University Library, University of Illinois at Urbana-Champaign

The items in the Digital Collections of the University of Illinois Urbana-Champaign Library contain materials which represent or depict sensitive topics or were written from perspectives using outdated or biased language. The Library condemns discrimination and hatred on any grounds. As a research library that supports the mission and values of this land grant institution, it is incumbent upon the University Library to preserve, describe, and provide access to materials to accurately document our past, support learning about it, and effect change in the present. In accordance with the American Library Association’s Freedom to Read statement, we do not censor our materials or prevent patrons from accessing them.

If you have questions regarding this statement or any content in the Library’s digital collections, please contact digitalcollections@lists.illinois.edu

American Library Association’s Freedom to Read Statement

Diversity, Equity, Inclusion and Accessibility at the University Library
Service
Creator
Subject
Repository
Showing 841–880 of 54,802 items
  • Energy Efficiency and Security for Multihop Wireless Networks
    Scholarship
    Creator
    Miller, Matthew Jefferson
    Description
    As wireless devices are more widely used, it is clear that security and energy consumption are major concerns. From a energy perspective, it is increasingly evident that marginal gains in battery energy density necessitate energy efficient protocols. In the security realm, growth in the value and amount of information being transmitted over wireless channels demands confidentiality and integrity. In the energy efficiency domain, this dissertation focuses on the wireless interface since this has been identified as a major source of energy consumption on devices such as sensors. Within this domain, many previous approaches propose using fixed listening and sleeping intervals regardless of the network conditions. We propose adaptive listening and sleeping techniques where these intervals are adjusted based on observations of traffic patterns and channel state. Another shortcoming of many power save protocols is that they wastefully listen for entire packets as a wake-up signal. In this dissertation, we propose carrier sensing techniques that reduce the cost of checking for such signals. In the security domain, this dissertation looks at key distribution in wireless sensor networks. Because such devices may face severe resource constraints, symmetric keys are used since public-key cryptography may be infeasible. Previous approaches to this problem include key predistribution, and broadcasting plaintext keys, under the assumption that few eavesdroppers are present during key discovery. However, drawbacks to these approaches include poor secure connectivity or degraded security when several eavesdroppers are in the network. Our work exploits the underlying wireless channel diversity to address the problem. In doing so, our key distribution protocol effectively addresses the drawbacks of previous techniques. The major contributions of this dissertation are: (1) leveraging multiple channels to improve the connectivity and security of key distribution, (2) proposing adaptive power save mechanisms to reduce energy consumption, and (3) improving power save protocols by using carrier sensing to enhance their energy efficiency
  • The paradox of privacy: Revisiting a core library value in an age of big data and linked data
    Scholarship
    Creator
    • Cowan, Scott R.
    • Campbell, D. Grant
    Description
    Protecting user privacy and confidentiality is fundamental to the ethics and practice of librarianship, and such protection constitutes one of eleven values in the American Library Association’s “Core Values of Librarianship” (2004). This paper addresses the concerns of protecting privacy in the library as they relate to library users who are defining, exploring, and negotiating their sexual identities with the help of the library’s information, programming, and physical facilities. In so doing, we enlist the aid of Garret Keizer, who, in Privacy (2012), articulates a fresh theory of the concept in light of American social life in the twenty-first century. Using Keizer’s theory, we examine these concerns within the context of the rise of big data systems and social media on the one hand, and linked data and new cataloging standards on the other. In so doing, we suggest that linked data technologies, with their ability to lead searchers through selfdirected, open inquiry, are superior to big data technologies in the navigation of the paradox between openness and secrecy. In this way they offer a greater potential to support the needs of queer library users: lesbian, gay, bisexual, transgendered, or questioning (LGBTQ).
  • Digital preservation auditing metrics as design tools for digital repositories
    Scholarship
    Creator
    Kinnaman, Alex Olivia
    Description
    Collaboration via partnership in a consortium and in outsourcing are common aspects in building and maintaining a trusted digital repository. Such collaboration is overlooked in most digital preservation auditing metrics. This not only prevents the possibility of formal certification, but not including third-party participation in the standards implies that there are no standards for negotiating contracts and delineating the roles of partners. This thesis examines the ongoing project Digital Safe, a project in development at Oxford that aims to be a service for storing confidential information. In two case studies, the author employs the Trustworthy Repositories Audit & Certification (TRAC) and the Data Seal of Approval (DSA) to inform the development of Digital Safe and its relationships with third-party vendors. The major goal is to examine how various roles between an institution and third-parties can be delegated based on the necessary standards. This is useful first for helping develop contracts with vendors and understanding exact responsibilities in partnerships. Second, it facilitates a better understanding of the limitations of current auditing metrics. The case studies reveal that both TRAC and DSA can provide a means for defining roles in partnerships, TRAC being more complex and DSA being more theoretical. Second, the documentation for audit standards is reliant on OAIS reference model, which limits their use in consortia, dark archives, and other specific repositories. The case studies also clarify the type of evidence most appropriate to have and develop in the planning stages for a digital repository. These findings point to future work in a revision of how audit standards are used, specifically indicating their use-value as development tools in addition to assessment tools. The addition of third-party support to these standards could facilitate a better guide to interacting with third parties during planning stages, and ultimately improve digital preservation standards and the trustworthiness of repositories.
  • iSchool Proposal for Themed Wildcard Session on New Information Systems Methods
    Scholarship
    Creator
    • Jirotka, Marina
    • Star, Susan Leigh
    • Whalen, Jack
    • Calvert, Scout
    Description
    ‘New Information Systems’ is an emerging field composed of social studies of science (STS), information sciences (IS), workplace studies and technological design, and new media forms such as cyberinfrastructure or eResearch. Within this area we are exploring the connections and inter-relationships between empirical studies of information at knowledge creation and use, and methods from more traditional IS, social networks, grounded theory and ethnomethodology. The collective creation of a theoretically driven cluster at this juncture would tie us together in a convergence that would link our scholarship and enable students to access this strong and existing - yet invisible - college. We propose a “wildcard” session here that makes a space for people to speak about their methods, assess their viability for helping to build our emerging community, and hopefully to explore the “behind the scenes” actions associated with practicing any methods. Such an event is most timely. At the recent meetings of the Society for the Social Studies of Science (4S), an entire day was devoted to the emerging intersections of STS and IS. In addition it should be noted that the same book, Memory Practices in the Sciences (G. Bowker, MIT Press, 2007), won the best book award at both ASIST and 4S. This might be seen as a harbinger for the deeply theoretical and methodological work that is to take place, if the intersection is to be a robust one. Our research directions will be focused on studies of infrastructure, ethical actions that are inscribed into IS, and theoretical studies of questions such as ‘what is useful information’? We need to unpack the contextual nature of knowledge creation and use. As well, we need to understand the ways in which it is entangled with obligations from different domains and communities of practice such as privacy, consent, anonymity, confidentiality, ownership and a whole host of organizational and professional matters. New media studies point to an intense overlapping and interrelationship of fields and disciplines. Methods should come from a combination of (1) sensitivity to the historical moment (e.g., multiculturalism, extreme changes in the meaning of ‘global’); (2) an assemblage of tools that are ready to hand, theoretically driven, are pleasant and effective to use; and (3) embody an ethical commitment to the values and meanings of those who are being studied (emic), within a way to explore the conventions, standards and infrastructures that both constrain and enable their experiences (etic). The papers here aim to show a range of approaches from the current STS, IS and Workplace Studies emergence that speak to the criteria detailed above. Each participant in the experiemntal forum will bring an example of their research, and as honestly as possible, assess its methodological strengths and weaknesses. The assessment will be relative to strengthening the development of the iSchool community, to the intersections noted above, and to the welfare of respondents.