JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for LIS-ELIB Archives


LIS-ELIB Archives

LIS-ELIB Archives


LIS-ELIB@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

LIS-ELIB Home

LIS-ELIB Home

LIS-ELIB  June 1998

LIS-ELIB June 1998

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Transaction logging analysis

From:

Mr C A Rusbridge <[log in to unmask]>

Reply-To:

Mr C A Rusbridge <[log in to unmask]>

Date:

Tue, 23 Jun 1998 14:48:40 +0100 (BST)

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (103 lines)

Paschoud,J wrote:
> 
> We also found, originally in the Decomate project, that more detailed
> logs were required for proper analysis of user behaviour, and we made
> our CGI server[...]
> log date-time, IP, username (some were individual, some
> group names) and details of actions performed, such as search terms
> used. 

John and eLib projects, I was a little concerned at some of the
implications of this. It seems to rather strongly and potentially
adversely impact the privacy of the user, which is a strong tradition in
libraries, particularly in the US. The CNI has a project at the moment on
authentication, and I'd like to quote as examples of this concern some
paragraphs from the draft text, written by Clifford Lynch (accessible from
www.cni.org): 

"The licensee institution, in the print world, has a set of internal
policies about record-keeping and use reporting (both who used it and how
often it was used); generally these are very restrictive and stress user
privacy. The institution then has a separate set of policies (which may in
fact never have been explicitly codified) about sharing this usage
information with the content supplier: in general this policy has been
very simple -- the supplier got no information about usage other than that
which the institution chose to make public for other reasons. 

"In the electronic environment, the situation changes. Because information
is often accessed at the publisher site, the publisher may know a great
deal about who is accessing what material and how often. Aggregators and
service bureaus may also complicate both the collection and flow of
information.  To some extent the collection, use, retention, and even
potential resale of this information can be covered by license contract;
and should be. Institutions will have to develop realistic policies about
privacy of readers in the networked information environment which are
acceptable to their user communities and well understood by readers.
However, some authentication and access management approaches offer
licensee institutions much greater flexibility than others to limit the
amount of information that can technically be collected by the resource
operator. In general, it is desirable that the amount of privacy at risk
which needs to be controlled by contractual provision be minimized. 

"Clearly, one strategy for ensuring user privacy is to ensure that users
remain anonymous in their use of information resources. We can distinguish
several common situations:
"- Repeat users cannot be identified; each session is completely
anonymous. We will call this anonymous access. 
"- Repeat users can be identified, but the identity of a user cannot be
determined. The resource operator knows only that some specific individual
is accessing the resource repeatedly, not who that individual is.  The
user may be identified by some arbitrary identifier, such as USER123.  We
will call this pseudononymous access.
"- Demographic characteristics of users can be determined, but not actual
identities. We will call this pseudonymous access with demographic
identification.
"- Actual identities can be associated with sessions. We will call this
identified access. It may be supplemented with demographics; just because
the resource operator knows who someone is does not mean that they
automatically know the userŐs demographic characteristics as well as his
or her name.

"Note that many users choose to identify themselves in order to obtain
added value services, such as electronic mail notification of changes to a
resource, or to preserve context from one session to the next, or to
maintain a user profile at a resource. ItŐs important to distinguish
voluntary user self-identification from automatic identification that is
generated as a byproduct of an authentication and access management
system. It is also worth considering, at least briefly, how an institution
might provide services for its community that permits community members to
enjoy these added value services without identifying themselves to
resource operators, and whether itŐs worth going to the trouble to make
this possible."

To the extent that hybrid library projects represent the institution and
not the resource provider, it does seem reasonable to keep some of this
information, although the data protection issues need to be thought
through carefully. 

I do realise that where the user is building up an "information landscape"
which is to some extent personalised, some such records will need to be
kept, although pseudonymous records would be preferable. The "information
landscape" might be seen as a value-added service, although I think Cliff
intended that such a service should be purely optional in a way I suspect
your services are not.

However, faced with the possibility, for example, of foreign intelligence
services hacking into your system and determining from them the reading
habits and hence political orientation of their nationals, one might
prefer not to be keeping this information at all.

No easy answers here, just something to think about and perhaps get your
evaluators to gather user and librarian poinions on the issue.

-- 
Chris Rusbridge

Programme Director, Electronic Libraries Programme
The Library, University of Warwick, Coventry CV4 7AL, UK
Phone 01203 524979	Fax 01203 524981
Email [log in to unmask]


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
January 2024
December 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
February 2023
January 2023
December 2022
February 2022
December 2021
October 2021
September 2021
August 2021
May 2021
September 2020
October 2019
March 2019
February 2019
August 2018
February 2018
December 2017
October 2017
September 2017
August 2017
June 2017
April 2017
March 2017
February 2017
January 2017
November 2016
August 2016
July 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
September 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
February 2000
January 2000
December 1999
November 1999
October 1999
September 1999
August 1999
July 1999
June 1999
May 1999
April 1999
March 1999
February 1999
January 1999
December 1998
November 1998
October 1998
September 1998
August 1998
July 1998
June 1998
May 1998
April 1998
March 1998
February 1998
January 1998
December 1997
November 1997
October 1997
September 1997
August 1997
July 1997
June 1997
May 1997
April 1997
March 1997
February 1997
January 1997
December 1996
November 1996
October 1996
September 1996
August 1996
July 1996
June 1996
May 1996
April 1996
March 1996


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager