inclusion: Information Policy and the Public Library. Rowman & Littlefield, Lanham (2014)
Gomez, R., Gould, E.: The “cool factor” of public access to ICT: Users’ perceptions of trust in libraries, telecentres and cybercafés in developing countries. Inf. Technol. People 23, 247–264 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Morehouse, S., Vitak, J., Subramaniam, M., Liao, Y. (2020). Creating a Library Privacy Policy by Focusing on Patron Interactions. In: Sundqvist, A., Berget, G., Nolin, J., Skjerdingstad, K. (eds) Sustainable Digital Communities. iConference 2020. Lecture Notes in Computer Science(), vol 12051. Springer, Cham. https://doi.org/10.1007/978-3-030-43687-2_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-43687-2_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43686-5
Online ISBN: 978-3-030-43687-2
eBook Packages: Computer ScienceComputer Science (R0)