Scholarly Work - Library
Permanent URI for this collectionhttps://scholarworks.montana.edu/handle/1/320
Browse
23 results
Search Results
Item On Ethical Assessment: Locating and Applying the Core Values of Library and Information Science(Association of Research Libraries, 2021) Young, Scott W. H.In this paper, I provide a brief history of the development of values within Library and Information Studies (LIS), drawing on the literature of LIS, sociology, professionalism, value studies, and practical ethics. I begin by tracing the outlines of professional identity as a way of staking out a claim to values. I then turn to the definition and purpose of values, before enumerating the main values present in the LIS literature. Finally, I present an overview of the contemporary conversation and practical applications related to values, focusing on the American Library Association (ALA) Core Values of Librarianship.Item Teaching Privacy Using Learner-Centered Practices in a Credit-Bearing Context(ACRL, 2023) Young, Scott W. H.; Mannheimer, SaraThis chapter describes practices of teaching privacy to undergraduate students in a credit-bearing context. The chapter features a discussion of a semester-long course, Information Ethics and Privacy in the Age of Big Data. This chapter opens by briefly outlining three points of consideration for approaching a semester-long course. We then highlight three assignments from the course that we think are particularly useful and adaptable for teaching privacy. We include excerpts from course materials and student feedback to illustrate specific points. The chapter concludes with a self-reflective assessment of our experience as teachers. We co-taught the course with a pedagogical viewpoint of learner-centered participation and trust, an approach that we have previously discussed in detail. The course was built around reflective and co-creative activities that make space for students to bring their own experiences and perspectives into the classroom, including self-evaluation, student-led discussion sessions, small-group discussions, creative activities, and hands-on projects. We intend for the assignments and topics of this chapter to be used beyond a credit-bearing context. Librarians teach in so many different contexts. With that in mind, we offer points of consideration for adapting our assignments for other settings, like workshops, one-shot instruction, or a sequence of course-embedded instruction to be completed over two or three class sessions.Item Applying Attributes of Contemplative Technopedagogy to a Social Media Assignment(2019-06) Shanks, Justin D.; Young, Scott W. H.With widespread prevalence of digital technology in contemporary higher education, researchers have been keen to identify best practices and understand impacts. Social media present opportunities to cultivate interactive, creative teaching-learning communities. However, inclusion of social media in a course does not necessarily equal deep or creative student engagement. Faculty play an important role in helping students critically and creatively engage with content, colleagues, and context. Utilizing a mixed-methods case study approach, this research explores how contemplative technopedagogy can aid in the development of social media assignments and positively influence student learning. While blogging has been studied as a pedagogical tool, Tumblr has not yet been studied as an educational technology. This research demonstrates how the integration of contemplative technopedagogical attributes can aid faculty in developing social media assignments with contextual awareness that enhance teaching and learning in contemporary higher education.Item No Such Thing as a Free Lunch: Google Analytics and User Privacy(2016) Young, Scott W. H.; OBrien, Patrick; Benedict, KarlPatron privacy is sometimes the price we pay for free services. This trade-off is part of Google Analytics, the free web tracking tool. This session shares research into analytics implementations of DLF institutions, discusses relevant privacy issues, and offers recommendations for enhancing users' web traffic privacy through configuration and education.Item Service Blueprinting: A Method for Assessing Library Technologies within an Interconnected Service Ecosystem(Taylor & Francis, 2019-06) Young, Scott W. H.; Mannheimer, Sara; Rossmann, Doralyn; Swedman, David; Shanks, Justin D.Service blueprinting is a method for designing, assessing, and improving services. This article provides a practical overview of the service blueprinting process for library technology services. We begin by outlining the recent conversation around library technologies, service design, and service blueprinting. We then detail an iterative case study for the creation process of a service blueprint, followed by a discussion of the service insights and improvements that resulted from this activity. We conclude by offering a set of recommendations for creating and analyzing service blueprints. Ultimately, the service blueprint is a useful tool for understanding the operation of a service, and for situating that service within a broader and interconnected library ecosystem.Item A National Forum on Web Privacy and Web Analytics: Action Handbook(Montana State University, May 2019) Young, Scott W. H.; Clark, Jason A.; Mannheimer, Sara; Hinchliffe, Lisa JanickeThis is a practice-oriented action handbook that provides background, resources, and good practices to guide libraries in ethically implementing web analytics with a view towards privacy.This guide contains two main parts, followed by a references section. In Part 1, we detail technical strategies for implementing privacy-aware web analytics. In Part 2, we focus on communication strategies for building support for privacy-aware analytics practices.Item A Roadmap for Achieving Privacy in the Age of Analytics: A White Paper from A National Forum on Web Privacy and Web Analytics(Montana State University, May 2019) Young, Scott W. H.; Mannheimer, Sara; Clark, Jason A.; Hinchliffe, Lisa JanickeA National Forum on Web Privacy and Web Analytics is an IMLS-funded, community-fueled effort to shape a better analytics practice that protects our users’ privacy from unwanted third-party tracking and targeting. The main Forum event was held September 2018 in Bozeman, Montana, where 40 librarians, technologists, and privacy researchers collaborated in producing a practical roadmap for enhancing our analytics practice in support of privacy. Forum participants co-created eight Pathways to Action for enhancing web privacy. Forum activities also informed the development of an Action Handbook that contains practical skills and strategies for implementing privacy-oriented, ethical web analytics in libraries. This white paper provides an overview of the project, with a summary of the Pathways to Action and the Action Handbook. We present these resources to the wider community to remix, reuse, and apply towards action.Item Protecting privacy on the web: A study of HTTPS and Google Analytics(Emerald, 2018-09) OBrien, Patrick; Young, Scott W. H.; Arlitsch, Kenning; Benedict, KarlThe purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites and to discuss the privacy implications of free services that introduce web tracking of users. The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features. Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization. Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses.Item Assessing and Improving Library Technology with Service Blueprinting(2018-07) Young, Scott W. H.; Mannheimer, Sara; Rossmann, Doralyn; Swedman, David; Shanks, Justin D.Objective: The objective of this article is to illustrate the application of service blueprinting—a design tool that comes from the service design tradition—for assessing and improving library technology services. Setting: A mid-sized library at a public university in the western United States. Methods: A service blueprint was co-created by library and IT staff in a design workshop in order to map the operational flow of a data visualization display wall. Results: Guided by the service blueprint, the project team identified points of improvement for the service of the data visualization display wall, and developed recommendations to aid further applications of service blueprinting. Conclusions: Ultimately, service blueprinting was found to be a useful tool that can be applied to assess and improve library technology services.Item Digital Library User Research Data [dataset](Montana State University ScholarWorks, 2017-03) Young, Scott W. H.Hex UX is an integrated method for generating, analyzing, and reporting user experience research data.
- «
- 1 (current)
- 2
- 3
- »