Open Access Open Access  Restricted Access Subscription Access

Librarians’ Mental Models and Use of Privacy-Protection Technologies

Monica Maceli

Abstract


Libraries of all kinds are uniquely positioned to educate and advocate for the use of privacy-protection technologies (PPT) by our patrons and in our communities; this naturally extends our decades-long mission to protect our patrons’ privacy in both digital and physical library environments. In pursuit of building an understanding of the challenges to expanding such work, this research study assesses librarians’ existing technical knowledge of the internet’s function, and their current use and understanding of a series of popular PPT. This research study begins to close the gap in research by building our knowledge of practicing librarians’ underlying assumptions about the function of the internet and how these internal models are employed in their understanding and use of PPT. Research study participants were asked to draw and explain their perception of the functioning of the internet, to use several PPT, and to explain the protections afforded by each technology. The findings indicate that participants maintained inaccurate mental models of the internet and PPT, leading to difficulties in understanding function, and that they struggled with organizational and technical barriers to integrating such technologies into their daily lives.


Full Text:

HTML PDF

References


American Library Association, Office for Intellectual Freedom. 2014. “Privacy Tool Kit.” Accessed December 10, 2018. http://www.ala.org/advocacy/privacy/toolkit.

Bashir, Masooda, Carol Hayes, April D. Lambert, and Jay P. Kesan. 2015. “Online privacy and informed consent: The dilemma of information asymmetry.” Proceedings of the Association for Information Science and Technology 50, no. 1: 1-10. https://doi.org/10.1002/pra2.2015.145052010043.

Bielefield, Arlene and Lawrence Cheeseman. 1994. Maintaining the privacy of library records: A handbook and guide. New York: Neal-Schuman Publishers.

Bergmann, Mike. 2009. “Testing privacy awareness.” The Future of Identity in the Information Society, IFIP Advances in Information and Communication Technology 298: 237-253.

Borgman, Christine L. 1986. “The user’s mental model of an information-retrieval system: An experiment on a prototype online catalog.” International Journal of Man–Machine Studies 24, no. 1: 47–64.

Burke, John. 2016. “Survey says…: How library staff members are using technologies.” In Neal-Schuman Library Technology Companion, Fifth Edition: A Basic Guide for Library Staff, 5th edition, edited by John J. Burke, 15-30. Chicago: Neal-Schuman Publishers.

DuckDuckGo. 2018. “About DuckDuckGo.” Accessed November 29, 2018. https://duckduckgo.com/about.

Fortier, Alexandre and Jacquelyn Burkell. 2015. “Hidden online surveillance: What librarians should know to protect their own privacy and that of their patrons.” Information Technology & Libraries 43, no. 3: 59-72.

Ghostery. 2018. “About Ghostery.” Accessed October 21, 2018. https://www.ghostery.com/about-ghostery/.

Holman, Lucy. 2011. “Millennial students’ mental models of search: Implications for academic librarians and database developers.” The Journal of Academic Librarianship 37, no. 1: 19-27.

Kang, Ruogu, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “‘My data just goes everywhere:’ User mental models of the internet and implications for privacy and security.” In Symposium on Usable Privacy and Security (SOUPS), 39-52. Berkeley, CA: USENIX Association.

Levin, James A., Matthew J. Stuve, and Michael J. Jacobson. 1999. “Teachers’ Conceptions of the Internet and the World Wide Web: A Representational Toolkit as a Model of Expertise.” Journal of Educational Computing Research 21, no. 1 (July 1999): 1–23. doi:10.2190/KV7J-PVAG-2WWM-TTWJ.

Library Freedom Project. 2018. “Library Freedom Project - Making real the promise of intellectual freedom in libraries.” Accessed on December 17, 2018. https://libraryfreedomproject.org/.

Maceli, Monica. 2018. “Encouraging patron adoption of privacy-protection technologies: Challenges for public libraries.” IFLA Journal – Special Issue on Privacy 44, no. 2: 195-202. https://doi.org/10.1177/0340035218773786.

Maceli, Monica and John J. Burke. 2016. “Technology skills in the workplace: Information professionals’ current use and future aspirations.” Information Technology and Libraries 35, no. 4: 35-62.

Macrina, Alison. 2015. “The Tor browser and intellectual freedom in the digital age.” Reference & User Services Quarterly 54, no. 4: 17-20.

Madden, Mary. 2014. “Public perceptions of privacy and security in the post-Snowden era.” Last modified November 12, 2014. http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/.

Madden, Mary and Lee Rainie. 2015. “Americans’ attitudes about privacy, security and surveillance.” Last modified May 20, 2015. http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/.

Makri, Stephann, Ann Blandford, Jeremy Gow, Jon Rimmer, Claire Warwick, and George Buchanan. 2007. “A library or just another information resource? A case study of users’ mental models of traditional and digital libraries.” Journal of the American Society for Information Science and Technology 58, no. 3: 433–445.

Malandrino, Delfina, Vittorio Scarano, and Raffaele Spinelli. 2013. How increased awareness can impact attitudes and behaviors toward online privacy protection. In Proceedings of the 2013 International Conference on Social Computing, 57-62. Washington, DC: IEEE Computer Society.

Murray, Peter E. 2003. Library patron privacy: SPEC kit. Washington, D.C.: Association of Research Libraries, Office of Leadership and Management Services.

Norman, Donald A. 1983. “Some observations on mental models.” In Mental models, edited by Dedre Gentner and Albert L. Stevens, 7–14. New York: Psychology Press.

Papastergiou, Marina. 2005. “Students’ mental models of the Internet and their didactical exploitation in informatics education.” Education and Information Technology, 10, no. 4: 341–360.

Schaub, Florian, Aditya Marella, Pranshu Kalvani, Blase Ur, Chao Pan, Emily Forney, and Lorrie Faith Cranor. 2016. “Watching them watching me: Browser extensions’ impact on user privacy awareness and concern.” In NDSS Workshop on Usable Security. San Diego, California: Internet Society.

Sheeran, Louise, M. A. Sasse, Jon Rimmer, and Ian Wakeman. 2000. “Back to basics: Is a better understanding of the Internet a precursor for effective use of the Web?” In Proceedings of the 1st Nordic Conference on Computer Human Interaction. Stockholm.

Thatcher, Andrew, and Mike Greyling. 1998. “Mental models of the Internet.” International Journal of Industrial Ergonomics 22, no. 4–5: 299–305.

Trepte, Sabine, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer, Alisa Hennhöfer, and Fabienne Lind. 2015. “Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS).” In Reforming European data protection law, 333-365. Netherlands: Springer.

Wash, Rick. 2010. “Folk models of home computer security.” In Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-16. New York, NY: ACM.

Wissinger, Christina L. 2017. “Privacy literacy: From theory to practice.” Communications in Information Literacy 11, no. 2:378-389.

Woodward, Jeannette A. 2007. What every librarian should know about electronic privacy. Westport: Libraries Unlimited.

Zhang, Yan. 2008a. “The influence of mental models on undergraduate students’ searching behavior on the Web.” Information Processing & Management, 44, no. 3: 1330-1345.

Zhang, Yan. 2008b. “Undergraduate students' mental models of the Web as an information retrieval system.” Journal of the American Society for Information Science and Technology 59, no. 13: 2087-2098.




DOI: https://doi.org/10.5860/jifp.v4i1.6907

Refbacks

  • There are currently no refbacks.


ALA Privacy Policy

© 2019 OIF