A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics.

[1]  Arthur Elmore Bostwick,et al.  The American Public Library , 2008 .

[2]  A. Lenhart,et al.  Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace , 2007 .

[3]  Karen McCullagh,et al.  Blogging: self presentation and privacy , 2008 .

[4]  T. F. Carney,et al.  Content Analysis: A Technique for Systematic Inference from Communications , 1972 .

[5]  Stacey L. Bowers Privacy and Library Records. , 2006 .

[6]  David Hugh Thompson Sailing into the future : charting our destiny : proceedings of the Thirteenth National Conference of the Association of College and Research Libraries, March 29-April 1, 2007, Baltimore, Maryland , 2007 .

[7]  Tom Storey,et al.  Sharing, Privacy and Trust in Our Networked World. A Report to the OCLC Membership. , 2007 .

[8]  C. Oppenheim,et al.  User privacy in the digital library environment: an investigation of policies and preparedness , 2003 .

[9]  John A Drobnicki The Confidentiality of Library Users' Records. , 1992 .

[10]  Daniel P. Dern Privacy Concerns , 2003, IEEE Security & Privacy Magazine.

[11]  G. St. Clair Council on Library and Information Resources Internet Use Study , 2002 .

[12]  Cheryl Campanella Bracken,et al.  Practical Resources for Assessing and Reporting Intercoder Reliability in Content Analysis Research Projects , 2005 .

[13]  Chiung-Wen Hsu,et al.  Privacy concerns, privacy practices and web site categories: Toward a situational paradigm , 2006, Online Inf. Rev..

[14]  D. Todd,et al.  American Library Association , 2022, Encyclopedia of Big Data.

[15]  R. Weber Basic content analysis, 2nd ed. , 1990 .

[16]  G. Malhi Face value. , 2008, Acta neuropsychiatrica.

[17]  Bradford R. Connatser Last Rites for Readability Formulas in Technical Communication , 1999 .

[18]  R. Flesch A new readability yardstick. , 1948, The Journal of applied psychology.

[19]  Annette N. Shelby Readability Formulas , 1992 .

[20]  Samuel J. Best,et al.  Privacy in the Information Age , 2006 .

[21]  W. D. Perreault,et al.  Reliability of Nominal Data Based on Qualitative Judgments , 1989 .

[22]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .

[23]  Richard L. Divine,et al.  Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy‐Protecting Behaviors , 2007 .

[24]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[25]  K. Krippendorff Krippendorff, Klaus, Content Analysis: An Introduction to its Methodology . Beverly Hills, CA: Sage, 1980. , 1980 .

[26]  Colin Seymour-Ure,et al.  Content Analysis in Communication Research. , 1972 .

[27]  Kimberly A. Neuendorf,et al.  The Content Analysis Guidebook , 2001 .

[28]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[29]  Seounmi Youn Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach , 2005 .

[30]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[31]  Stefan Stieger,et al.  Internet users' perceptions of 'privacy concerns' and 'privacy actions' , 2007, Int. J. Hum. Comput. Stud..

[32]  Edward M. Corrado Privacy and Library 2.0: How Do They Conflict? , 2007 .

[33]  R. Weber Basic Content Analysis , 1986 .

[34]  O. Holsti Content Analysis for the Social Sciences and Humanities , 1969 .

[35]  Karen G. Lawson,et al.  University undergraduate students and library-related privacy issues , 2005 .