While intellectual freedom issues can quickly become complex and nuanced, introduction to the ideals doesn’t necessarily have to be. A simpler introduction may stick easier than an overly complicated one.
During the summer, libraries play an important role of stopping summer slide and engaging people, especially children and teens, with learning opportunities and collections built for self-directed exploration. However, if a child is hungry, how inclined will they be to take advantage of these opportunities?
Although fake news has always existed, it has recently been thrust into the limelight for its role in the contemporary political conversation as it plays out on social media. This in turn has led for some to call for a crackdown on purveyors of fake news.
A new report from a UK digital textbook provider has shown that many students are fine with teacher snooping if it ends up leading to increased classroom performance. The report, titled “University of the Future,” implies a strong benefit to allowing teachers to track what students have read and how long they have spent studying.
For every loophole that gets closed, it seems like there are five new ones that emerging technology enable for exploitation. If the internet is a service that libraries provide and privacy is something libraries believe individuals should have when browsing, then there is a lot of work to do.
Natalia Sharina is the director of the Library of Ukrainian Literature in Moscow. She is currently accused of disseminating extremist literature that has been banned. The official charge is “inciting ethnic hatred and humiliating human dignity.” Sharina has been taken into custody, and the offending materials were confiscated by the Russian authorities.
A federal appeals court recently delivered a victory for Microsoft that also serves as a positive step forward for individuals who want to keep their email private.
A video released by Motherboard this week shows how RFID devices sitting around an office (or say, a library) could be used to listen in on conversations from a distance because of the lack of security these devices have. While this video exploits a pretty high-level hack, it does show how a phone can be turned into a bug through a message sent from a wireless printer on the same network.
Violating Blogspot’s terms of service led to shutting down an artist’s blog with no notice. Many are crying censorship. Is there any sort of recourse when a company owns the platform that’s being used?
Earlier this month, Blogspot suspended artist and writer Dennis Cooper’s blog that he had maintained for the last 14 years with no notice. Cooper has hired a lawyer and made several complaints to Google. The compaints have gone unanswered. The blog remains removed.
Google Europe announced on its blog, that it would adopt practices that would amount to a global right to be forgotten. The new policy boils down to the following