How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities

Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Libraries provide critical IT services to patrons who lack access to computational and internet resources. We conducted 12 semi-structured interviews with library IT staff to learn about their privacy and security protocols and policies, the challenges they face implementing them, and how this relates to their patrons. We frame our findings using Sen’s capabilities approach and find that library IT staff are primarily concerned with protecting their patrons’ privacy from threats outside their walls—police, government authorities, and third parties. Despite their dedication to patron privacy, library IT staff frequently have to grapple with complex tradeoffs between providing easy, fluid, full-featured access to Internet technologies or third-party resources, protecting library infrastructure, and ensuring patron privacy.

    Original languageEnglish (US)
    Title of host publication32nd USENIX Security Symposium, USENIX Security 2023
    PublisherUSENIX Association
    Pages5647-5664
    Number of pages18
    ISBN (Electronic)9781713879497
    StatePublished - 2023
    Event32nd USENIX Security Symposium, USENIX Security 2023 - Anaheim, United States
    Duration: Aug 9 2023Aug 11 2023

    Publication series

    Name32nd USENIX Security Symposium, USENIX Security 2023
    Volume8

    Conference

    Conference32nd USENIX Security Symposium, USENIX Security 2023
    Country/TerritoryUnited States
    CityAnaheim
    Period8/9/238/11/23

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems
    • Safety, Risk, Reliability and Quality

    Fingerprint

    Dive into the research topics of 'How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities'. Together they form a unique fingerprint.

    Cite this