Personal data in the online world has become a commodity. Coveted by criminals, demanded by governments, and used for unsavory purposes by marketers and advertisers, your private information is at risk everywhere. For libraries and librarians, this poses a professional threat as well as a personal one. How can we protect the privacy of library patrons and users who browse our online catalogs, borrow sensitive materials, and use our public computers and networks?
User Privacy: A Practical Guide for Librarians answers that question. Through simple explanations and detailed, step-by-step guides, library professionals will learn how to strengthen privacy protections for:
- Library policies
- Wired and wireless networks
- Public computers
- Web browsers
- Mobile devices
- Apps
- Cloud computing
Each chapter begins with a "threat assessment" that provides an overview of the biggest security risks - and the steps that can be taken to deal with them. Also covered are techniques for preserving online anonymity, protecting activists and at-risk groups, and the current state of data encryption.
This title is in stock with our overseas supplier and should arrive at our Sydney warehouse within 3 - 5 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: