University Library, University of Illinois at Urbana-Champaign

The items in the Digital Collections of the University of Illinois Urbana-Champaign Library contain materials which represent or depict sensitive topics or were written from perspectives using outdated or biased language. The Library condemns discrimination and hatred on any grounds. As a research library that supports the mission and values of this land grant institution, it is incumbent upon the University Library to preserve, describe, and provide access to materials to accurately document our past, support learning about it, and effect change in the present. In accordance with the American Library Association’s Freedom to Read statement, we do not censor our materials or prevent patrons from accessing them.

If you have questions regarding this statement or any content in the Library’s digital collections, please contact digitalcollections@lists.illinois.edu

American Library Association’s Freedom to Read Statement

Diversity, Equity, Inclusion and Accessibility at the University Library
Service
Creator
Subject
Repository
Showing 641–680 of 54,797 items
  • Hoya, 25 April 1975 - Page 17
    Digitized Newspapers
    Date
    1975
  • The Evolution of Privacy within the American Library Association, 1906–2002
    Scholarship
    Creator
    Witt, Steve
    Description
    From fears of anarchist terrorists in the early twentieth century through cold war conflict and contemporary fears of extremist religious terrorists, the American library community responded to the use of libraries as a site for surveillance and source of dangerous information in an increasingly proactive and organized manner. This paper traces the evolution of privacy norms and standards within the American library profession, focusing on the lack of regard for patron confidentiality in the early twentieth century, the development of privacy norms in the American Library Association (ALA) Code of Ethics in 1938, and the increased protection of privacy rights as the profession’s conceptions of privacy formed around the ALA’s codes. Using Nissenbaum’s (2009) “contextual integrity” framework within a broad historical analysis of ALA publications, the paper examines the role of its codes regarding privacy in establishing a normative framework around which the continued application of privacy standards in libraries has taken place despite new technological challenges and continued pressure from governments and outside organizations to exploit patron information. The paper concludes that the ALA’s unambiguous stance on, and consistent advocacy for, privacy standards across the profession has enabled reactions to violations of privacy norms that have shifted with technologies and new social pressures. The ALA’s historic ability to maintain and protect these professional standards serves as a compelling model for new information professions that work to set professional standards in areas that range from data-analytics to social networking.
  • Security threats to the MAC-layer in wireless networks
    Scholarship
    Creator
    Choi, Jihyuk
    Date
    2012
    Description
    Medium access control (MAC) protocol security is important in wireless networks due to the lack of physical access control that normally exists in wired networks in the form of connecting a cable. Most efforts in standards organizations and academic research focus on the requirements of confidentiality and authentication. These approaches to wireless MAC-layer security often ignore two other threats to security: attacks against availability and incorrect implementation of MAC protocol and driver routines. The former can prevent a user from communicating at all, whereas the latter can have consequences ranging from dropped packets to complete host compromise. This dissertation comprehensively investigates the threats against wireless MAC protocols: being uncooperative, denial-of-service (DoS), sniffing, man-in-the-middle (MITM), and fuzzing. I provide a mathematical model to understand how network parameters impact the uncooperative carrier-sense-misbehaving attackers. Next, this dissertation shows a novel DoS attack that targets queuing behavior of access points by exploiting some factors of the IEEE 802.11 MAC protocol. Further, I propose a scheme that establishes a wireless connection that is secure against sniffing and MITM between a client device and an access point in IEEE 802.11 hotspots. Finally, I propose MAC-layer threats including fuzzing in IEEE 802.16e mobile WiMAX networks.
  • Seeking Information Online: A Study of Interpersonal Interactions on an Online College Review Forum
    Scholarship
    Creator
    Taylor, Kaitlyn
    Description
    Online review and discussion forums are a popular way consumers seek information about products, vacation destinations, and restaurants. They provide consumers with the unique opportunity to bypass the voice of the expert or company owner. The increasingly high-stakes and ambiguous U.S. college admissions process leads prospective college students and parents to utilize college review forums to ask questions and seek information from peers, current college students, and even admissions counselors online. These conversations can often be characterized as brutally honest and subject to scrutiny but are viewed by thousands of users like those found on College Confidential. Although current communication studies have examined the impact product and restaurant reviews have on their viewers, research has not analyzed the impact of the information presented in a high-stakes setting like the college search and selection process. To study the types of questions and information users share online, as well as response patterns and credential disclosure, I performed a content analysis of 48 conversation threads from a popular online college review forum. Results found that while most of the requests for information came from prospective college students, the majority of users who provided information supplied no information by which to be identified. I conclude that information produced by anonymous users online is apparently trusted to a greater degree than one might think, although users successfully provide requested information.
  • Conflicting Values: An Exploration of the Tensions between Learning Analytics and Academic Librarianship
    Scholarship
    Creator
    • Brundin, Michael R.
    • Oliphant, Tami
    Description
    The prevailing rhetoric concerning learning analytics is that its use will support the educational endeavor and make significant improvements to teaching and learning. For academic libraries, learning analytics presents the possibility of using library data to coordinate, integrate, and align with the goals of the institutions in which they are embedded. While libraries have a long history of collecting data to support various service and learning objectives, those data have typically been siloed, de-identified, private, and confidential. Although there are positive contributions that learning analytics can make to the learning process, there are concerns associated with its use, particularly the tensions between the objectives of learning analytics contrasted with different conceptualizations of learners and the values of education and librarianship. Institutions of higher education use learning analytics to achieve institutionally defined goals and outcomes for students, which creates tensions with the enshrined values of the American Library Association's Code of Ethics, Library Bill of Rights, and Core Competencies of Librarianship. The transcendent benefits to society that are inherent in education and academic librarianship, such as the rights and responsibilities of citizenship, are not measurable through learning analytics.
  • Social networking: security, privacy, and applications
    Scholarship
    Creator
    Jahid, Sonia
    Date
    2013
    Description
    Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of information including personal profiles, pictures, and messages to socialize with their friends in the Internet. Besides, several special purpose social networks have emerged to serve their users with useful functionalities. This vast amount of user data is valuable, and therefore, introduce several security and privacy risks and challenges. In this thesis we propose several techniques to enhance the security and privacy features of online social networks. Our goal is to shift the control over user data from a centralized social network provider to the end users. We realize this concept by decentralization of the social networking architecture. First, we construct and implement a cryptographic access control mechanism that ensures data confidentiality and integrity, and efficiently supports the fine-grained access policies expected by social network users. Next, we present a detailed design of a decentralized online social network that focuses on security and privacy. Finally, we propose and implement auditable anonymity, a cryptographic scheme, which allows a social networking user to keep track of who accesses her data even when her data is encrypted and decentralized, without revealing this information to the storage provider.
  • Why a Women's Center? I
    Scholarship
    Creator
    Nitzsche Green, Rebecca
    Description
    Control of space, particularly at the University of Illinois, influences the movement of the human body and the resources the University provides for the student body. The current Office of Women’s Programs provides a large variety of services to the UIUC student body. However, in order to address all components of women’s needs as well as issues of gender inequity, a Women’s Center is necessary on campus. This study attempts to determine the overall student body awareness of the services provided by the Office of Women’s Programs and the limitations that affect the expansion of the OWP to a Women’s Center. Three interviews with OWP personnel, an observation of the OWP setting, an observation of an OWP event, two campus surveys, and archival research were conducted to obtain the results. An analysis of the data yielded that a lack of physical space, personnel, programming, and resources exists at the OWP. The funding and promotional work for a Women’s Center is deficient on campus. The student body awareness of the OWP is minimal. One of thirty-three undergraduate students had knowledge of the OWP. The expansion of the OWP into a Women’s Center is a powerful step towards offering the UIUC student body a confidential and controlled physical space in an environment where sex as a cultural marker is expanding. This study provides preliminary information on the status quo of the OWP and reasons for expansion, which will contribute to future research on similar topics.