University Library, University of Illinois at Urbana-Champaign

The items in the Digital Collections of the University of Illinois Urbana-Champaign Library contain materials which represent or depict sensitive topics or were written from perspectives using outdated or biased language. The Library condemns discrimination and hatred on any grounds. As a research library that supports the mission and values of this land grant institution, it is incumbent upon the University Library to preserve, describe, and provide access to materials to accurately document our past, support learning about it, and effect change in the present. In accordance with the American Library Association’s Freedom to Read statement, we do not censor our materials or prevent patrons from accessing them.

If you have questions regarding this statement or any content in the Library’s digital collections, please contact digitalcollections@lists.illinois.edu

American Library Association’s Freedom to Read Statement

Diversity, Equity, Inclusion and Accessibility at the University Library
Service
Creator
Subject
Repository
Showing 681–720 of 54,802 items
  • Why a Women's Center? I
    Scholarship
    Creator
    Nitzsche Green, Rebecca
    Description
    Control of space, particularly at the University of Illinois, influences the movement of the human body and the resources the University provides for the student body. The current Office of Women’s Programs provides a large variety of services to the UIUC student body. However, in order to address all components of women’s needs as well as issues of gender inequity, a Women’s Center is necessary on campus. This study attempts to determine the overall student body awareness of the services provided by the Office of Women’s Programs and the limitations that affect the expansion of the OWP to a Women’s Center. Three interviews with OWP personnel, an observation of the OWP setting, an observation of an OWP event, two campus surveys, and archival research were conducted to obtain the results. An analysis of the data yielded that a lack of physical space, personnel, programming, and resources exists at the OWP. The funding and promotional work for a Women’s Center is deficient on campus. The student body awareness of the OWP is minimal. One of thirty-three undergraduate students had knowledge of the OWP. The expansion of the OWP into a Women’s Center is a powerful step towards offering the UIUC student body a confidential and controlled physical space in an environment where sex as a cultural marker is expanding. This study provides preliminary information on the status quo of the OWP and reasons for expansion, which will contribute to future research on similar topics.
  • Social networking: security, privacy, and applications
    Scholarship
    Creator
    Jahid, Sonia
    Date
    2013
    Description
    Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of information including personal profiles, pictures, and messages to socialize with their friends in the Internet. Besides, several special purpose social networks have emerged to serve their users with useful functionalities. This vast amount of user data is valuable, and therefore, introduce several security and privacy risks and challenges. In this thesis we propose several techniques to enhance the security and privacy features of online social networks. Our goal is to shift the control over user data from a centralized social network provider to the end users. We realize this concept by decentralization of the social networking architecture. First, we construct and implement a cryptographic access control mechanism that ensures data confidentiality and integrity, and efficiently supports the fine-grained access policies expected by social network users. Next, we present a detailed design of a decentralized online social network that focuses on security and privacy. Finally, we propose and implement auditable anonymity, a cryptographic scheme, which allows a social networking user to keep track of who accesses her data even when her data is encrypted and decentralized, without revealing this information to the storage provider.
  • Conflicting Values: An Exploration of the Tensions between Learning Analytics and Academic Librarianship
    Scholarship
    Creator
    • Brundin, Michael R.
    • Oliphant, Tami
    Description
    The prevailing rhetoric concerning learning analytics is that its use will support the educational endeavor and make significant improvements to teaching and learning. For academic libraries, learning analytics presents the possibility of using library data to coordinate, integrate, and align with the goals of the institutions in which they are embedded. While libraries have a long history of collecting data to support various service and learning objectives, those data have typically been siloed, de-identified, private, and confidential. Although there are positive contributions that learning analytics can make to the learning process, there are concerns associated with its use, particularly the tensions between the objectives of learning analytics contrasted with different conceptualizations of learners and the values of education and librarianship. Institutions of higher education use learning analytics to achieve institutionally defined goals and outcomes for students, which creates tensions with the enshrined values of the American Library Association's Code of Ethics, Library Bill of Rights, and Core Competencies of Librarianship. The transcendent benefits to society that are inherent in education and academic librarianship, such as the rights and responsibilities of citizenship, are not measurable through learning analytics.
  • The Evolution of Privacy within the American Library Association, 1906–2002
    Scholarship
    Creator
    Witt, Steve
    Description
    "From fears of anarchist terrorists in the early twentieth century through cold war conflict and contemporary fears of extremist religious terrorists, the American library community responded to the use of libraries as a site for surveillance and source of dangerous information in an increasingly proactive and organized manner. This paper traces the evolution of privacy norms and standards within the American library profession, focusing on the lack of regard for patron confidentiality in the early twentieth century, the development of privacy norms in the American Library Association (ALA) Code of Ethics in 1938, and the increased protection of privacy rights as the profession's conceptions of privacy formed around the ALA's codes. Using Nissenbaum's (2009) ""contextual integrity"" framework within a broad historical analysis of ALA publications, the paper examines the role of its codes regarding privacy in establishing a normative framework around which the continued application of privacy standards in libraries has taken place despite new technological challenges and continued pressure from governments and outside organizations to exploit patron information. The paper concludes that the ALA's unambiguous stance on, and consistent advocacy for, privacy standards across the profession has enabled reactions to violations of privacy norms that have shifted with technologies and new social pressures. The ALA's historic ability to maintain and protect these professional standards serves as a compelling model for new information professions that work to set professional standards in areas that range from data-analytics to social networking."
  • Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees (Extended Version)
    Scholarship
    Creator
    • Winslett, Marianne
    • Lee, Adam J.
    • Minami, Kazuhiro
    Description
    In distributed proof construction systems, information release policies can make it unlikely that any single node in the system is aware of the complete structure of any particular proof tree. This property makes it difficult for queriers to determine whether the proofs constructed using these protocols sampled a consistent snapshot of the system state; this has previously been shown to have dire consequences in decentralized authorization systems. Unfortunately, the consistency enforcement solutions presented in previous work were designed for systems in which only information encoded in certificates issued by certificate authorities is used during the decision-making process. Further, they assume that each piece of certified evidence used during proof construction is available to the decision-making node at runtime. In this paper, we generalize these previous results and present lightweight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable two types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. Further, we present the details of a performance analysis conducted to illustrate the modest overheads (less than 30%) of consistency enforcement on distributed proof construction.
  • Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks
    Scholarship
    Creator
    • Narayanaswami, Chandra
    • Anwar, Zahid
    • Gunter, Carl A.
    • Potter, Shaya
    • Yurcik, William
    • Campbell, Roy H.
    Description
    Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool (VVAT) with which we demonstrate vulnerabilities to DoS attacks inherent in many of the popular VoIP applications available today. In our threat model we assume an adversary who is not a network administrator, nor has direct control of the channel and key VoIP elements. His aim is to degrade his victim's QoS without giving away his presence by making his attack look like a normal network degradation. Even black-boxed, applications like Skype that use proprietary protocols show poor performance under specially crafted DoS attacks to its media stream. Finally we show how securing Skype relays not only preserves many of its useful features such as seamless traversal of firewalls but also protects its users from DoS attacks such as recording of conversations and disruption of voice quality. We also present our experiences using virtualization to protect VoIP applications from 'insider attacks'. Our contribution is two fold we: 1) Outline a threat model for VoIP, incorporating our attack models in an open-source network simulator/emulator allowing VoIP vendors to check their software for vulnerabilities in a controlled environment before releasing it. 2) We present two promising approaches for protecting the confidentiality, availability and authentication of VoIP Services.