717
Views
4
CrossRef citations to date
0
Altmetric
posIT Russell Michalak and Monica D.T. Rysavy, Column Editors

Data Privacy and Academic Libraries: Non-PII, PII, and Librarians’ Reflections (Part 1)

&

REFERENCES

  • Beckstrom, M., & Jones, B. (2015). Protecting patron privacy: Safe practices for public computers. Santa Barbara, CA: Libraries Unlimited.
  • Belanger, J., Faber, M., & Oakleaf, M. (2018). Three thousand library users can’t be wrong: Demonstrating library impact using one open-ended survey. In M. Britto & K. Kinsley (Eds.), Academic libraries and the academy: Strategies and approaches to demonstrate your value, impact, and return on investment (pp. 151–160). Chicago, IL: Association of College and Research Libraries.
  • Conyers, A., Lambert, J., Wong, L., Jones, H, Bamkin, M, & Dalton, P. (2017). E-book usage: Counting the challenges and opportunities. Insights: UKSG, 30(2), 25. doi:10.1629/uksg.370
  • Dempsey, L. (2016, January 31). The facilitated collection. Lorcan Dempsey’s Weblog, Retrieved from http://orweblog.oclc.org/towards-the-facilitated-collection/
  • Hulbert, L., Roach, D., & Julian, G. (2011). Integrating usage statistics into collection development decisions. Serials Librarian, 60(1–4), 158–163. doi:10.1080/0361526X.2011.556027
  • Kohn, K. (2018). Using logistic regression to examine multiple factors related to e-book use. Library Resources & Technical Services, 62(2), 54–65. doi:10.5860/lrts.62n2.54
  • Kinman, V. (2009). E-metrics and library assessment in action. Journal of Electronic Resources Librarianship, 21(1), 15–36. doi:10.1080/19411260902858318
  • Levine-Clark, M., Paulson, K., & Moeller, P. (2015). 10,000 Libraries, 4 years: A large-scale study of e-book usage and how you can use the data to move forward. Serials Librarian, 68(1–4), 262–268. doi:10.1080/0361526X.2015.1017709
  • Linden, J., Tudesco, S., & Dollar, D. (2018). Collections as a service: A research library’s perspective. College & Research Libraries, 79(1), 97. doi:10.5860/crl.79.1.86
  • Littman, J., & Connaway, L. (2004). A circulation analysis of print books and e-books in an academic research library. Library Resources and Technical Services, 48, 256.
  • Luzius, J. (2005). A look at circulation statistics. Journal of Access Services, 2(4), 16. doi:10.1300/J204v02n04_03.
  • Martell, C. R. (2005). The ubiquitous user: A reexamination of Carlson’s deserted library. Portal: Libraries and the Academy, 5(4), 441–453. Retrieved from https://muse.jhu.edu/.
  • Michalak, R., & Rysavy, M. D. T. (2019). Assessing library customer interactions and staff satisfaction. Journal of Library Administration, 59(3), 314–324. doi:10.1080/01930826.2019.1583020
  • Michalak, R., Rysavy, M. D. T., Dawes, T. A., & Daly, B. (2018). Are they finding what they are looking for? An analysis of two years of customer EDS searches compared to full-text downloads. Austin, TX: ER&L. Retrieved from https://sched.co/CrgV
  • Morrisey, L. (2010). Data-driven decision making in electronic collection development. Journal of Library Administration, 50(3), 283–290. doi:10.1080/01930821003635010
  • Murray, T. E. (2013). How much is a special library worth? Valuing and communicating information in an organizational context. Journal of Library Administration, 53(7–8), 462–471. doi:10.1080/01930826.2013.882200
  • Newman, B. L., & Tijerina, B. (2017). Introduction. In B. Newman & B. Tijerina (Eds.), Protecting patron privacy (p. 1). Lanham, MD: Roman & Littlefield.
  • Pesch, O. (2007). Usage statistics: About COUNTER and SUSHI. Information Services & Use, 27(4), 207–213. doi:10.3233/ISU-2007-27412
  • Regazzi, J. J. (2012). Constrained? an analysis of U.S. Academic library shifts in spending, staffing, and utilization, 1998–2008. College & Research Libraries, 73(5), 463. doi:10.5860/crl-260
  • Shelburne, W. A. (2009). E-book usage in an academic library: User attitudes and behaviors. Library Collections, Acquisitions, & Technical Services, 33(2–3), 59–72. doi:10.1080/14649055.2009.10766234
  • Sweeney, M., & Lubowicka, K. (2018). What is PII, non-PII, and personal data? Retrieved from https://piwik.pro/blog/what-is-pii-personal-data/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.