doi-org-1330 ---- Using the Harvesting Method to Submit ETDs into ProQuest | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Communications Using the Harvesting Method to Submit ETDs into ProQuest A Case Study of a Lesser-Known Approach Marielle Veve University of North Florida http://orcid.org/0000-0002-0980-6137 DOI: https://doi.org/10.6017/ital.v39i3.12197 Abstract The following case study describes an academic library’s recent experience implementing the harvesting method to submit electronic theses and dissertations (ETDs) into the ProQuest Dissertations & Theses Global database (PQDT). In this lesser-known approach, ETDs are deposited first in the institutional repository (IR), where they get processed, to be later harvested for free by ProQuest through the IR’s Open Archives Initiative (OAI) feed. The method provides a series of advantages over some of the alternative methods, including students’ choice to opt-in or out from ProQuest, better control over the embargo restrictions, and more customization power without having to rely on overly complicated workflows. Institutions interested in adopting a simple, automated, post-IR method to submit ETDs into ProQuest, while keeping the local workflow, should benefit from this method.  Author Biography Marielle Veve, University of North Florida Metadata Librarian References Cedar C. Middleton, Jason W. Dean, and Mary A. Gilbertson, “A Process for the Original Cataloging of Theses and Dissertations,” Cataloging and Classification Quarterly 53, no. 2 (February 2015): 234–46, https://doi.org/10.1080/01639374.2014.971997. Dan Tam Do and Laura Gewissler, “Managing ETDs: The Good, the Bad, and the Ugly,” in What’s Past Is Prologue: Charleston Conference Proceedings, eds. Beth R. Bernhardt et al. (West Lafayette, IN: Purdue University Press, 2017), 200-04, https://doi.org/10.5703/1288284316661 Donna O’Malley, June 27, 2017, reply to Andrew Wesolek, “ETD Embargoes through ProQuest,” Digital Commons Google Users Group (blog), https://groups.google.com/forum/#!searchin/digitalcommons/embargo$20proquest%7Csort:date/digitalcommons/Gadwi8INfgA/sg7de7SdCAAJ. Emily Symonds Stenberg, September 7, 2016, reply to Wendy Robertson, “Anything to watch out for with etd embargoes?,” Digital Commons Google Users Group (blog), https://groups.google.com/forum/#!searchin/digitalcommons/embargo$20dates%7Csort:date/digitalcommons/RNInGtRarNY/6byzT9apAQAJ. FUSE, 2012-2013, Graduate Students Re-FUSE!, https://oaktrust.library.tamu.edu/bitstream/handle/1969.1/152270/Graduate%20Students%20Re-FUSE.pdf?sequence=25&isAllowed=y. Gail P. Clement and Fred Rascoe, “ETD Management & Publishing in the ProQuest System and the University Repository: A Comparative Analysis,” Journal of Librarianship and Scholarly Communication 1, no. 4 (August 2013): 8, http://doi.org/10.7710/2162-3309.1074. Gail P. Clement, “American ETD Dissemination in the Age of Open Access: ProQuest, NoQuest, or Allowing Student Choice,” College & Research Libraries News 74, no. 11 (December 2013): 562–66, https://doi.org/10.5860/crln.74.11.9039 Marlene Coles, email message to author, January 19, 2018. Meghan Banach Bergin and Charlotte Roh, “Systematically Populating an IR With ETDs: Launching a Retrospective Digitization Project and Collecting Current ETDs,” in Making Institutional Repositories Work, eds. Burton B. Callicott, David Scherer, and Andrew Wesolek (West Lafayette, IN: Purdue University Press, 2016), 127–37, https://docs.lib.purdue.edu/purduepress_ebooks/41/. “PQDT Global Submission Options, Institutional Repository + Harvesting,” ProQuest, https://media2.proquest.com/documents/dissertations-submissionsguide.pdf. “PQDT Submissions Options for Universities,” ProQuest, http://contentz.mkt5049.com/lp/43888/382619/PQDTsubmissionsguide_0.pdf. “ProQuest Dissertations & Theses Global Harvesting Process,” ProQuest. “Support: ProQuest Export Documentation,” Vireo Users Group, https://vireoetd.org/vireo/support/ProQuest-export-documentation/. “U.S. Dissertations Publishing Services: 2017-2018 Fee Schedule,” ProQuest. Wendy Robertson and Rebecca Routh, “Light on ETD’s: Out from the Shadows” (presentation, Annual Meeting for the ILA/ACRL Spring Conference, Cedar Rapids, IA, April 23, 2010), http://ir.uiowa.edu/lib_pubs/52/ Yuan Li, Sarah H. Theimer, and Suzanne M. Preate, “Campus Partnerships Advance both ETD Implementation and IR Development: A Win-win Strategy at Syracuse University,” Library Management 35, no. 4/5 (2014): 398–404, https://doi.org/10.1108/LM-09-2013-0093. PDF Published 2020-09-21 How to Cite Veve, M. (2020). Using the Harvesting Method to Submit ETDs into ProQuest. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12197 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Communications Copyright (c) 2020 Marielle Veve This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-1485 ---- Applying Gamification to the Library Orientation | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Applying Gamification to the Library Orientation A Study of Interactive User Experience and Engagement Preferences Karen Nourse Reed Middle Tennessee State University https://orcid.org/0000-0002-5479-1798 A Miller Middle Tennessee State University DOI: https://doi.org/10.6017/ital.v39i3.12209 Abstract By providing an overview of library services as well as the building layout, the library orientation can help newcomers make optimal use of the library. The benefits of this outreach can be curtailed, however, by the significant staffing required to offer in-person tours. One academic library overcame this issue by turning to user experience research and gamification to provide an individualized online library orientation for four specific user groups: undergraduate students, graduate students, faculty, and community members. The library surveyed 167 users to investigate preferences regarding orientation format, as well as likelihood of future library use as a result of the gamified orientation format. Results demonstrated a preference for the gamified experience among undergraduate students as compared to other surveyed groups. References A. Carolyn Miller, “The Round Robin Library Tour,” Journal of Academic Librarianship 6, no. 4 (1980): 215–18 Angie Thorpe et al., “The Impact of the Academic Library on Student Success: Connecting the Dots,” Portal: Libraries and the Academy 16, no. 2 (2016): 373–92, https://doi.org/10.1353/pla.20160027. Anna-Lise Smith and Lesli Baker, “Getting a Clue: Creating Student Detectives and Dragon Slayers in Your Library,” Reference Services Review 39, no. 4 (November 2011): 628–42, https://doi.org/10.1108/00907321111186659. Chris Leeder and Steven Lonn, “Faculty Usage of Library Tools in a Learning Management System,” College & Research Libraries, 75, no. 5 (September 2014): 641–63, https://doi.org/10.5860/crl.75.5.641. “Design Thinking for Libraries: A Toolkit for Patron-Centered Design,” Ideo (2015), http://designthinkingforlibraries.com. J. Long, “Chapter 21: Gaming Library Instruction: Using Interactive Play to Promote Research as a Process,” Distributed Learning (January 1, 2017), 385–401, https://doi.org/10.1016/B978-0-08-100598-9.00021-0. John W. Creswell and Vicki L. Plano Clark, Designing and Conducting Mixed Methods Research (Thousand Oaks, CA: Sage Publications, 2007). Kelly Czarnecki, “Chapter 4: Digital Storytelling in Different Library Settings,” Library Technology Reports, no. 7 (2009): 20-30 Kenneth J. Burhanna, Tammy J. Eschedor Voelker, and Jule A. Gedeon, “Virtually the Same: Comparing the Effectiveness of Online Versus In-Person Library Tours,” Public Services Quarterly 4, no. 4(2008): 317–38, https://doi.org/10.1080/15228950802461616. Kyle Felker and Eric Phetteplace, “Gamification in Libraries: The State of the Art,” Reference and User Services Quarterly 54, no. 2 (2014): 19-23, https://doi.org/10.5860/rusq.54n2.19 Kylie Bailin, Benjamin Jahre, and Sarah Morriss, “Planning Academic Library Orientations: Case Studies from Around the World,” (Oxford, UK: Chandos Publishing, 2018): xvi. Leila June Rod-Welch, “Let’s Get Oriented: Getting Intimate with the Library, Small Group Sessions for Library Orientation,” (paper, Association of College and Research Libraries Conference, Baltimore, March 2017), http://www.ala.org/acrl/sites/ala.org.acrl/files/content/conferences/confsandpreconfs/2017/LetsGetOriented.pdf. Lori Oling and Michelle Mach, “Tour Trends in Academic ARL Libraries,” College & Research Libraries, 63, no. 1 (January 2002): 13-23, https://doi.org/10.5860/crl.63.1.13. Mary J. Broussard and Jessica Urick Oberlin, “Using Online Games to Fight Plagiarism: A Spoonful of Sugar Helps the Medicine Go Down,” Indiana Libraries 30, no. 1 (January 2011): 28–39. Melissa Mallon, “Gaming and Gamification,” Public Services Quarterly 9, no. 3 (2013): 210–21, https://doi.org/10.1080/15228959.2013.815502. Michael Simmons, “Evaluation of Library Tours,” EDRS, ED 331513 (1990): 1-24. Monica Fusich et al., “HML-IQ: Frenso State’s Online Library Orientation Game,” College & Research Libraries News 72, no. 11 (December 2011): 626–30, https://doi.org/10.5860/crln.72.11.8667. Mosley, “Assessing the Comfort Level Impact and Perceptual Value of Library Tours.” Nancy O’Hanlon, Karen Diaz, and Fred Roecker, “A Game-Based Multimedia Approach to Library Orientation,” (paper, 35th National LOEX Library Instruction Conference, San Diego, May 2007), https://commons.emich.edu/loexconf2007/19/ Pixey Anne Mosley, “Assessing the Comfort Level Impact and Perceptual Value of Library Tours,” Research Strategies 15, no. 4 (1997): 261–70, https://doi.org/10.1016/S0734-3310(97)90013-6. Rebecca J. Morris, “Creating, Viewing, and Assessing: Fluid Roles of the Student Self in Digital Storytelling,” School Libraries Worldwide, no. 2 (2013): 54–68. Roger Kirk, “Practical Significance: A Concept Whose Time Has Come,” Educational and Psychological Measurement, no. 5 (1996). Sandra Calemme McCarthy, “At Issue: Exploring Library Usage by Online Learners with Student Success,” Community College Enterprise 23, no. 2 (January 2017): 27–31 Sandra Marcus and Sheila Beck, “A Library Adventure: Comparing a Treasure Hunt with a Traditional Freshman Orientation Tour,” College & Research Libraries 64, no. 1 (January 2003): 23–44, https://doi.org/10.5860/crl.64.1.23. Sandra Mathison, “Encyclopedia of Evaluation,” SAGE, 2005, https://doi.org/10.4135/9781412950558. Steven Ovadia, “How Does Tenure Status Impact Library Usage: A Study of LaGuardia Community College,” Journal of Academic Librarianship 35, no. 4 (January 2009): 332–40, https://doi.org/10.1016/j.acalib.2009.04.022. PDF Published 2020-09-21 How to Cite Reed, K., & Miller, A. (2020). Applying Gamification to the Library Orientation. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12209 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Karen Reed, A Miller This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-381 ---- Letter from the Editor | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Editorials Letter from the Editor Ken Varnum University of Michigan http://orcid.org/0000-0002-0091-1037 DOI: https://doi.org/10.6017/ital.v39i3.12691 Author Biography Ken Varnum, University of Michigan Ken Varnum is the Senior Program Manager for Discovery, Delivery, and Library Analytics at the University of Michigan Library. Ken's research and professional interests include discovery systems, library analytics, and technology in the library setting. He has written or edited six books, the most recent of which, "Beyond Reality: Augmented, Virtual, and Mixed Reality in the Library" and the LITA Guide "New Top Technologies Every Librarian Needs to Know", were published in 2019. He blogs at rss4lib.com and can be found on Twitter at @varnum. PDF Published 2020-09-21 How to Cite Varnum, K. (2020). Letter from the Editor. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12691 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Editorials Copyright (c) 2020 Kenneth J. Varnum This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-3966 ---- Harnessing the Power of OrCam | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Editorials Harnessing the Power of OrCam Mary Howard St. Clair County Library System DOI: https://doi.org/10.6017/ital.v39i3.12637 Abstract The OrCam reader is an AI enabled device that helps sight challenged readers to access print materials. This article is a first person account of a public library's experience in employing the OrCam technology. Author Biography Mary Howard, St. Clair County Library System Mary Howard is a Reference Librarian at the St. Clair County Library System in Port Huron, MI. Her work focuses specifically on serving patrons who have vision, hearing or mobility issues that prevent them from using traditional library services. She has a passion for serving her community and she enjoys hosting crafting, cultural and educational events. PDF Published 2020-09-21 How to Cite Howard, M. (2020). Harnessing the Power of OrCam. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12637 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Editorials Copyright (c) 2020 Mary Howard This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-4235 ---- Making Disciplinary Research Audible | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Making Disciplinary Research Audible The Academic Library as Podcaster Drew Smith University of South Florida Meghan L. Cook University of South Florida https://orcid.org/0000-0001-8117-3541 Matt Torrence University of South Florida https://orcid.org/0000-0003-0015-3907 DOI: https://doi.org/10.6017/ital.v39i3.12191 Abstract Academic libraries have long consulted with faculty and graduate students on ways to measure the impact of their published research, which now include altmetrics. Podcasting is becoming a more viable method of publicizing academic research to a broad audience. Because individual academic departments may lack the ability to produce podcasts, the library can serve as the most appropriate academic unit to undertake podcast production on behalf of researchers. The article identifies what library staff and equipment are required, describes the process needed to produce and market the published episodes, and offers preliminary assessments of the podcast impact. References Brock Peoples and Carol Tilley, “Podcasts as an Emerging Information Resource,” College & Undergraduate Libraries 18, no. 1 (January 2011): 44, https://doi.org/10.1080/10691316.2010.550529. Cassidy R Sugimoto et al., “Scholarly Use of Social Media and Altmetrics: A Review of the Literature,” Journal of the Association for Information Science and Technology 68, no. 9 (2017): 2,037–62. Catherine Pennington, “PODCAST: Geology Is Boring, Right? What?! NO! Why Scientists Should Communicate Geoscience...,” n.d., https://britgeopeople.blogspot.com/2018/10/PODCAST-geology-is-boring-right.html. Christopher Drew, “Educational Podcasts: A Genre Analysis,” E-Learning and Digital Media 14, no. 4 (2017): 201–11, https://doi.org/10.1177/2042753017736177. Erin Dorris Cassidy et al., “Higher Education and Emerging Technologies: Student Usage, Preferences, and Lessons for Library Services,” Reference & User Services Quarterly 50, no. 4 (2011): 380–91, https://doi.org/10.5860/rusq.50n4.380. James Bierman and Maura L. Valentino, “Podcasting Initiatives in American Research Libraries,” Library Hi Tech 29, no. 2 (May 2011): 349, https://doi.org/10.1108/07378831111138215. Jesse Thornburg, “Podcasting to Educate a Diverse Audience: Introducing the Geology Flannelcast,” in Innovative and Multidisciplinary Approaches to Geoscience Education (Posters) (Boulder, CO: Geological Society of America, 2015). Lizah Ismail, “Removing the Road Block to Students’ Success: In-Person or Online? Library Instructional Delivery Preferences of Satellite Students,” Journal of Library & Information Services in Distance Learning 10, no. 3–4 (2016): 286–311, https://doi.org/10.1080/1533290X.2016.1219206. Stephen M Walls et al., “Podcasting in Education: Are Students as Ready and Eager as We Think They Are?”, Computers & Education 54, no. 2 (January 2010): 372, https://doi.org/10.1016/j.compedu.2009.08.018. Tanmay De Sarkar, “Introducing Podcast in Library Service: An Analytical Study,” Vine 42, no. 2 (2012): 191–213, https://doi.org/10.1108/03055721211227237. PDF Published 2020-09-21 How to Cite Smith, D., Cook, M. L., & Torrence, M. (2020). Making Disciplinary Research Audible. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12191 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Drew Smith, Meghan L. Cook, Matt Torrence This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-4788 ---- Likes, Comments, Views | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Likes, Comments, Views A Content Analysis of Academic Library Instagram Posts Jylisa Doney University of Idaho https://orcid.org/0000-0002-9002-879X Olivia Wikle University of Idaho https://orcid.org/0000-0001-8122-4169 Jessica Martinez University of Idaho https://orcid.org/0000-0001-9476-1780 DOI: https://doi.org/10.6017/ital.v39i3.12211 Abstract This article presents a content analysis of academic library Instagram accounts at eleven land-grant universities. Previous research has examined personal, corporate, and university use of Instagram, but fewer studies have used this methodology to examine how academic libraries share content on this platform and the engagement generated by different categories of posts. Findings indicate that showcasing posts (highlighting library or campus resources) accounted for more than 50 percent of posts shared, while a much smaller percentage of posts reflected humanizing content (emphasizing warmth or humor) or crowdsourcing content (encouraging user feedback). Crowdsourcing posts generated the most likes on average, followed closely by orienting posts (situating the library within the campus community), while a larger proportion of crowdsourcing posts, compared to other post categories, included comments. The results of this study indicate that libraries should seek to create Instagram posts that include various types of content while also ensuring that the content shared reflects their unique campus contexts. By sharing a framework for analyzing library Instagram content, this article will provide libraries with the tools they need to more effectively identify the types of content their users respond to and enjoy as well as make their social media marketing on Instagram more impactful. Author Biographies Jylisa Doney, University of Idaho Assistant Professor, Social Sciences Librarian Olivia Wikle, University of Idaho Assistant Professor, Digital Initiatives Librarian  Jessica Martinez, University of Idaho Assistant Professor, Science Librarian  References “University of Idaho’s peer institutions,” University of Idaho, accessed October 8, 2019. Amanda Harrison et al., “Social Media Use in Academic Libraries: A Phenomenological Study,” The Journal of Academic Librarianship 43, no. 3 (2017), https://doi.org/10.1016/j.acalib.2017.02.014 Catherine Fonseca, “The Insta-Story: A New Frontier for Marking and Engagement at the Sonoma State University Library,” Reference & User Services Quarterly 58, no. 4 (2019), https://www.journals.ala.org/index.php/rusq/article/view/7148 Chloe West, “17 Instagram Stats Marketers Need to Know for 2019,” Sprout Blog, April 22, 2019, https://web.archive.org/web/20191219192653/https://sproutsocial.com/insights/instagram-stats/ Danielle Salomon, “Moving on from Facebook: Using Instagram to Connect with Undergraduates and Engage in Teaching and Learning,” College & Research Libraries News 74, no. 8 (2013), https://doi.org/10.5860/crln.74.8.8991. Emma Stuart, David Stuart, and Mike Thelwall, “An Investigation of the Online Presence of UK Universities on Instagram,” Online Information Review 41, no. 5 (2017): 584, https://doi.org/10.1108/OIR-02-2016-0057. Evgenia Vassilakaki and Emmanouel Garoufallou, “The Impact of Twitter on Libraries: A Critical Review of the Literature,” The Electronic Library 33, no. 4 (2015), https://doi.org/10.1108/EL-03-2014-0051. Fonseca, “The Insta-Story;” Hild, “Outreach and Engagement;” Lê, “#Fashionlibrarianship;” Rachman, Mutiarani, and Putri, “Content Analysis;” Salomon, “Moving on from Facebook;” Tekulve and Kelly, “Worth 1,000 Words.” Jenkins, “How Are U.S. Startups Using Instagram?;” Brian J. McNely, “Shaping Organizational Image-Power Through Images: Case Histories of Instagram,” Proceedings of the 2012 IEEE International Professional Communication Conference, Piscataway, NJ (2012), https://doi.org/10.1109/IPCC.2012.6408624 Joe Phua, Seunga Venus Jin, and Jihoon Jay Kim, “Gratifications of Using Facebook, Twitter, Instagram, or Snapchat to Follow Brands: The Moderating Effect of Social Comparison, Trust, Tie Strength, and Network Homophily on Brand Identification, Brand Engagement, Brand Commitment, and Membership Intention,” Telematics and Informatics 34, no. 1 (2017), https://doi.org/10.1016/j.tele.2016.06.004. Johnny Saldaña, The Coding Manual for Qualitative Researchers (Los Angeles: Sage Publications, 2013), 27. Julie Lê, “#Fashionlibrarianship: A Case Study on the Use of Instagram in a Specialized Museum Library Collection,” Art Documentation: Bulletin of the Art Libraries Society of North America 38, no. 2 (2019), https://doi.org/10.1086/705737 Kjersten L. Hild, “Outreach and Engagement through Instagram: Experiences with the Herman B Wells Library Account,” Indiana Libraries 33, no. 2 (2014), https://journals.iupui.edu/index.php/IndianaLibraries/article/view/16633 Lucy Hitz, “Instagram Impressions, Reach, and Other Metrics you Might be Confused About,” Sprout Blog, January 22, 2020, https://sproutsocial.com/insights/instagram-impressions/. Mark Aaron Polger and Karen Okamoto, “Who’s Spinning the Library? Responsibilities of Academic Librarians who Promote,” Library Management 34, no. 3 (2013), https://doi.org/10.1108/01435121311310914. Marshall Breeding, Next-Gen Library Catalogs (London: Facet Publishing, 2010) Nancy Dowd, “Social Media: Libraries are Posting, but is Anyone Listening?,” Library Journal 138, no. 10 (May 7, 2013), 12, https://www.libraryjournal.com/?detailStory=social-media-libraries-are-posting-but-is-anyone-listening. Nicole Tekulve and Katy Kelly, “Worth 1,000 Words: Using Instagram to Engage Library Users,” Brick and Click Libraries Symposium, Maryville, MO (2013), https://ecommons.udayton.edu/roesch_fac/20 Peter Fernandez, “‘Through the Looking Glass: Envisioning New Library Technologies’ Social Media Trends that Inform Emerging Technologies,” Library Hi Tech News 33, no. 2 (2016), https://doi.org/10.1108/LHTN-01-2016-0004. Pew Research Center, “Social Media Fact Sheet,” last modified June 12, 2019, http://www.pewinternet.org/fact-sheet/social-media/. Robert David Jenkins, “How Are U.S. Startups Using Instagram? An Application of Taylor's Six-Segment Message Strategy Wheel and Analysis of Image Features, Functions, and Appeals” (MA thesis, Brigham Young University, 2018), https://scholarsarchive.byu.edu/etd/6721. Robin M. Hastings, Microblogging and Lifestreaming in Libraries (New York: Neal-Schumann Publishers, 2010). Yeni Budi Rachman, Hana Mutiarani, and Dinda Ayunindia Putri, “Content Analysis of Indonesian Academic Libraries’ Use of Instagram,” Webology 15, no. 2 (2018), http://www.webology.org/2018/v15n2/a170.pdf Yuhen Hu, Lydia Manikonda, and Subbarao Kambhampati, “What We Instagram: A First Analysis of Instagram Photo Content and User Types,” Eighth International AAAI Conference on Weblogs and Social Media (2014), https://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/viewPaper/8118 Zelda Chatten and Sarah Roughley, “Developing Social Media to Engage and Connect at the University of Liverpool Library,” New Review of Academic Librarianship 22, no. 2/3 (2016), https://doi.org/10.1080/13614533.2016.1152985 PDF Published 2020-09-21 How to Cite Doney, J., Wikle, O., & Martinez, J. (2020). Likes, Comments, Views. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12211 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Jylisa Doney, Olivia Wikle, Jessica Martinez This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-5085 ---- A Collaborative Approach to Newspaper Preservation | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Editorials A Collaborative Approach to Newspaper Preservation Ana Krahmer University of North Texas Laura Douglas DOI: https://doi.org/10.6017/ital.v39i3.12593 Abstract This column explores a collaborative undertaking between the Denton Public Library in Denton, Texas, and the University of North Texas Libraries (UNT) to build digital access to the city of Denton’s newspaper of record, the Denton Record-Chronicle (DRC). The process included coordination with the newspaper publisher, solidifying agreements between the libraries, obtaining grant funding for the project, and ensuring scheduled uploads to build digital access to the DRC via The Portal to Texas History’s Texas Digital Newspaper Program (TDNP). TDNP builds open access to Texas newspapers, and the partnership between the Denton Public Library and UNT exemplifies the value of collaboration to preserving history and building digital access to research materials Author Biography Laura Douglas Laura Douglas, is the librarian in charge of the Special Collections with the Denton Public Library which houses the genealogy, Texana, and local Denton history collections as well as the Denton municipal archives. In her work, she regularly assists patrons with newspaper research questions specifically related to Denton newspapers. PDF Published 2020-09-21 How to Cite Krahmer, A., & Douglas, L. (2020). A Collaborative Approach to Newspaper Preservation. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12593 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Editorials Copyright (c) 2020 Ana Krahmer, Laura Douglas This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-5936 ---- What More Can We Do to Address Broadband Inequity and Digital Poverty? | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Editorials What More Can We Do to Address Broadband Inequity and Digital Poverty? Lori Bowen Ayre The Galecia Group DOI: https://doi.org/10.6017/ital.v39i3.12619 Abstract While libraries have always worked to help breach the digital divide by providing free Internet access, public access computers and teaching media literacy, the current pandemic has made it abundantly clear that much more needs to be done. This article proposes ways that libraries might work with community, state, national and even global partners to help promote universal broadband. References Cecilia Kang, “Parking Lots Have Become a Digital Lifeline,” The New York Times, May 20, 2020, https://www.nytimes.com/2020/05/05/technology/parking-lots-wifi-coronavirus.html. Erica Freudenberger, “Reopening Libraries: Public Libraries Keep Their Options Open,” Library Journal, June 25, 2020, https://www.libraryjournal.com/?detailStory=reopening-libraries-public-libraries-keep-their-options-open. Gina Millsap, “This was in April. Q. We’re starting a new school year and what has changed? A. Not much. It’s past time to get serious about universal broadband in the U.S.” Facebook, August 16, 2020, 5:37 a.m., https://www.facebook.com/gina.millsap.7/posts/10218986781485855. Accessed September 14, 2020. James K. Willcox, “Libraries and Schools Are Bridging the Digital Divide During the Coronavirus Pandemic,” Consumer Reports, last modified April 29, 2020, https://www.consumerreports.org/technology-telecommunications/libraries-and-schools-ridging-the-digital-divide-during-the-coronavirus-pandemic/. Jim Lynch, “The Gates Library Foundation Remembered: How Digital Inclusion Came to Libraries,” TechSoup, accessed August 24, 2020, https://blog.techsoup.org/posts/gates-library-foundation-remembered-how-digital-inclusion-came-to-libraries. Lara Fishbane and Adie Tomer, “Neighborhood Broadband Data Makes It Clear: We Need an Agenda to Fight Digital Poverty,” Brookings Institution, last modified February 6, 2020, https://www.brookings.edu/blog/the-avenue/2020/02/05/neighborhood-broadband-data-makes-it-clear-we-need-an-agenda-to-fight-digital-poverty/. Lauren Kirchner, “Millions of American Depend on Libraries for Internet. Now They’re Closed,” The Markup, June 25, 2020, https://themarkup.org/coronavirus/2020/06/25/millions-of-americans-depend-on-libraries-for-internet-now-theyre-closed. “Libraries are Filling the Homework Gap as Students Head Back to School,” Broadband USA, last modified September 4, 2018, https://broadbandusa.ntia.doc.gov/ntia-blog/libraries-are-filling-homework-gap-students-head-back-school. “Libraries Respond: COVID-19 Survey,” American Library Association, accessed August 25, 2020, http://www.ilovelibraries.org/sites/default/files/MAY-2020-COVID-Survey-PDF-Summary-of-Results-web-2.pdf. “Newsom Issues Executive Order on Digital Divide,” CHEAC (Improving the Health of All Californians), last modified August 14, 2020, https://cheac.org/2020/08/14/newsom-issues-executive-order-on-digital-divide/. Rashawn Ray, “Five Things John Lewis Taught us About Getting in ‘Good Trouble,’” Brookings Institution, last modified July 23, 2020, https://www.brookings.edu/blog/how-we-rise/2020/07/23/five-things-john-lewis-taught-us-about-getting-in-good-trouble/. Ry Marcattilio-McCracken, “Electric Cooperatives Partners with Dominion Energy to Bring Broadband to Rural Virginia,” last modified August 6, 2020, https://muninetworks.org/content/electric-cooperatives-partner-dominion-energy-bring-broadband-rural-virginia. Sarah Chase Webber, “The Library’s Role in Bridging the Digital Divide”, Urban Libraries Council, last modified March 28, 2019, https://www.urbanlibraries.org/blog/the-librarys-role-in-bridging-the-digital-divide. Tyler Cooper, “Bezos and Musk’s Satellite Internet Could Save Americans $30B a Year,” Podium: Opinion, Advice, and Analysis by the TNW Community, last modified August 24, 2019, https://thenextweb.com/podium/2019/08/24/bezos-and-musks-satellite-internet-could-save-americans-30b-a-year/. PDF Published 2020-09-21 How to Cite Ayre, L. B. (2020). What More Can We Do to Address Broadband Inequity and Digital Poverty?. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12619 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Editorials Copyright (c) 2020 Lori Bowen Ayre This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-6467 ---- Evaluating the Impact of the Long-S upon 18th-Century Encyclopedia Britannica Automatic Subject Metadata Generation Results | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Evaluating the Impact of the Long-S upon 18th-Century Encyclopedia Britannica Automatic Subject Metadata Generation Results Sam Grabus Drexel University DOI: https://doi.org/10.6017/ital.v39i3.12235 Abstract This research compares automatic subject metadata generation when the pre-1800s Long-S character is corrected to a standard < s >. The test environment includes entries from the third edition of the Encyclopedia Britannica, and the HIVE automatic subject indexing tool. A comparative study of metadata generated before and after correction of the Long-S demonstrated an average of 26.51 percent potentially relevant terms per entry omitted from results if the Long-S is not corrected. Results confirm that correcting the Long-S increases the availability of terms that can be used for creating quality metadata records. A relationship is also demonstrated between shorter entries and an increase in omitted terms when the Long-S is not corrected. References A. Belaid et al., “Automatic indexing and reformulation of ancient dictionaries“ (paper presented at the First International Workshop on Document Image Analysis for Libraries, Palo Alto, CA, 2004), https://doi.org/10.1109/DIAL.2004.1263264. Andrew West, “The Rules for Long-S," TUGboat 32, no. 1 (2011). Beatrice Alex et al., “Digitised Historical Text: Does it have to be mediOCRe" (paper presented at the KONVENS 2012 (LThist 2012 workshop), Vienna, September 21, 2012) G. Bueno-de-la-Fuente, D. Rodríguez Mateos, and J. Greenberg, “Chapter 10 - Automatic Text Indexing with SKOS Vocabularies in HIVE" (Elsevier Ltd, 2016) Ingrid Tieken-Boon van Ostade, “Spelling systems,“ in An Introduction to Late Modern English (Edinburgh University Press, 2009). Jane Greenberg et al., “HIVE: Helping interdisciplinary vocabulary engineering,“ Bulletin of the American Society for Information Science and Technology 37, no. 4 (2011), https://doi.org/10.1002/bult.2011.1720370407. John Walsh, “The use of Library of Congress Subject Headings in digital collections," Library Review 60, no. 4 (2011), https://doi.org/10.1108/00242531111127875. Karen Attar, “S and Long S," in Oxford Companion to the Book, eds. Michael Felix Suarez and H. R. II Woudhuysen (Oxford: Oxford University Press, 2010) Koraljka Golub et al., “A framework for evaluating automatic indexing or classification in the context of retrieval,“ Journal of the Association for Information Science and Technology 67, no. 1 (2016), https://doi.org/10.1002/asi.23600 Liz Woolcott, “Understanding Metadata: What is Metadata, and What is it For?,” Routledge (November 17, 2017), https://doi.org/10.1080/01639374.2017.1358232 Lynne C. Howarth, “Metadata and Bibliographic Control: Soul-Mates or Two Solitudes?,“ Cataloging & Classification Quarterly 40, no. 3-4 (2005), https://doi.org/10.1300/J104v40n03_03. Marcia Lei Zeng and Lois Mai Chan, “Metadata Interoperability and Standardization - A Study of Methodology, Part II," D-Lib Magazine 12, no. 6 (2006) “Nineteenth-century knowledge project," (GitHub Repository), 2020, https://tu-plogan.github.io/. Sam Grabus et al., “Representing Aboutness: Automatically Indexing 19th- Century Encyclopedia Britannica Entries,” NASKO 7 (2019), pp. 138-48, https://doi.org/10.7152/nasko.v7i1.15635. Sheila Bair and Sharon Carlson, “Where Keywords Fail: Using Metadata to Facilitate Digital Humanities Scholarship," Journal of Library Metadata 8, no. 3 (2008), https://doi.org/10.1080/19386380802398503. Ted Underwood, “A half-decent OCR normalizer for English texts after 1700," The Stone and the Shell, December 10, 2013, https://tedunderwood.com/2013/12/10/a-half-decent-ocr-normalizer-for-english-texts-after-1700/. PDF Published 2020-09-21 How to Cite Grabus, S. (2020). Evaluating the Impact of the Long-S upon 18th-Century Encyclopedia Britannica Automatic Subject Metadata Generation Results. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12235 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Sam Grabus This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-7029 ---- Analytics and Privacy | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Analytics and Privacy Using Matomo in EBSCO's Discovery Service Denise FitzGerald Quintel Middle Tennessee State University https://orcid.org/0000-0002-0730-6665 Robert Wilson Middle Tennessee State University https://orcid.org/0000-0002-6957-8869 DOI: https://doi.org/10.6017/ital.v39i3.12219 Abstract When selecting a web analytics tool, academic libraries have traditionally turned to Google Analytics for data collection to gain insights into the usage of their web properties. As the valuable field of data analytics continues to grow, concerns about user privacy rise as well, especially when discussing a technology giant like Google. In this article, the authors explore the feasibility of using Matomo, a free and open-source software application, for web analytics in their library’s discovery layer. Matomo is a web analytics platform designed around user-privacy assurances. This article details the installation process, makes comparisons between Matomo and Google Analytics, and describes how an open-source analytics platform works within a library-specific application, EBSCO’s Discovery Service. Author Biographies Denise FitzGerald Quintel, Middle Tennessee State University Discovery Services Librarian and Assistant Professor Robert Wilson, Middle Tennessee State University Systems Librarian and Assistant Professor References Adam Chandler and Melissa Wallace, “Using Piwik Instead of Google Analytics at the Cornell University Library.” Serials Librarian 71, no. 3 (October 2016): 174, https://doi.org/10.1080/0361526X.2016.1245645. Andrew Perrin, “Half of Americans Have Decided Not to Use a Product or Service Because of Privacy Concerns,” Pew Research, April 14, 2020, https://www.pewresearch.org/fact-tank/2020/04/14/half-of-americans-have-decided-not-to-use-a-product-or-service-because-of-privacy-concerns/. Ben Popken, “Google Sells the Future, Powered by Your Personal Data,” NBC News, May 10, 2018, https://www.nbcnews.com/tech/tech-news/google-sells-future-powered-your-personal-data-n870501 Brooke Auxier et al., “American and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information,” November 15, 2019, Pew Research, https://www.pewresearch.org/internet/wp-content/uploads/sites/9/2019/11/Pew-Research-Center_PI_2019.11.15_Privacy_FINAL.pdf. “Consumer Privacy Survey,” November 2019, CISCO, https://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-series-2019-cps.pdf. “Data Retention,” Google, https://support.google.com/analytics/answer/7667196?hl=en&ref_topic=2919631. Gail Herrera, “Measuring Link-Resolver Success: Comparing 360 Link with a Local Implementation of WebBridge,” Journal of Electronic Resources Librarianship 23, no. 4 (2011): 379–88, https://doi.org/10.1080/1941126X.2011.627809 “Google Advanced Protection Program,” Google, https://landing.google.com/advancedprotection/. “Google Analytics Opt-Out Browser Add-On,” Google, https://support.google.com/analytics/answer/181881. “Google Privacy and Terms, Advertising,” Google, https://policies.google.com/technologies/ads?hl=en-US. Himanshu Sharman, “Best Google Analytics Alternatives in 2020—Matomo & Piwik Pro,” OptimizeSmart (blog), March 30, 2020, https://www.optimizesmart.com/introduction-to-piwik-best-google-analytics-alternative. “How Do I Turn on the Do Not Track Features?,” Mozilla, https://support.mozilla.org/en-US/kb/how-do-i-turn-do-not-track-feature. Ian Barba et al., “Web Analytics Reveal User Behavior: TTU Libraries’ Experience with Google Analytics,” Journal of Web Librarianship 7, no. 4 (2013): 389–400, https://doi.org/10.1080/19322909.2013.828991. “IP Anonymization,” Google, https://developers.google.com/analytics/devguides/collection/analyticsjs/ip-anonymization. J. Clement, “Advertising Revenue of Google from 2001 to 2019,” Statista, February 5, 2020, https://www.statista.com/statistics/266249/advertising-revenue-of-google Jason D. Cooper and Alan May, “Library 2.0 at a Small Campus Library,” Technical Services Quarterly 26, no. 2 (2009): 89–95, https://doi.org/10.1080/07317130802260735 Julie Arendt and Cassie Wagner, “Beyond Description: Converting Web Site Usage Statistics into Concrete Site Improvement Ideas,” Journal of Web Librarianship 4, no. 1 (2010): 37–54, https://doi.org/10.1080/19322900903547414 Junior Tidal, “Using Web Analytics for Mobile Interface Development,” Journal of Web Librarianship 7, no. 4 (2013): 451–64, http://doi.org/10.1080/19322909.2013.835218 Katherine Schwab, “It’s Time to Ditch Google Analytics,” Fast Company, February 1, 2019, https://www.fastcompany.com/90300072/its-time-to-ditch-google-analytics. Kieren McCarthy, “Do Not Track Is Back in the US Senate,” The Register, May 20, 2019, https://www.theregister.co.uk/2019/05/20/do_not_track Lemon, “A Comparison of Data: Piwik vs. Google Analytics,” The FPlus (blog), November 30, 2016, https://thefpl.us/wrote/about-piwik “Licenses,” Matomo.org, https://matomo.org/licences. Lily Hay Newman, “The Privacy Battle to Save Google From Itself,” Wired, November 1, 2018, https://www.wired.com/story/google-privacy-data/ “Managing Your Database’s Size,” Matomo.org, https://matomo.org/docs/managing-your-databases-size/ - deleting-old-unprocessed-data. “Matomo (software),” Wikipedia, https://en.wikipedia.org/wiki/Matomo_(software). “Matomo and phpMyVisites,” Matomo.org, https://matomo.org/faq/general/faq_437. “Matomo Requirements,” Matomo.org, https://matomo.org/docs/requirements. “Matomo vs. Google Analytics 360,” Matomo.org, https://matomo.org/matomo-vs-google-analytics comparison Mohammad Azim and Nabi Hasan, “Web Analytics Tools Usage among Indian Library Professionals,” 2018 5th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, (2018): 31-35, https://doi.org/10.1109/ETTLIS.2018.8485212. Patrick O’Brien et al., “Protecting Privacy on the Web: A Study of HTTPS and Google Analytics Implementation in Academic Library Websites,” Online Information Review 42, no. 6 (2018): 734–51, https://doi.org/10.1108/OIR-02-2018-0056. Paul Betty, “Assessing Homegrown Library Collections: Using Google Analytics to Track Use of Screencasts and Flash-Based Learning Objects,” Journal of Electronic Resources Librarianship 21, no. 1 (2009): 75–92, https://doi.org/10.1080/19411260902858631 Ramiro Federico Uviña, “Bibliotecas Y Analítica Web: Una Cuestión De Privacidad = Libraries and Web Analytics: A Privacy Matter,” Información, Cultura Y Sociedad no. 33 (2015): 105–12, http://revistascientificas.filo.uba.ar/index.php/ICS/article/view/1906 Richard Graham, “Google and Advertising: Digital Capitalism in the Context of Post-Fordism, the Reification of Language, and the Rise of Fake News,” Palgrave Communications 3, no. 45 (2017): 2-4, https://doi.org/10.1057/s41599-017-0021-4. Ryan Singel, “Google Holds Out Against ‘Do Not Track’ Flag,” Wired, April 15, 2011, https://www.wired.com/2011/04/chrome-do-not-track Shayna Pekala, “Privacy and User Experience in 21st Century Library Discovery,” Information Technology & Libraries 36, no. 2 (2017): 50, https://doi.org/10.6017/ital.v36i2.9817. Stephan Spitzer, “Better Control of User Web Access of Electronic Resources,” Journal of Electronic Resources in Medical Libraries 6, no. 2 (2009): 91–100, https://doi.org/10.1080/15424060902931997 Steven J. Turner, “Website Statistics 2.0: Using Google Analytics to Measure Library Website Effectiveness,” Technical Services Quarterly 27, no. 3 (2010): 261–78, https://doi.org/10.1080/07317131003765910 Sukumar Mandal, “Site Metrics Study of Koha OPAC through Open Web Analytics and Piwik Tools,” Library Philosophy and Practice (2019), https://digitalcommons.unl.edu/libphilprac/2835 Tabatha A. Farney, “Click Analytics: Visualizing Website Use Data,” Information Technology & Libraries 30, no. 3 (2011): 141–8, https://doi.org/10.6017/ital.v30i3.1771. Tabatha Farney and Nina McHale, “Introducing Google Analytics for Libraries,” Library Technology Reports 49, no. 4 (May 2013): 5, https://journals.ala.org/ltr/article/download/4269/4881. Wayne Loftus, “Demonstrating Success: Web Analytics and Continuous Improvement,” Journal of Web Librarianship 6, no. 1 (2012): 45–50, https://doi.org/10.1080/19322909.2012.651416 PDF Published 2020-09-21 How to Cite Quintel, D., & Wilson, R. (2020). Analytics and Privacy. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12219 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Denise Quintel, Robert Wilson This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-8005 ---- In the Middle of Difficulty Lies Opportunity | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Editorials In the Middle of Difficulty Lies Opportunity Hope Floats Evviva Weinraub Lajoie University at Buffalo DOI: https://doi.org/10.6017/ital.v39i3.12687 Abstract Message from the last LITA President.  PDF Published 2020-09-21 How to Cite Weinraub Lajoie, E. (2020). In the Middle of Difficulty Lies Opportunity. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.12687 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Editorials Copyright (c) 2020 Evviva Weinraub Lajoie This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue doi-org-9652 ---- Integrated Technologies of Blockchain and Biometrics Based on Wireless Sensor Network for Library Management | Information Technology and Libraries Skip to main content Skip to main navigation menu Skip to site footer Current Archives Announcements About About the Journal Editorial Team Submissions Contact Privacy Statement Search Search Register Login Home / Archives / Vol 39 No 3 (2020) / Articles Integrated Technologies of Blockchain and Biometrics Based on Wireless Sensor Network for Library Management Meng-Hsuan Fu Shih Hsin University DOI: https://doi.org/10.6017/ital.v39i3.11883 Abstract The Internet of Things (IoT) is built on a strong internet infrastructure and many wireless sensor devices. Presently, Radio Frequency Identification embedded (RFID-embedded) smart cards are ubiquitous, used for many things including student ID cards, transportation cards, bank cards, prepaid cards, and citizenship cards. One example of places that require smart cards is libraries. Each library, such as a university library, city library, local library, or community library, has its own card and the user must bring the appropriate card to enter a library and borrow material. However, it is inconvenient to bring various cards to access different libraries. Wireless infrastructure has been well developed and IoT devices are connected through this infrastructure. Moreover, the development of biometric identification technologies has continued to advance. Blockchain methodologies have been successfully adopted in various fields. This paper proposes the BlockMetrics library based on integrated technologies using blockchain and finger-vein biometrics, which are adopted into a library collection management and access control system. The library collection is managed by image recognition, RFID, and wireless sensor technologies. In addition, a biometric system is connected to a library collection control system, enabling the borrowing procedure to consist of only two steps. First, the user adopts a biometric recognition device for user authentication and then performs a collection scan with the RFID devices. All the records are recorded in a personal borrowing blockchain, which is a peer-to-peer transfer system and permanent data storage. In addition, the user can check the status of his collection across various libraries in his personal borrowing blockchain. The BlockMetrics library is based on an integration of technologies that include blockchain, biometrics, and wireless sensor technologies to improve the smart library. References Abderahman Rejeb, John G. Keogh and Horst Treiblmaier, “Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management,” Future Internet, 11, no. 7 (2019): 161 Asma Khatoon, “A Blockchain-Based Smart Contract System for Healthcare Management,” Electronics, 9, no. 1 (2020): 94. David Shrier, Weige Wu, and Alex Pentland, “Blockchain & infrastructure (identity, data security),” Connection Science & Engineering, Massachusetts Institute of Technology, 2016. Gartner, “Smart With Gartner, Gartner Top 10 Strategic Technology Trends for 2017,” https://www.gartner.com/smarterwithgartner/gartners-top-10-technology-trends-2017/. Gartner, “Smart With Gartner, Gartner Top 10 Strategic Technology Trends for 2018,” https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2018/ Gartner, “Smart With Gartner, Gartner Top 10 Strategic Technology Trends for 2019,” https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2019/ Gartner, “Smart With Gartner, Gartner Top 10 Strategic Technology Trends for 2020,” https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/ Guang Chen et al., “Exploring blockchain technology and its potential applications for education,” Smart Learning Environments, 5, no. 1 (2018), https://doi.org/10.1186/s40561-017-0050-x Kristián Košt’ál et al., “On Transition between PoW and PoS,” International Symposium ELMAR (2018). National Central Library, “National Central Library Reader Service Directions,” November 11, 2016, https://enwww.ncl.edu.tw/content_26.html. Nir Kshetri and Jeffrey Voas, “Blockchain in Developing Countries,” IT Professional, 20, no.2 (2018): 11-14. Pinyaphat Tasatanattakool and Chian Techapanupreeda, “Blockchain: Challenges and applications,” 2018 International Conference on Information Networking (ICOIN), (2018), https://doi.org/10.1109/ICOIN.2018.8343163 Quoc Khanh Nguyen, Quang Vang Dang, “Blockchain Technology for the Advancement of the Future,” 4th International Conference on Green Technology and Sustainable Development, (2018) Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System” (2009), https://bitcoin.org/bitcoin.pdf. Shangping Wang, Yinglong Zhang, and Yaling Zhang, “A Blockchain-Based Framework for Data Sharing with Fine-Grained Access Control in Decentralized Storage Systems,” 2018 IEEE Access, 6 (2018):38437-38450. Shih Hsin University Library, “Library Regulations, Access to SHU Libraries,” http://lib.shu.edu.tw/e_orders_enter.htm Shih Hsin University Library, “Library Regulations, Borrowing Policies,” accessed September 25, 2019, http://lib.shu.edu.tw/e_orders_borrows.htm. Stanislaw P. Stawicki, Michael S. Firstenberg, and Thomas J. Papadimos, “What’s new in academic medicine? blockchain technology in health-care: bigger, better, fairer, faster, and leaner,” International Journal of Academic Medicine, 4, no. 1 (2018): 1-11 Stephen Cass, “The Top Programming Languages 2019,” IEEE Spectrum (2019), https://spectrum.ieee.org/computing/software/the-top-programming-languages-2019. Sudhinder Singh Chowhan and Ganeshchandra Shinde, “Iris Biometrics Recognition Application in Security Management,” 2008 Congress on Image and Signal Processing. Taipei Public Library, “Regulation of Circulation Services,” June 13, 2018, https://english.tpml.gov.taipei/cp.aspx?n=AF5CCA6FC258864E. Takeshi Ogawa, Hayato Kima, and Noriharu Miyaho, “Proposal of Proof-of-Lucky-ID (PoL) to Solve the Problems of PoW and PoS,” IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data (2018). Thomas P. Keenan, “Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems,” 15th Annual Conference on Privacy, Security and Trust (2017). PDF Published 2020-09-21 How to Cite Fu, M.-H. (2020). Integrated Technologies of Blockchain and Biometrics Based on Wireless Sensor Network for Library Management. Information Technology and Libraries, 39(3). https://doi.org/10.6017/ital.v39i3.11883 More Citation Formats ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Download Citation Endnote/Zotero/Mendeley (RIS) BibTeX Issue Vol 39 No 3 (2020) Section Articles Copyright (c) 2020 Meng-Hsuan Fu This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Open Journal Systems Information For Readers For Authors For Librarians Current Issue support-google-com-7798 ---- Data retention - Analytics Help Analytics Help Account Search Maps YouTube Play News Gmail Meet Contacts Drive Calendar Translate Photos Duo Chrome Shopping Finance Docs Sheets Slides Books Blogger Hangouts Keep Jamboard Earth Collections Arts and Culture Google Ads Podcasts Stadia More from Google Sign in Search Clear search Close search Google apps Main menu Google Help Help Center Community Analytics Privacy Policy Terms of Service Submit feedback Send feedback on... This help content & information General Help Center experience Next Help CenterCommunity Analytics Data privacy and security Data retention Data retention The Google Analytics Data Retention controls give you the ability to set the amount of time before user-level and event-level data stored by Google Analytics is automatically deleted from Analytics servers. User and event data retention The retention period applies to user-level and event-level data associated with cookies, user-identifiers (e.g., User-ID) and advertising identifiers (e.g., DoubleClick cookies, Android’s Advertising ID, Apple’s Identifier for Advertisers). Keep in mind that standard aggregated Google Analytics reporting is not affected. The user and event data managed by this setting is needed only when you use certain advanced features like applying custom segments to reports or creating unusual custom reports. While the retention period and user-activity reset controls cover event and user-level data stored by Google Analytics, certain user-keyed data is by default deleted by Google Analytics after 6 months of inactivity for a given user. You can choose how long Analytics retains data before automatically deleting it. The maximum amount of time that Analytics will retain Google-signals data is 26 months, regardless of your settings. For Universal Analytics properties, the setting applies to user-level and event-level data. You can choose: 14 months 26 months 38 months 50 months Do not automatically expire Increasing the retention period or changing it to Do not automatically expire, however, does not affect data that you have already collected. For example, data collected when 14 months was in effect will still be deleted 14 months after it was collected even if you change the retention period to 26 months.   For Google Analytics 4 properties, retention of user-level data, including conversions, is fixed at up to 14 months. For all other event data, you may choose the length of retention: 2 months 14 months The two-month retention period is always applied to age, gender, and interest data regardless of your settings. Increasing the retention period or changing it to Do not automatically expire is applied to data that you have already collected.   When data reaches the end of the retention period, it is deleted automatically on a monthly basis. If you reduce the retention period, then any affected data is deleted during the next monthly process. For example, if you change from 26 months to 14 months, then any data older than 14 months is deleted during the next monthly process. Whenever you modify the retention period, Analytics waits 24 hours before implementing the change. During this 24-hour period, you can revert your change and your data will be unaffected. If you use a date range for non-aggregated reports that is longer than your retention period, then data for that additional time is not visible in reports. For example, if you set retention to 14 months and you use a date range of 14 months + 1 day, then data for the additional 1 day is not available in your reports. Reset on new activity Turn this option ON to reset the retention period of the user identifier with each new event from that user (thus setting the expiration date to current time plus retention period). For example, if data retention is set to 14 months but a user initiates a new session every month, then that user's identifier is refreshed every month and never reaches the 14-month expiry. If the user doesn't initiate a new session before the retention period expires, then that user's data is deleted. If you do not want the retention period for a user identifier reset when that user has new activity, turn this option OFF. Data associated with the user identifier will be deleted automatically after the retention period. The reset feature applies to only user-level data. Set the options You need Edit permission to set this option for a Google Analytics property. Sign in to Google Analytics.. Click Admin, and navigate to the property you want to edit. For web properties: In the PROPERTY column, click Tracking Info > Data Retention. For Google Analytics 4 properties: In the PROPERTY column, click Data Settings > Data Retention. For web properties: User and event data retention: select the retention period you want. For Google Analytics 4 properties: Event data retention: select the retention period you want. For web properties: Reset on new activity: turn the switch on or off. For Google Analytics 4 properties: Reset user data on new activity: turn the switch on or off. Click Save. Data retention and the Users metric As of February of 2018, we added the Users metric to many additional reports. Because this metric is new in these reports, we do not have aggregated data for this metric for all of these reports for all time. This may impact your historical reporting: you may see zeros for User counts prior to the time for which we have aggregated data for that metric. We began aggregating data for 360 properties on May 1, 2016, and for standard properties on Sept 1, 2016. This does not affect the Audience Overview report, however, which has aggregated User data for a much longer period of time. Was this helpful? How can we improve it? YesNo Submit Need more help? Sign in for additional support options to quickly solve your issue Sign in true Data privacy and security Safeguarding your data Privacy controls in Google Analytics Data sharing settings Consent mode (beta) IAB Transparency and Consent Framework v2 and Google Analytics Google Analytics opt-out browser add-on IP Anonymization (or IP masking) in Analytics Policy requirements for Google Analytics Advertising Features Security and privacy in Universal Analytics We use our own products Data Processing Terms Data retention Data-deletion requests (Google Analytics 4) Data deletion requests (Universal Analytics) ISO 27001 Certification Google Analytics linking overview Account setup with additional privacy features Best practices to avoid sending Personally Identifiable Information (PII) Policy Against Fingerprints and Locally Shared Objects Get the guide Learn how Google Analytics can improve your Google Ads results. Get the guide ©2020 Google Privacy Policy Terms of Service català‎ dansk‎ Deutsch‎ español‎ Filipino‎ français‎ hrvatski‎ Indonesia‎ italiano‎ latvieÅ¡u‎ lietuvių‎ magyar‎ Nederlands‎ norsk‎ polski‎ português‎ português (Brasil)‎ română‎ slovenÄ�ina‎ slovenÅ¡Ä�ina‎ suomi‎ svenska‎ Tiếng Việt‎ Türkçe‎ Ä�eÅ¡tina‎ Ελληνικά‎ българÑ�ки‎ руÑ�Ñ�кий‎ Ñ�рпÑ�ки‎ українÑ�ька‎ ‏ עברית‏ العربيةहिनà¥�दी‎ ไทย‎ 中文(简体)‎ 中文(ç¹�體)‎ 日本語‎ 한국어‎ English‎ Enable Dark Mode Send feedback on... This help content & information General Help Center experience Search Help Center true 69256 false tedunderwood-com-8283 ---- A half-decent OCR normalizer for English texts after 1700. | The Stone and the Shell The Stone and the Shell Using large digital libraries to advance literary history Search Main menu Skip to primary content Home 18c tree About this blog Open data Tech note Ted Underwood Post navigation ← Previous Next → A half-decent OCR normalizer for English texts after 1700. Posted on December 10, 2013 by tedunderwood Perhaps not the most inspiring title. But the words are carefully chosen. Basically, I’m sharing the code I use to correct OCR in my own research. I’ve shared parts of this before, but this is the first time I’ve made any effort to package it so that it will run on other people’s machines. If you’ve got Python 3.x, you should be able to clone this github repository, run OCRnormalizer.py, and point it at a folder of files you want corrected. The script is designed to handle data structures from HathiTrust, so (for instance) if you have zip files contained in a pairtree structure, it will recursively walk the directories to identify all zip files, concatenate pages, and write a file with the suffix “.clean.txt” in the same folder where each zip file lives. But it can also work on files from another source. If you point it at a flat folder of generic text files, it will correct those. I’m calling this an OCR “normalizer” rather than “corrector” because it’s designed to accomplish very specific goals. In my research, I’m mainly concerned with the kinds of errors that become problems for diachronic text mining. The algorithms I use can handle a pretty high level of error as long as those errors are distributed in a more-or-less random way. If a word is mistranscribed randomly in 200 different ways, each of those errors may be rare enough to drop out of the analysis. You don’t necessarily have to catch them all. The percentage of tokens in the HathiTrust corpus that are recognized as words before (red) and after (black) correction by my script. Technically this is not “recall” but a count of (true and false) “positives.” The errors that become problems are the ones that cluster in particular words or periods. The notorious example is eighteenth-century “long S,” which caufes subftantial diflortions before 1820. Other errors caused by ligaturcs and worn typc also tend to cluster toward the early end of the timeline. But as you can see in the illustration above, long S is a particularly big issue; there’s a major improvement in OCR transcription shortly after 1800 as it gets phased out. The range of possible OCR errors is close to infinite. It would be impossible to catch them all, and as you can see above, my script doesn’t. For a lot of nineteenth-century texts it produces a pretty small improvement. But it does normalize major variations (like long S) that would otherwise create significant distortions. (In cases like fame/same where a word could be either an OCR error or a real word, it uses the words on either side to disambiguate.) Moreover, certain things that aren’t “errors” can be just as problematic for diachronic analysis. E.g., it’s a problem that “today” is sometimes written “to day” and sometimes “to-day,” and it’s a problem that eighteenth-century verbs get “condens’d.” A script designed to correct OCR might leave these variants unaltered, but in order to make meaningful diachronic comparisons, I have to produce a corpus where variations of spelling and word division are normalized. The rulesets contained in the repo standardize (roughly) to modern British practice. Some of the rules about variant spellings were originally drawn, in part, from rules associated with the Wordhoard project, and the some of the rules for OCR correction were developed in collaboration with Loretta Auvil. Subfolders of the repo contain scripts I used to develop new rules. I’ve called this release version 0.1 because it’s very rough. You can write Python in a disciplined, object-oriented way … but I, um, tend not to. This code has grown by accretion, and I’m sure there are bugs. More importantly, as noted above, this isn’t a generic “corrector” but a script that normalizes in order to permit diachronic comparison. It won’t meet everyone’s needs. But there may be a few projects out there that would find it useful as a resource — if so, feel free to fork it and alter it to fit your project! Share this: Twitter Like this: Like Loading... Related This entry was posted in collection-building, OCR correction by tedunderwood. Bookmark the permalink. About tedunderwood Ted Underwood is Professor of Information Sciences and English at the University of Illinois, Urbana-Champaign. On Twitter he is @Ted_Underwood. View all posts by tedunderwood → 8 thoughts on “A half-decent OCR normalizer for English texts after 1700.” Pingback: Resource: An OCR normalizer for English texts after 1700 | Digital Humanities Now Martin Reynaert on December 13, 2013 at 8:30 am said: Dear Ted, Thank you for this blog! It is with great pleasure that I learn I am not the sole person in the world to attempt to clean up or normalize collections of digitized texts. The main paper describing my efforts is here, in Open Access: http://link.springer.com/article/10.1007%2Fs10032-010-0133-5#page-1 The problem of evaluating one’s attempts has fascinated (and frustrated at times) me for years (cf. http://www.lrec-conf.org/proceedings/lrec2008/summaries/477.html ). I do think you have chosen the words in your title very carefully. But for me to properly appraise them I have to ask you to elucidate a few points about the graph you provide. The caption to your graph states “The percentage of tokens in the HathiTrust corpus that are recognized as words”. What exactly does each data point in the graph represent? Is it the cumulative result of your system’s achievements on perhaps one book published in the particular year? Or is this on all the Hathi books in English? I have recently had occasion to take a closer look at the Hathi collections and a lot of books seemed not accessible. Also, how do you determine a word is correct? Is this in reference to a validated lexicon? Is this lexicon perhaps available? Sure what is correct or not depends on the coverage of the lexicon one uses? Or do you actually have OCR ground truths or OCR post-correction gold standards for so many books? I do not quite see how else one can evaluate whether a word in context (‘it uses the words on either side to disambiguate’) was properly corrected. Would these ground truths then be available to others for research? Thank you for sharing your tool! I will definitely try it. Looking forward for any additional information you can give! Best regards, Martin Reynaert Postdoc Researcher TiCC – Tilburg University CSLT – Radboud University The Netherlands Reply ↓ tedunderwood on December 13, 2013 at 12:56 pm said: Hi Martin — Thanks for those links. I’m collaborating with a couple of other people on the problem of OCR evaluation, and these leads will be very helpful. The graph is based on 470,000 volumes from HathiTrust 1700-1899; it’s the majority of English non-serial volumes in that period. (Illinois has signed an agreement with HathiTrust, which gives me access to public-domain works for research purposes.) So each data point is the average percentage of tokens recognized as words in a given year. It’s a pretty big corpus, but I haven’t tried to do a thorough, systematic, evaluation of accuracy yet. As you rightly note in your paper, evaluation requires attention to both “recall” and “precision,” and I’m not attempting that yet. The graph above is just “the number of tokens recognized as words,” and you’re absolutely right that this figure will depend on dictionary coverage. I use a multi-lingual dictionary, but no dictionary includes all possible languages, all possible proper nouns, etc. Moreover, by its very nature, this isn’t a metric that can be used to evaluate contextual spellchecking of pairs like “fame/same.” To evaluate that part of the workflow, you’re right, I would need to use manually-entered ground truth (e.g. the TCP-ECCO corpus.) In short, I’m not making strong claims about accuracy here. The word “half-decent” in the title is very deliberately chosen. This is not a publication: it’s a patch that I’ve created, largely on my own time, because I needed *some* patch for this problem. In research on the corrected corpus, I have found in practice that it lacks the large obvious distortions that previously made diachronic analysis impossible. But I haven’t made an effort to rigorously quantify the level of error that remains. I think some of the people I’m collaborating with will produce quantitative accuracy metrics fairly soon. But for me the key is this: even if I had a figure based on ground truth (e.g. “90% precision”), it wouldn’t tell me what I actually need to know — which is whether the errors (and accurate variants) that remain are distributed in a way that becomes problematic for a particular historical problem or kind of algorithmic analysis. That question is the decisive one for me, and it’s still going to require case-by-case attention. Reply ↓ Beatrice Alex on January 16, 2014 at 4:18 am said: A great blog post and thanks for sharing the code. There is definitely a need for more research on quantitative accuracy metrics for OCRed text, especially when it comes to using it for any kind of text processing. So I’ll be looking forward to see more work in this area. In your comment above you mention that each data point represents the average percentage of tokens recognised as a word in a given year. You might just have used the wrong expression as you can’t average percentage unless the document lengths are the same. You need to compute one percentage of words found in the dictionary for all documents in the same year. The reason being is that averaging percentages will skew the results if the length of documents varies much across years. For example, if you have three documents for year 1: with 50/100, 300/600 and 500/1500 words in the dictionary. The average percentage would be 44.4444444. The percentage across all documents is 850/2200*100=38.6363636363636. You have another three documents for year 2: with 400/800, 600/1200 and 500/1500 words in the dictionary. The first 2 documents are longer but have the same percentage of words in the dictionary as the first two documents in year 1. The average percentage is still 44.4444444. However, the recall percentage across all documents is 1500/3500*100=42.8571428571429. I’d also be really interested to know what’s going on for the outliers in your graph. Beatrice Alex School of Informatics, University of Edinburgh Reply ↓ tedunderwood on January 18, 2014 at 5:01 am said: Yep — you’re quite correct that there’s a difference. The graph above is based on calculations that don’t weight documents by length; for simplicity’s sake, I’ve treated each document as an equivalent data point. But I’m really not aiming to evaluate accuracy with any finesse here: the point of the illustration is purely to show the gross difference between the way correction works in the 18th century and the way it works in the 19th century. The end of “long s” is a very significant change that dwarfs a lot of subtler issues — that’s all the illustration is meant to reveal. Reply ↓ Pingback: Possibly helpful for cleaning 18th C OCR, @ihoffman. https://tedunderwood.com/2013/12/10/a-half-decent-ocr-normalizer-for-english-texts-after-1700/ John Levin (@anterotesis) on June 30, 2015 at 9:07 am said: Are you still maintaining this? Have just started using it and found a couple of bugs. John Reply ↓ Pingback: OCR Correction script Leave a Reply Cancel reply Enter your comment here... Fill in your details below or click an icon to log in: Email (required) (Address never made public) Name (required) Website You are commenting using your WordPress.com account. ( Log Out /  Change ) You are commenting using your Google account. ( Log Out /  Change ) You are commenting using your Twitter account. ( Log Out /  Change ) You are commenting using your Facebook account. ( Log Out /  Change ) Cancel Connecting to %s Notify me of new comments via email. Notify me of new posts via email. Blog at WordPress.com. Post to Cancel %d bloggers like this: themarkup-org-4485 ---- Millions of Americans Depend on Libraries for Internet. Now They’re Closed – The Markup Ask The Markup Election 2020 Banned Bounty Google the Giant Blacklight Locked Out Search term About Us Donate Events Have a Tip? Jobs Newsletter Team Facebook Twitter Instagram RSS Feed Skip navigation Menu The Markup Donate About Us Donate Big Tech Is Watching You. We’re Watching Big Tech. Coronavirus Millions of Americans Depend on Libraries for Internet. Now They’re Closed From big cities to tiny towns, librarians are getting scrappy to meet the need By Lauren Kirchner June 25, 2020 10:00 ET A sign displayed on the lawn of West Dennis Library in Massachusetts, on March 18. John Tlumacki/The Boston Globe/Getty Images Share This Article Copy Link Republish On a typical afternoon in The Before Times, the Cherokee Public Library in Cherokee, Iowa (pop. 4,900), would be full of kids. A chatty crowd of three or four dozen middle- and high-schoolers would hang out, do their homework, and socialize in the library’s computer lab—either using one of the library’s public desktops or Chromebooks, or connecting with their own smartphones to the fast Wi-Fi.  Broadband access is rare in Cherokee, said Tyler Hahn, the library’s director; most homes have either hotspots that rely on spotty cell service or satellite access that goes out every time the weather shifts. About 40 percent of school-aged kids have no internet access at home at all, he said. Since COVID-19 forced the library to close in mid-March, the computer lab is empty. But the library is still many residents’ most reliable source of connectivity to the digital world.  Kids sit scattered in the library’s parking lot with phones or video game devices, catching some of the Wi-Fi outside that’s now left on 24/7.  And Hahn spends his days trying to help some older patrons get online by shouting instructions to them through the library’s windows.  Hahn spends his day … shouting instructions to patrons through the library’s windows. “We have a lot of people who switched from shopping in stores to using Amazon for the first time in their lives,” said Hahn. “Through the window, we were walking them through the steps.”  People have also come to the library to ask Hahn for the phone number to call to apply for unemployment benefits, since they can’t look it up online themselves, he said. They’ve dropped dollar bills through the book slot to pay for printouts of forms.  “It’s been completely bizarre,” said Hahn. Libraries are still just about the only place in America anyone can go and sit and use a computer and the internet without buying anything. All over the country, library closures during the pandemic have highlighted just how many people have no dependable source of internet on their own.   People in Rural Areas Are Less Likely to Have Access Percent of Americans who say they have broadband internet at home Urban Suburban Rural 0% 20% 40% 60% 80% 100% 2000 2005 2010 2015 2019 Source: Pew Research Center Survey According to a Pew survey published last year, less than two-thirds of Americans in rural areas have a broadband internet connection at home. Among Americans with household incomes below $30,000, four out of 10 don’t have a computer, and three out of 10 don’t have a smartphone. Digital disparities are particularly stark in rural areas, but even the most-connected cities aren’t immune. A survey by the New York City Bar Association last month found that only 6 percent of the city’s homeless shelters have internet access. On the first day of the New York City public school district’s remote-learning program, more than 20,000 school-age children were living in the city’s shelters, according to CityLimits. “We’ve long known at the library how hard it is to be at the wrong end of the digital divide,” said Linda Johnson, CEO and president of Brooklyn Public Library, “but this pandemic has shone a spotlight on it like never before.”  Librarians, well aware of their role, have been finding creative ways to get Wi-Fi to the underconnected areas of their cities and towns, and to help get their less digitally literate patrons up to speed.  A majority of libraries across the country are boosting their Wi-Fi signals and keeping them on all day and night, according to a Public Library Association survey in March. There are roving Bookmobiles pumping Wi-Fi throughout surrounding neighborhoods, says Marijke Visser, senior policy advocate at the American Library Association (ALA), and one library in Arkansas is starting to expand its Wi-Fi coverage by partnering with fire stations to install extra routers there. Wi-Fi hotspot lending programs are also proving vital. New York City and Chicago libraries have been lending out hotspots for years to anyone who wants them. Seattle’s public library system now has 1,000 hotspots to lend, several hundred of which are set aside for people most in need. Librarians in Seattle partner with local community groups to lend them directly to those experiencing homelessness and those living in the city’s “tiny home” villages. Since the pandemic, they’ve increased the number of devices for people in need from 250 to 325. All are available to borrow for several months at a time and are often paired with training sessions from library staff, said Andrew Harbison, assistant director of Collections and Access at Seattle Public Library. We’ve long known at the library how hard it is to be at the wrong end of the digital divide. Linda Johnson, CEO of Brooklyn Public Library Hahn, the Cherokee Library director, says he would love to lend out Wi-Fi hotspots in addition to the few Chromebooks his library has but thinks community need is so vast that any program he started with current resources would be quickly overwhelmed. The local public high school let students bring laptops home to use for their (voluntary) remote-learning program, but not hotspots, he said. Several librarians independently said that their hotspot-lending programs are “just a drop in the bucket” or “just a Band-Aid” to the overwhelming need for reliable internet and the basic skills to use it. “Even to work at McDonald’s, you’ll get a 30-page online application, and if you’re not comfortable with a drop-down menu, this is really going to be a challenge,” said Kate Eppler, manager of The Bridge at Main, a literacy and learning center in the San Francisco Public Library system. “Digital literacy is a lot like print literacy—it’s something you can get comfortable with, but it takes practice and can take a lot of help.” Eppler and her colleagues are still working behind closed doors, answering people’s questions through the main phone line since the library remains closed. She also regularly refers people to the nonprofit Community Tech Network’s Home Connect program, which provides free computers and lessons to seniors in the area, and the Tenderloin Technology Lab, a free computer lab that has moved outdoors (with plastic gloves and social distancing) since the coronavirus crisis began. “We have a lot of folks trying to get online to access their stimulus checks—people who maybe don’t have a permanent address to have their checks sent to them and have been unable to access the money they should be receiving,” said Amanda Brown, the Tenderloin Technology Lab’s manager.  A library in Arlington County, Va., advertises its curbside Wi-Fi access while it's closed.The Washington Post/Getty Images Libraries have been providing other resources since the shutdown as well. Many have started curbside book pickups. They’re doing Facebook Live story hours for kids or reading books over the radio. They’re printing out paper applications for unemployment benefits, then collecting and mailing them. In Cherokee, Hahn has been putting books and art supplies into the free lunch bags that the public schools are distributing this summer. Some librarians are even using their libraries’ 3D printers to make plastic face shields, and sewing machines to make fabric masks.  Librarians also expect demand to grow as shutdowns end, especially for the job seeker programs many of them run.  “We know that in times of recession, like during the last one, that demand for workforce related services skyrocketed,” said the ALA’s Visser. “So now, thinking about all of the people who have lost jobs or businesses that have closed.… We know that that is going to be a number one thing that people are going to be doing when libraries are reopening.” But the recession also has local government budgets shrinking and private donations taking a hit—things libraries depend on. When the Public Library Association’s survey in March asked about library staff’s greatest needs, funding and increased job-search-related services post-pandemic were among the most common responses.  The CARES Act did provide for stimulus funds to local libraries, $30 million of which has already gone to the states to expand local libraries’ digital access programs. According to Visser, the ALA is pushing Congress for $2 billion more. Money isn’t the only consideration: Brooklyn Public Library’s Johnson pointed out that in the city, space is at a premium. As they plan how libraries will reopen, she said, librarians are currently discussing taking out every other computer in each lab to create more distance between patrons. “Never before did people need access more—in a day and age where the government is requiring more and more to happen online—than during a pandemic,” said Johnson. “It is a true perfect storm: The deprivation is more extreme than ever, and the need is higher.” Support The Markup Your contributions help us investigate how powerful institutions’ use of technology affects our society. Please donate today! Donate You just read Millions of Americans Depend on Libraries for Internet. Now They’re Closed From the series — Coronavirus Share This Article Copy Link Republish Credits Lauren Kirchner Investigative Reporter Close Republish Millions of Americans Depend on Libraries for Internet. Now They’re Closed We’re happy to make this story free and available to republish for free under an Attribution-NonCommercial-NoDerivatives Creative Commons license. This allows you to republish the article, but does not include the images or graphics other than the credit image. You must credit The Markup. If The Markup credit image is incompatible with your CMS, please let us know if you remove it. To republish, simply copy the HTML that we have provided and publish it as-is on your website. The provided HTML snippet includes all paragraph styles and hyperlinks, the author byline and credit to The Markup. Please drop us a line to let us know if you’ve republished the story at president@themarkup.org. Some placeholder text Copy HTML The Latest News Facebook Said It Would Ban Holocaust Deniers. Instead, Its Algorithm Provided a Network for Them Anti-Semitic groups are still flourishing on Facebook November 24, 2020 08:00 ET Google the Giant As Antitrust Pressure Mounts, Google to Pull Back Benefit to News Sites That Adopted Its Preferred Mobile Technology Will the AMP format die as a result? November 19, 2020 08:00 ET Election 2020 Targeting Trump Fans, QAnon Ad Slips Through Facebook’s Filters "We managed to skim by and it's pure luck," said a man behind a "Q movement" page that has managed to advertise on Facebook despite a ban November 17, 2020 08:00 ET Return to The Markup's homepage Your contributions help us investigate how technology influences our society. Donate About Us Our Donors Ethics Policy Events Board of Directors Jobs Team Have a Tip? Newsletter A Letter from the Editor Privacy Policy A Letter from the President Terms of Use Facebook Twitter Instagram RSS Feed Sign up to get The Markup newsletter in your inbox every Saturday. Enter your email address to signup to our newsletter Subscribe tu-plogan-github-io-7813 ---- Nineteenth-Century Knowledge Project Jump to main content Nineteenth-Century Knowledge Project Introduction Organization OCR XML Entry Files Reference Index Search IntroductionWhat is the Nineteenth-Century Knowledge Project? AboutAcknowledgements for all contributors. OrganizationHow we keep hundreds of thousands of files organized. Edition-Section SystemFile organization depends on two basic folder types Folder namesAs the OCR workflow passes through its various stages, production moves into specific folders for each stage. Their names and contents are given below: RepositoriesA guide to the different repositories used to store ocr-project data. Setting Up the RepositoriesCreate local copies of the remote repositories OCRThe procedures we use to get the best quality text recognition in ABBYY Fine Reader. AFR InterfaceLearn about the main elements of the program interface Create a Page-Inventory FileCreate a page-inventory file. Create an Image CollectionOrganize image files for scanning. Create an OCR-ProjectHow to create and manage an OCR-Project. SettingsRecommended settings for all options in ABBYY FineReader Draw BoxesManually creating text recognition boxes improves accuracy Page RecognitionExcellent page recognition depends on preparing pages properly. Save and OutputHow to output your OCR results. XMLThis introduction to Oxygen XML Editor shows you how to navigate the interface and perform standard procedures on the Encyclopedia files. Oxygen InterfaceAn introduction to the main components of the Oxygen interface. Create an XML-ProjectUsing Oxygen XML Editor to organize files. Transform DOCX to TEIHow to convert DOCX files to TEI in Oxygen. Entry FilesProcedures for converting single pages into Encyclopedia entries. Convert Page to Entry FilesBefore page files can be converted to entry files, we need to do some housekeeping. Entry-Inventory FileDocument the filenames of every entry in a section using the entry-inventory file. Validate Entry FilesUse Oxygen to validate the entry files. ReferenceReference information on file/folder names, TEI-encoding standards, and unicode characters. Editorial standardsThe following editorial principles are employed in creating this digital edition. Image SourcesBibliographic information on print editions and image repositories. Naming ConventionsLists the naming conventions we use for editions, sections, folders, and files. TEI Style ManualAll TEI encoding must follow these guidelines. Unicode CharactersList of unicode characters and entities used frequently in the Encyclopedia and not on the standard US keyboard. Generated by XML WebHelp Project Director Peter Melville Logan National Endowment for the Humanities HAA-261228-18 vireoetd-org-3703 ---- ProQuest Export Documentation - ATTENTIONATTENTION ATTENTION This is a legacy site and is no longer updated. Visit www.tdl.org/etds for Vireo information. Search Main menu Skip to primary content Home About About Vireo Contact Us Mission and Organization of the Vireo Users Group Members Join the VUG VUG Institutional Profiles Meetings 2012 Annual Meeting, May 2011 Annual Meeting, August 2010 Annual Meeting, May 2010 Annual Meeting: List of Attendees User Feature Requests Training Support Vireo 4.0 User Documentation Vireo 3 User Documentation ProQuest Export Documentation Vireo 3.0 Help Videos ProQuest Export Documentation Vireo 2.0.5 and higher includes an export format for sending theses and dissertations to ProQuest via FTP. By using the Vireo ProQuest export format, universities can bypass any costs of publishing ETDs with ProQuest. To create the export for ProQuest: First, filter your ETD list in Vireo to select those records you want to send. (The Status of records is irrelevant.) Use the “Download Export” link under Advanced Options and select “ProQuest UMI”. Download the Zip file and extract the files to your computer. Each ETD record will convert into an individual zip file named upload_AuthorLastName_AuthorFirstName.zip. This zip file contains The dissertation/thesis file (PDF) named AuthorLastname_AuthorFirstName.pdf An XML file with ProQuest-required metadata named AuthorLastname_AuthorFirstName_DATA.xml A folder named AuthorLastname_AuthorFirstname_Permission This folder contains the ProQuest license, the TDL license files, and any permission letters for use of material under another copyright.  (See Note about Permission Letters below) A folder named AuthorLastName_AuthorFirstName_Media  This folder contains any Supplemental files FTP the files to ProQuest You can use FileZilla or another FTP client to send the files You must have the host (i.e. ProQuest) FTP address and a username and password for your institution. Please contact the Texas Digital Library (info@tdl.org) or ProQuest (disspub@proquest.com) to obtain this information. Configuring Vireo Settings for ProQuest Export Certain metadata fields are required for the ProQuest export. They include: Language The Language field indicates the primary language of the thesis or dissertation. The Language field should be designated as required in the Vireo Submission Settings. Additionally, in Configurable Settings under “Available Languages,” administrators should provide a list of languages for students to choose from. This list can be created by clicking ADD NEW and then using the dropdown menu to select applicable languages. The dropdown menu contains a ProQuest-supplied controlled vocabulary. Embargo code The Embargo code is created programmatically based on the embargo option a student selects.  ProQuest accepts no embargo, a 6 month embargo, a 1 year embargo, and a 2 year embargo.  Matching embargos for all but the 6 month embargo are already set up in Vireo by default in the Configurable Settings in the Vireo Administrative interface.  The names of the embargoes can also be changed in the Configurable Settings. Name of default Embargo Types in Vireo # of months in Default Embargo Types (Vireo) Corresponding ProQuest embargo Embargo code in ProQuest XML file “None” “Indefinite” None 0 Journal Hold 12 1 year 2 Patent Hold 24 2 years 3   In the ProQuest export itself, you will see the Embargo Type in the xml file as , where the type of embargo is represented by a number. Creating a 6 month embargo period in Vireo will translate to an embargo code of “1” in the ProQuest XML file. Other embargo lengths must be arranged with ProQuest.  Note that, as a matter of policy, some institutional users choose not to export ETDs that are under embargo.  If the institution holds ETDs until an embargo ceases, the embargo must be changed to None in the Document Info view of the Vireo submission prior to downloading the ProQuest UMI export.  Otherwise, the embargo will be enforced a second time by ProQuest. Degree Code The degree code is a ProQuest-supplied code for each degree your institution offers.  ProQuest will supply a list of degrees that have been received from your university.  You can inform ProQuest if additional degrees need to be added. (For TDL members, these codes will be supplied by TDL.) Under Applications Settings you will enter the ProQuest codes for your degree types.  In the Submission Settings, you must designate Degree as a required field for students. Subjects The Subjects field should be designated as required in the Vireo Submission Settings. Students will select up to three Subjects from a controlled vocabulary coded into the Vireo configuration files.  No further configuration in the Vireo settings is required. ProQuest Institution Code The ProQuest Institution Code must be added in the Application Settings of the Administrative interface of Vireo.  This code is a ProQuest-supplied code that identifies the institution associated with all submissions coming from the institution. The ProQuest Institution Code can be obtained from ProQuest or (for TDL member institutions) from the Texas Digital Library. Search Engine indexing In Vireo 2.X the setting to enable indexing by search engines is applied at the institutional level.  In Application Settings, choose Yes to allow submissions to be indexed by search engines such as Google and Yahoo, or choose No to reject indexing by search engines. ProQuest/UMI License Submission of ETDs to ProQuest requires a separate license in addition to a license that allows publication of the thesis or dissertation to an institutional repository and the Texas Digital Library. The UMI Release must be enabled in the Submission Settings of Vireo.  Institutions will choose between Optional or Required depending upon policy.  If submission to ProQuest is mandatory for both theses and dissertations, the Required option should be selected.  The Required setting will not allow students to complete the submission process until the agreement box has been checked.  Institutions which do not require submission to ProQuest would set this field to Optional to allow students to continue the submission process without agreeing to the license.  Institutions with mixed policies such as mandating dissertation deposits but not theses would choose the option that is best suited for their workflow. The ProQuest License Agreement itself is visible in the Application Settings and can be edited to add notes about the institution’s policy on submission to ProQuest or to provide other directions.  The language of the license itself should never be changed without written permission from ProQuest. Some institutions choose to combine the institutional repository/TDL license with that of ProQuest by moving the text of both licenses to either the ProQuest License Agreement box or the Submission License box in the Application Settings.  For this to work correctly one of the license types must be disabled in the Submission Settings. Processing Codes There are two processing codes which are hard coded into Vireo.  They are M for Masters and D for Dissertations. If your institution has more than one campus, department, or college submitting ETDs to ProQuest you may have different settings.  Contact ProQuest to obtain the processing codes you will need to modify your system. Testing Prior to going live, institutions submitting through Vireo must go through a testing phase. Testing is performed to make sure that –        The institution FTP account functions properly –        File naming conventions are correct –        XML structure is correct The testing phase is considered a success once files flow through ProQuest’s automated processes without error. (Please note: Test files will not be published. Any data that the institution delivers during testing that the institution wants included in PQDT will have to be resent once the test phase is complete.) Note about Permission Letters Submitting permission letters to ProQuest requires a change of file type in order for the document to export into the correct folder and remain hidden from public view.  Staff may upload a permission letter as a License file in the View screen of the submission.  Alternately, the student may upload the permission letter as a file type specified by the institution and then staff can change the file type to License upon receipt. Important Contacts Texas Digital Library info@tdl.org (for ProQuest/UMI institution codes, degree codes, and FTP information) ProQuest Dissertation and Theses Customer Service – disspub@proquest.com   Leave a Reply Cancel reply You must be logged in to post a comment. Proudly powered by WordPress web-archive-org-8801 ---- 17 Instagram Stats Marketers Need to Know for 2019 | Sprout Social success fail Oct DEC Feb 19 2018 2019 2020 95 captures 23 Aug 2017 - 25 Nov 2020 About this capture COLLECTED BY Organization: Mark Graham's Archive-IT Collections This is a set of web collections curated by Mark Graham using the Archive-IT service of the Internet Archive. They include web captures of the ISKME.org website as well as captures from sites hosted by IGC.org. These web captures are available to the general public. For more information about this collection please feel free to contact Mark via Send Mail Collection: General Crawls Archive-It Partner 1028: Mark Graham - Collection 8332: General Crawls TIMESTAMPS Sprout SocialRequest a Demo Close Menu Menu Home Solutions By Business Type For Enterprise For Agencies For Small Business Watch video: Discover How We Help Agencies By Need For Social Management For Customer Care For Employee Advocacy For Data and Intelligence By Network Twitter Facebook Instagram LinkedIn Pinterest Platform The Sprout Platform Built to help today’s smartest social businesses put their consumers at the center of their strategic approach. Analytics Drive strategic decision making across the business with access to rich social data and analytics. Learn More Engagement Streamline and effectively scale monitoring and engagement efforts with a unified inbox. Learn More Publishing Effortlessly plan, create, manage and deliver content and campaigns as a team. Learn More Listening Uncover trends and actionable insights from social data to inform marketing strategy. Learn More Additional Features Collaboration Automation View All Features Explore All Features All the power you need in an intuitive platform. Pricing Partners Become a Sprout Agency Partner Join Sprout’s Agency Partner Program and grow your digital marketing business. Learn More Watch video: Explore the Partner Program Find a Sprout Agency Partner Hire an agency partner to enhance your marketing efforts or grow your team. Learn More Learn About Our Integration Partners Sprout integrates with social platforms and digital tools that matter to your business. Learn More Company Why Sprout The Sprout Difference Customers About Sprout Work at Sprout Press Watch video: Explore Careers at Sprout Our team is growing, You will too. Resources Sprout Blog Big Thinking Resource Center Webinars Product Updates Events Free Tools Case Studies Read Our Digital Publication Don’t just survive the digital transformation. Thrive in it. Login Sprout SocialBambuSimply Measured Request a Demo Sprout Social Video Close Video Player Skip to main contentSprout Social Pricing Login Sprout SocialBambuSimply Measured Start Your Free TrialRequest a Demo Open Menu Close Subnavigation Search Search Filter Sprout Blog » Instagram Analytics • Instagram 17 Instagram stats marketers need to know for 2019 Photo of the author, Chloe West by Chloe West Although it joined the game a bit later than some of the other popular social networks (Instagram launched on October 6, 2010 while Facebook started in 2004, Twitter in 2006 and Pinterest in January of 2010), Instagram certainly has made a name for itself in the industry. Now one of the most popular social media platforms available, the photo-sharing app has come a long way from its humble beginnings. With a heavily active user base (500 million people access the app daily), there are tons of opportunities for users, influencers and businesses alike. To stay on top of your game, it’s important to understand some of the Instagram stats surrounding the platform. Knowing who uses Instagram and how they interact on the platform can help your business to craft a better Instagram marketing strategy. So, check out the 17 Instagram statistics below and see what’s in store for 2019 to ensure you’re set up for success. 1. Instagram has 1 billion monthly active users This makes Instagram the third most popular social media network, following only Facebook (over 2 billion monthly active users) and YouTube (1.9 billion monthly active users). With 1 billion users accessing the platform every month, 50% of those are scrolling through their feed each day. That’s a pretty big audience to put your business in front of. This is why you want to learn the best tips and tricks for managing a brand on Instagram. 2. 64% of 18-29 year olds use Instagram Understanding the demographics behind each social media platform can help you to determine which ones you need to be focusing on in your social media strategy. Instagram has a diverse user base, but is undeniably most popular with young people. Nearly two out of every three adults aged 18-29 use Instagram. This percentage has increased from 59% to 64%, showcasing just how popular Instagram is with younger generations. If your brand is targeting Gen Z and Millennials, Instagram just might be the perfect spot for you. Sprout Social’s data analytics and social listening tools can help you discover demographic insights about your own Instagram audience, including age, gender and geographic location, to help you optimize your strategy. Sprout has helped us better understand who our audience is, how we can be most relevant and effective and really take a customer-first approach. That was difficult for us to do before without having all the dots connected. Kara Wenman Digital Content Marketing Manager Start Your Free Trial 3. Instagram is expected to account for nearly a quarter of all of Facebook’s ad revenue by the end of the year If you didn’t know that Instagram is owned by Facebook, now you do. Instagram’s advertising is also completely managed through Facebook’s Ads Manager, and of course any revenue collected at year’s end stays under the umbrella of Facebook revenue. That being said, Facebook’s purchase of Instagram ($1 billion in 2012 when the platform had only 30 million users) is certainly paying off. Considering the platform brought in between $8 and $9 billion in 2018 alone, I’d say Mark Zuckerberg is pretty happy about that acquisition. Not only that, but Instagram’s ad revenue is only going to grow. It’ll bring in nearly a quarter of Facebook’s total ad revenue by the end of 2019, and 30% of total ad revenue by the end of 2020. 4. 80% of accounts follow a business on Instagram If you’ve ever wondered if social media marketing actually works, think about this Instagram statistic. Users are following businesses on the platform. Eight out of 10 to be precise. Which means that if your brand has a presence on Instagram, your audience will likely follow you. Not only that, but 200 million Instagrammers actively visit business profiles everyday. So get started with Instagram marketing for your brand today. Sprout’s Instagram management tools are designed to help you schedule posts, manage comments, monitor hashtags, run reports and more with ease. Whether you’re hoping to streamline content publishing, build stronger relationships with your audience or prove ROI, Sprout’s got you covered with tools built from the ground up with business in mind. Of all Sprout’s Instagram tools, being able to comment on posts from within the Smart Inbox has been the biggest help. From the native platform, you only see a limited number of comments. I can answer everything through Sprout. It’s awesome. Aaron Flick Marketing Associate, Professional Division Start Your Free Trial 5. Instagram has 2 million monthly advertisers As you scroll down your Instagram feed, every three or four photos, you’ll see one labeled “Sponsored.” You’ll also see Stories ads as you watch the Instagram Stories of people you follow. Instagram is a great platform for reaching your audience through both organic and paid means, and there are two million advertisers proving this each month. To learn more about getting started with Instagram advertising without breaking the bank, check out our guide to ads on the platform. 6. The most-liked photo has 53 million likes And it’s a photo of an egg. The account @world_record_egg started as a joking attempt to beat the previous most-liked photo with 18 million likes: Kylie Jenner announcing her daughter’s birth. But it obviously caught on, with people talking about this egg’s attempt at breaking the record all across social media and the news. This viral post took only 10 days to break the record, and has been slowly generating more and more likes. At the time of this writing, the most-liked photo now has 53 million likes, but we’re excited to see how many more it racks up by the end of the year. Viral social media campaigns like this just go to show how well people can work together for a common goal (i.e., getting a photo of an egg to become the most-liked photo on Instagram). And since it currently has a 35 million like lead, it’ll be interesting to see when (or if?!) the next most-liked photo comes around. 7. The best times to post daily on Instagram are weekdays between 10 a.m.–3 p.m. Although the best time for any brand to post on social media is completely dependent on its own unique audience and engagement, Sprout’s study of the best times to post on Instagram offers up some pretty compelling data. The findings showed that the safest time to post are Tuesday through Friday from 10 a.m–3 p.m., while the peak times during the week are Wednesday at 11 a.m. and Friday at 10–11 a.m. These windows of high engagement can likely help to generate even more likes and engagement, especially for brands just starting out. You can use Sprout’s Instagram analytics tools to determine your own best times to post, or let Optimal Send Times do the work for you. This Sprout feature automatically determines the best times to publish content to maximize engagement. I started using Optimal Send Times in June [2018] right after it was rolled out and saw a huge increase in engagement and reach. Kristen Waggener Communications Specialist Start Your Free Trial 8. Video posts receive 38% more engagement than image posts Trying to improve your overall Instagram engagement? Think outside of the box and upload something other than an image or carousel post. Although this statistic could certainly be due to the fact that video is much less common on the platform, the numbers don’t lie. Videos receive 38% more engagement than image posts and 2.1x the amount of comments. Since 81% of marketers agree that engagement is the most important metric of social media success, it’s no surprise than many of us want to figure out how to improve these numbers. Using video within your Instagram feed could certainly be worth testing to see how your audience reacts. 9. Over 100 million photos are uploaded every day 100 million photos. Every single day. People and businesses alike are using Instagram to share photos and videos of their life story or brand story. And there’s plenty of room for your brand to share your own story, product/service photos and more. 10. 1 out of 3 of the most viewed Stories are from businesses Instagram launched Stories in 2016 as their own version of Snapchat’s disappearing stories, and since that time they’ve added additional features that make Instagram Stories uniquely appealing as its own experience. Instagram Stories now has 500 million daily active users and only continues to grow. The adoption of Stories on Instagram has created even more ways for brands to tell their story to their audience. While able to keep a carefully curated feed, your brand can also share behind-the-scenes footage, video clips, graphics and more on your Story. Instagram also added the option of highlighting your Story so that it stays on your profile for more than just 24 hours. Stories can be used in many different ways in order to engage your brand’s followers. And since one-third of the most viewed Stories were posted by businesses, it’s obvious that audiences are engaging in brand Story content. 11. 50% of businesses create at least one Story every month Half of all businesses on the platform are creating and sharing Story content each month, proving again that Stories aren’t just for users sharing their day-to-day with their friends. Check out these creative Story ideas to help generate your own inspiration for your brand’s Instagram Stories. 12. 68% of Millennials consume Stories on Instagram vs. 49% on Snapchat and 44% on Facebook Even though Instagram Stories came about years after Snapchat created the idea, it has already surpassed the inventor in usership. 68% of Millennials say Instagram is their preferred Story consumption method, nearly 20% more than those who use Snapchat. Because those Millennials are also likely following and interacting with businesses on Instagram, it can be deduced that they’re likely engaging with and watching those businesses’ Stories as well. Instagram Stories are here to stay, and utilizing all features of the platform is only going to do good things for your brand. 13. The most popular hashtag is #love Related Articles Reach vs Impressions: What’s the Difference in Terms? 15 Instagram Post Ideas to Cure Creative Block 5 Instagram marketing trends changing the industry in 2019 5 Reasons Your Instagram Stories Are Failing (& How to Fix Them) Hashtags were invented in 2007, and have only become more and more prevalent in social media and in our everyday vernacular. (I know I can’t be the only marketer who occasionally texts friends in hashtags (#sorrynotsorry). Hashtags, when used properly, can improve overall reach and engagement for your content on Instagram, and who doesn’t want that? The most popular hashtag on the platform is #love, and including that within your content could help you reach a lot of users. But is that really the best way to find potential new followers? If your content isn’t actually about love, you don’t want to include that hashtag. The best way to determine which hashtags to use is to include a mixture of extremely popular hashtags (you can find 100 of them right here) that are relevant to your brand and hashtags that are highly relevant to your industry and business. Still not sure? Sprout enables you to track and analyze hashtag performance so you can see what’s working and what needs to change. And with Sprout’s Advanced Listening, you can identify hashtags similar to your own to inform strategy and understand the types of brand-relevant conversations consumers are having on Instagram. You can see what people are saying, at scale, about your industry and your brand. That is so important—that level of detail and feedback is an incredibly powerful asset to help you. Dan Wilkins General Manager and Co-founder Start Your Free Trial 14. Users spend 53 minutes a day on Instagram That is powerful. Nearly an entire hour out of each user’s day is spent scrolling through photos, interacting with accounts, watching Stories and more. Although Facebook leads with most time spent at 58 minutes a day, Instagram is in second place and has beat out Snapchat’s 49 minutes a day. Putting your brand on a platform that users are using for almost an hour everyday can help you to find even more customers, grow your business and create a community around your brand. 15. The platform gets 4.2 billion likes per day Considering users have to double tap photos on the app to give them a like, that’s about 8.4 billion taps per day. Instagram has the highest engagement rate of all platforms, at about 2-7% of all posts. So it’s likely that you’ll receive a great deal more interaction on your Instagram photos and Stories than you see on other platforms. However your overall hashtag and marketing tactics make a difference, so be sure to remain strategic in your content planning. 16. Over 100 million Instagrammers watch or record Live video each day Instagram Live is a feature that was added not long after Stories that allows users to livestream content to their audiences. Since Stories videos can only last up to 15 seconds, there’s not a lot of time to do a deep dive into any particular topic. Because Facebook Live has been so popular, a similar feature was added to Instagram. And it’s obviously doing well, as over 100 million users are either watching or creating Live video everyday. Going live on Instagram can be a great way for your brand to interact directly with your followers, as users can like and comment on your video in real time. Learn more about  how to run a great Instagram live experience. 17. There has been no data released on IGTV This is less of an Instagram stat and more of a lack thereof. Facebook and Instagram love sending out their data about active users, usage times, interaction and more. That means it’s notable that IGTV was not mentioned at all during the network’s announcement of 2018 Q4 numbers. This makes it harder to get a picture of IGTV’s engagement rates and value for marketers. Probably because IGTV’s engagement rates aren’t great. Accounts with tens of thousands of followers can see only hundreds of views on the platform. IGTV is completely revamping how businesses create video with its vertical dimensions, but brands will need to better understand the ROI of creating these more complex pieces of video content. Instagram is starting to place IGTV previews in its user feeds as an attempt to generate more interest around the vertical video app, but we’ll have to see if it pays off. Getting the most out of Instagram stats Ready to turn stats into strategy? Use Sprout to save time and maximize ROI, from content creation to customer care to data reporting. The Instagram Profiles Report has been extremely helpful in discovering how well we are engaging with our customers and what we can do to improve our customers’ overall Wahl experiences. Lance Wahl Global Vice President of Professional Products Start Your Free Trial Sign up to have social media resources sent to your inbox every week. Sign Up Did you know... Sprout’s Instagram analytics tools allow you to identify industry influencers with large followings who are commenting on your posts? Request a demo. Published on April 22, 2019 Chloe West: Chloe is a digital marketing manager and freelance writer, focusing on topics surrounding social media and digital marketing. She's based in Charleston, SC, and when she's not working you'll find her at brunch or hanging out with her son. Follow her on Twitter @ChloeWest28. Subscribe to our newsletter and get social media resources sent to your inbox. Sign Me Up Sprout Social Website Home Contact Email Us Email Us 1.866.878.3231 1.866.878.3231 Office Locations Support Help Center FAQs System Status Support Help Center FAQs System Status Solutions Enterprise Agencies Small Business Social Management Customer Care Advocacy Data & Intelligence Solutions Enterprise Agencies Small Business Social Management Customer Care Advocacy Data & Intelligence Platform Social Analytics Social Engagement Social Publishing Social Listening Automation Collaboration Platform Social Analytics Social Engagement Social Publishing Social Listening Automation Collaboration Integrations Facebook Twitter Instagram LinkedIn Pinterest All Integrations Integrations Facebook Twitter Instagram LinkedIn Pinterest All Integrations About About Sprout Why Sprout Pricing Careers Customers Security Investors About About Sprout Why Sprout Pricing Careers Customers Security Investors Resources Sprout Blog Adapt Blog Resource Center Social Glossary Partner Directory Brand Assets Resources Sprout Blog Adapt Blog Resource Center Social Glossary Partner Directory Brand Assets Subscribe to our newsletter and get social media resources sent to your inbox. Sign up now. English English Español Português Close Language Picker Sprout Social on Twitter Sprout Social on Instagram Sprout Social on LinkedIn Sprout Social on Facebook Sprout Social on Pinterest Sprout Social on Youtube © Copyright 2019 Sprout Social, Inc. All Rights Reserved. Privacy | Terms | Disclosure Policy | Cookies Get Social Media Tips Straight to Your Inbox and Become a Better Marketer You’ll be joining nearly 300,000 marketers who subscribe to Sprout Social’s Insights blog. Sprout Social is committed to your privacy. By clicking Submit, you acknowledge Sprout Social uses your information in accordance with its Privacy Policy. You may unsubscribe from our communications at any time. To opt out, please email privacy@sproutsocial.com. Email Address Sign Up {{message}} "Close this dialog window" Filter Categories All Engagement Publishing Analytics Advocacy Product Updates Team Sprout Engineering Español Português Networks Facebook Twitter Instagram LinkedIn Pinterest Resources All Data Guides Case Studies Infographics Webinars Social Topics Community Events Press All Stars #SproutChat Close this dialog window www-ala-org-4628 ---- 397 Let’s Get Oriented!: Getting Intimate with the Library, Small Group Sessions for Library Orientation Leila June Rod-Welch* Academic libraries across the United States have been implementing new orientation pro- grams for incoming students and their families in order to meet the needs of the millennial generation and prepare them for their academic careers. Libraries need to develop orienta- tion programs that specifically target certain audiences to provide them with the informa- tion they need to succeed in their collegiate careers.  Discover how an Outreach Services Librarian teamed up with staff from the Office of Admis- sions to coordinate over ninety-six library instruction/tour sessions for incoming students and their parents during freshman orientation. These sessions were intentionally designed to cater to small groups. In addition, learn how this Outreach Services Librarian conducted data gathering which consisted of an IRB approved survey over the course of two years. The first year this survey was only given out to parents; 238 parents voluntarily completed the survey (64.3% return rate). The outcomes of these completed surveys led us to conduct a second survey the following year. The second year both incoming students and their parents were asked to voluntarily fill out this survey at the conclusion of their library instruction/ tour session. This survey was completed by 134 students and parents (69.4% return rate). The survey results from both years were analyzed and recommendations were made on how to improve our future library orientation sessions. This study will reveal the surveys’ results. Introduction Many students entering college do not realize how valuable a resource academic libraries are on their campus. Academic libraries offer many different ways to do research and offer a pleasant environment for students to study and follow their academic pursuits. However, many students overlook the library as a place for research and study. To them, it is an antiquated relic of academia, and they turn to the Internet and the comfort of their dorm rooms for their research and study needs. Academic libraries are looking to combat this by implementing library orientations for incoming freshmen students. These orientations are focused on helping students realize their academic potential and to take control of the academic library’s vast resources and helpful staff. When preparing to welcome new students and their families to the university campus, academic libraries need to determine how to structure each program to suit the interests and expectations of the particular group in ques- tion. For instance, parents may be more satisfied with one program than the students, or the opposite; freshmen students may be more satisfied with a program than first generation students. Therefore, academic libraries need to distinguish which services and resources need to be addressed, and then how they should be presented to each group of participants. Ultimately, what are parents and incoming students looking for in library orientation programs? * Dr. Leila June Rod-Welch is an Outreach Services Librarian/Associate Professor of Library Services, Rod Library – University of Northern Iowa, e-mail: leila.rod-welch@uni.edu. mailto:leila.rod-welch@uni.edu Literature Review Examples of Other Library Orientation Models One concept that inhibits library use is library anxiety. Library anxiety is the feeling of uncomfortableness within a library setting that has repercussions on a cognitive and behavioral level (Jiao & Onwuegbuzie, 1995, p. 3). Mellon (1986) conducted a study on college students discussing their feelings relating to the library. Many stu- dents expressed fear, almost a phobia, of the library. Some students felt that this was due to the size of the library, while others stated that their fear stemmed from the process of doing research. There is also a reported feeling of incompetence, as well as a feeling that other students have the required knowledge to effectively use the library’s resources for their research (p. 163). Academic libraries look to address this “library anxiety” and provide a com- fortable and productive learning environment for their patrons. The University of Waterloo aimed their orienta- tion at providing a sense of comfort and a positive view on the library to encourage more students to make use of the library’s resources throughout their academic career (Collins & Dodsworth, 2011). The California State University of San Bernardino (CSUSB) orientation goal was to increase their student retention rate (Dabbour, 1997, p. 301). With a retention rate of less than 40%, CSUSB was rated nineteenth out of twenty universities in California at the time based on retention rates. CSUSB looked to increase their retention rate by helping students to become comfortable with the academic aspects of college life such as doing research and time management. They found that the retention of students after implementing their library and information literacy course was the highest it had been since their retention rate had been recorded (Dabbour, 1997, p. 305). Perhaps the largest reason for changing the method of orientating new students to the library is the impor- tance of teaching students how to use the library’s resources to help ease the library anxiety that many students feel. Having students participate in hands-on activities can help them to have at least a basic knowledge of the workings of the library’s resources, making it easier for students to use those resources later in the semester and feel comfortable using those resources as the semester continues, easing their anxiety about the library. To ad- dress the fear of the size of the library, self-guided tours or scavenger-hunt-style orientations can be utilized to give students a better knowledge of the geography of the library (Dabbour, 1997, p. 304; Marcus & Beck, 2003, p. 24–25).  Libraries also took ideas from upperclassmen; they looked to implement aspects to their orientation that older students say they wish they would have known about sooner (Collins & Dodsworth, 2011, p. 4). There are several different ways to implement a new type of orientation into academic libraries. Most of these new methods involve active learning, which involves the students having conversations with each other and writing, and other activities that can be done in small groups or alone (Dabbour, 1997, p. 300). Active learn- ing is largely considered to be more beneficial and effective for the student than passive learning, which includes listening to a lecture and taking notes. Getting students involved with hands-on practice creates a livelier learn- ing environment that better engages the student and allows them to better retain the information that is given to them. The first one of these orientation models is a scavenger hunt or treasure hunt. These self-guided tours of the library can allow students to not only discover the library’s geography in the same way that a traditional library tour would, but allows them to discover it on their own and interact with the library environment more effectively. Marcus and Beck (2003) tested a self-guided tour in the form of a treasure hunt against a group of students who participated in a traditional library tour. They then administered a quiz about the library to view the effectiveness of the self-guided treasure hunt in comparison to the traditional library tour. They found that students who participated in the self-guided tour were better able to answer questions about the geography and resources of the library than the students who took the traditional tour (p. 28, 31). Brown, Weingart, Johnson and Dance (2004) used a control group to better compare the effects of a scavenger hunt-style orientation. Using ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch398 the Library Anxiety Scale, they did a pretest and posttest of a group of 1,200 students who went on a self-guided library tour and a group of 200 students who did not participate in any kind of library orientation. They discov- ered that while the two groups had similar anxiety levels on the pretest, the posttest showed a drop in anxiety in the students who participated in the scavenger hunt (Brown et al., 2004, p. 397). These two experiments show the effectiveness of the scavenger hunt model as an alternative to the traditional library tour for helping ease library anxiety in new students and better acquainting them with library resources. Similar initiatives were adopted at Southern University, Baton Rouge (SUBR), taking on the same approach of trying to offer new types of events that proved to be more engaging, hands-on experiences for students. SUBR revamped their orientation program to an event called “The Amazing Library Race” that involved incoming freshmen working in groups to locate resources throughout the library while completing a series of tasks to account for proficiency checks. Operating similar to a scavenger hunt, the locations and tasks involved were designed to promote specific departments or areas of interest that would be helpful to the students in the upcoming academic year (Banks & Svencionyte, 2008, p. 33). Another orientation model involved the use of an Alternate Reality Game (ARG). Several academic libraries have implemented these games into their orientation for new students, attempting to find an engaging way to get students acquainted with the library through the blending of the game-world and reality. In the summer of 2007, Ohio State University (OSU) launched their ARG “Head Hunt,” which looked to orient new students to the library and the campus during their search for the missing head of the OSU mascot. In the fall of that year, West- ern Washington University launched their ARG “Help Me Solve a Mystery,” which was aimed at improving the information literacy of new students as well as critical thinking skills. Perhaps the best documented ARG in an academic library is “Blood on the Stacks,” the ARG implemented by Trinity University. Donald (2008) described the process of designing and implementing the ARG as a method of orienting students to the library at Trin- ity University. The use of a survey to assess the effectiveness of Blood on the Stacks was also documented. The survey showed that over 80% of the students who took the survey felt Blood on the Stacks was effective in ori- enting them towards the service points in the library, while only 61% rated the orientation towards the library’s online tools as effective. The most negative response to the orientation was from library staff, to which 37% felt that Blood on the Stacks was not effective or minimally effective. The survey also addressed the opinions of stu- dents on the various aspects of the library. After participating in Blood on the Stacks, 86% of the students who responded to the survey agreed with the statement that the library was a useful resource and had friendly staff members. Fifty-seven percent disagreed with the statement that the library was intimidating (Donald, 2008). Overall, the use of an ARG in an academic library proved to be effective in orienting students towards library resources and helping students become comfortable in the library. The final orientation method that incorporates active learning is the implementation of classes to teach new students about the various resources that the library offers and to help them become comfortable with library resources. There are several different iterations of these seminars, ranging from one-shot sessions to three part sessions covering the different aspects of the library’s presence on campus. Collins and Dodsworth (2011) covered the use of a one-shot session used at the University of Waterloo in Ontario. These sessions had the single goal of easing students’ library anxiety, with an emphasis on getting students comfortable with the library environment and with the library staff. Information was provided in a “fast, flashy, and fun” method, trying to keep the in-depth discussion on research or other library resources to a minimum (Collins & Dodsworth, 2011, p. 6). While this method may be effective for allowing students to become comfortable with the library environment, it may not be as effective in orienting them towards library resources that they may need as their academic career continues. Another iteration of the one-shot seminar was implemented at CSUSB. These seminars used small group work MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 399 and implemented the University’s online databases to keep students involved and to help them learn about the library’s resources with hands-on experience and the help of their peers (Dabbour, 1997, p. 301). The other class- based method of orientation was implemented by Cleveland State Community College (Twork, 2013). The session was broken into three pieces: lessons on research methods, introduction to online resources, and discovery of the library’s online presence on social media. Of the twenty-six students who participated in the survey following these activities, twelve students rated the library portion of their orientation as “excellent” (Twork, 2013, p. 73). Thirty- three students commented positively on the library’s blog during the social media session, but it must be noted that library staff stood behind the students during this portion of the orientation (Twork, p. 73). These classroom-style methods can be effective as long as the lessons taking place are rooted in active learning; students must be engaged in the lessons or the information will be lost on them and pursuing their research endeavors will be more difficult. Incoming Students College orientation programs have been an essential component in preparing incoming students for their col- legiate careers. The overall purpose of these orientation programs for incoming freshmen and transfer students is to “facilitate student learning in three general dimensions: transition processes, academic integration, and personal and social integration” (Robinson et. al. 1996, 55). Basically, orientation programs assist incoming stu- dents by successfully integrating them into the university/campus community for the purpose of promoting the academic excellence of the student body and student retention. Orientation programs additionally promote ser- vices, resources, and various organizations for incoming students to potentially utilize for the purpose of provid- ing them with the best possible college experience. One component of college orientation that is looking to have a more essential role is the academic library. Considering the importance of preparing college freshmen and transfer students for their academic careers, campus or academic libraries offer crucial services and resources to aid students with their coursework and research. In the perspective of academic librarians, the library should be a prominent component of the orientation process, and must provide the services and resources necessary to assist the integration of incoming students. Creating positive perceptions of academic libraries can occur at more than just the reference desk or during library instruction. Librarians can and should take advantage of other occasions to promote their library. New student orientations provide an ideal opportunity to be more innovative and proactive in creating first impressions of library resources and services. When librarians become involved with orientation programs, positive interactions can begin before students even start their first semester. (Rhoades and Hartsell 2008, 1) Providing knowledge of the library resources and services can aid students in their academic pursuits. In- deed, Wong and Cmor discovered that there is “a higher tendency of [library] workshop attendance having a positive impact on final GPA” and “that library instruction has a direct correlation with student performance, but only if a certain minimum amount of instruction is provided” (Wong and Cmor 2011, 464). Indeed, provid- ing these resources and services to students is important in assisting them in their academic pursuits. Academic libraries are not only interested in informing students of various programs, resources, and ser- vices available to them, but to host various events, classes, tours, and activities to actively engage students in the library process. For instance, “many librarians feel that a comprehensive library tour is vital to the academic success of their students. Tours help students become oriented to the physical layout of the building, associate a friendly face with the library, and enable them to ask questions specific to their own needs” (Oling and Mach ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch400 2002, 13). In another article, Brown et. al. concluded that their orientation week scavenger hunt and other ac- tivities helped “to reduce the students’ overall library anxiety,” which enabled them to continue to “familiarize students with the library, encouraging them to ask questions, and fostering the perception that the librarians are the people in the know and willing to help” (Brown et. al. 2004, 397–98). Scholars like Monica Twork indicate a requirement of academic libraries to provide more “hands-on activities to reinforce [student] learning out- comes” and develop “interactive, activity-based library orientation session[s],” such as treasure hunts, touring passports, activity prizes, and puzzle games (Twork 2013, 69–72). Some scholars such as Mills and Mitchell go a step further, and propose that academic libraries sponsor campus-wide events during orientation week involv- ing giant tents and outdoor recreation. These giant tents would allow students to meet with library staff, faculty, and other students during the first weeks of the semester (Mills and Mitchell 2009, 4–5). They also propose that library staff wear t-shirts with the academic library’s logo on the front and their services/resources on the back during orientation. They even propose a clever catchphrase for the shirts (“Just Try to Graduate Without Us”) to imply the importance of the library in assisting students in their collegiate careers (Mills and Mitchell 2009, 16). Other scholars support the practice of academic libraries reaching out into dormitories and connecting with various living-learning communities (Rhoades and Hartsell 2008, 4–5). However, there are some scholars who argue an opposite approach by scaling back the events, sessions, and activities for incoming students, and developing an online tutorial program instead (Grant and Finkle 2014, 506). These scholars argue that while it is important to provide library orientation programs for incoming students, academic libraries should shift their focus to advanced students and faculty who specifically require greater assistance and certain services that the library provides (Grant and Finkle 2014, 506). These scholars seem to imply that incoming students do not have as great a need for library services as advanced students and faculty, meaning that academic libraries need to focus their attention on these students and inform them of more specialized resources/services such as research consultations, interlibrary loans, or library database workshops. The challenge would be finding the balance between providing the adequate amount of service to advanced stu- dents/faculty and promoting continuing participation/interaction among incoming freshmen/transfer students. Furthermore, there is the implication that academic libraries have to distinguish between the various types of students and determine which services/resources they will require. We need to keep in mind what sorts of services and resources should be mentioned during incoming stu- dents’ initial visit to the library. Furthermore, how should this information be shared with incoming freshmen, as there is the potential of also having many first-generation students interacting in an academic library for the first time? Certain scholars would advocate for an enjoyable and welcoming experience for incoming students, looking to establish healthy communications between freshmen and the library to overcome issues of library anxiety, and potentially increase the likelihood of library attendance. These orientation programs could include interactive tours, scavenger hunts, games, activities, or even library-hosted events/entertainment. The overall purpose of library orientation for incoming freshmen is to provide a general understanding of the various ser- vices and resources available to them, as well as establishing positive relationships with library staff to encourage student-staff communication and interaction. While more specific services like information literacy sessions or research consultations are important for advanced students, attempting to inform incoming students of these services during orientation may overwhelm them. Academic libraries should also consider online tutorial pro- grams, or even create a webpage specifically catered to incoming freshmen and/or first-generation students. These webpages could include such tutorial programs as well as lists of popular journal databases and basic services available in the library. Ultimately, while incoming freshmen students may require varying forms of ori- entation, they are still looking for their academic libraries to provide them with the information and assistance MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 401 necessary to help them be successful in their academic career. Academic libraries should focus on informing students about the services and resources that would specifically attract each group of students and also assist them to actually utilize such services and resources. Parents and Families of Students In recent decades, colleges and universities across the United States have been incorporating parents and fami- lies into the freshman/transfer student orientation process. While orientation programs conventionally geared toward incoming and first-generation students, parents undergo many of the same sessions as the students do while also attending certain seminars that focus more on budgeting a college education such as financial aid, and also understanding the college lifestyle and university procedures (Savage 2008, 67–69). The general purpose of these orientations is to ensure parents that their college-pursuing students will have a successful and enjoy- able experience at their respective university by providing parents with as much relevant information as pos- sible (Cutright, 43). “Successful orientation programming promotes confidence among matriculating students and their families—confidence that they have selected an appropriate institution that may lead to a successful college experience.” (Robinson et. al. 1996, 55). In effect, this allows parents to be more comfortable with send- ing their students to college, and it helps to prevent further misunderstandings that could cause problems for students, parents, and the university in the future. Additionally, especially in regards to first-generation students (a student whose parents did not attend college), many parents are unsure of how to assist their student during college and therefore provide the least amount of help to them (Smith and Zhang 2010, 54). Therefore, parent orientation programs can provide vital information on what the role of parents should be while their children are attending college, and how they can assist in their student’s success at a college or university. However, while colleges and universities want to inform parents about college life, they do not want parents having too large of an influence over a student’s collegiate career. In result, these orientation programs strive to promote student independence, pressuring parents to forgo certain responsibilities that should be delegated to the students, such as studying or speaking with professors (Savage 2008, 69). Orientation programs can help parents understand student intellectual and social development, expectations of the campus community, and campus support services. Providing information to significant others can facilitate the transition process for students and parents and can ultimate- ly enhance student success in college. Orientation programming can be seen as an invitation to parents to begin their own developmental step of letting go of their children as students and allowing the campus to enter the parenting-mentoring process as a team member. (Robinson et. al. 1996, 56) Financially speaking, it decreases the possibility of parents withdrawing their funding of their students’ education, as they are now more confident in their students’ academic success and more aware of how the uni- versity operates as a whole, including what is to be expected in campus/residential life. In essence, parent ori- entations act as preventative efforts to limit parental involvement in the determinant success of college students (Cutright, 43). Considering that college attendance is becoming more of a norm in American society, colleges and universities have made it their mission to prepare students for real world challenges and their professional careers; therefore, these academic communities and student affairs professionals believe that significant parental involvement only impedes students from learning important life-skills, such as responsibility, time management, budgeting, planning, and critical thinking (Cutright 39 & 44). Indeed, college students who have regular contact ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch402 and interaction with their parents tend to perform better academically in college, maintain higher GPA’s, and better adjust to campus life, improving student retention rates (Wartman and Savage 2008, 29). Therefore, it is the purpose of the orientation programs to promote emotional connectivity between parents and students, while also promoting functional independency by students from their parents (Kenyon and Koerner 2009). However, considering the purpose of these orientation programs is to help students succeed both academically and professionally, how have academic libraries been incorporating parents into their own orientations and library tours? In recent years, academic library information literacy programs/sessions and library tours have become more common in freshman orientations. Studies have shown that incoming and “lower-level students are confused about the scope and diversity of library resources” and “lack the critical judgment to both select appropriate re- sources and develop strategies for finding information when their first efforts fail” (Kunkel et. al. 1996, 432). In regards to parents, academic library orientations are meant to persuade students’ parents that the services and information available will help their students excel. Additionally, parents want assurance that these services are easily available and navigable, as well as easy to use. Indeed, parents and students both increasingly perceive higher education as a consumer good, in which a student receives goods and services “in return for payment of tuition and fees” (Morril, Mount, and Fass 1986, 35). Regardless of whether this consumerist perception should be promoted by colleges and universities, the rising costs of college tuition have caused parents of students to expect “more concrete, tangible return[s] on their investment[s]” such as better housing, updated technology, more services, and greater chances at acquiring a job after graduation (Wartman and Savage 2008, 10). In regards to parent preferences for academic libraries, parents want to see an abundance of services that are easily available to students and easy to use. In effect, parents will more likely support their student attend- ing a certain university because of its resources and services available to them through the library. Adequately informing parents of the various services offered at academic libraries helps them better determine whether a specific university has the necessary knowledge to help their child succeed in the particular field of study. More- over, being “aware of library resources and services, they [parents] will be more likely to recommend these to their students” (Erickson and Walker, 11). Therefore, parent orientation programs for academic libraries should refrain from involving parents in specialized sessions such as information literacy seminars, but promote pa- rental participation in library events that provide basic information on the various types of programs, services, information, and technology available for students. However, while including parent orientation programs for academic libraries benefits the parents, how would these programs benefit the library specifically? Moreover, how would parent orientation programs ben- efit the students who attend the university and its respective library? While attracting potential students to the university and promoting student retention are important justifications for orientation programs, are there more specific benefits to these programs that would benefit academic libraries beyond simply being an attraction to increase student enrollment? Primarily, the inclusion of parent orientation programs provides opportunities for parents to assist their students in their academic pursuits and potentially advise them on the various programs/ services available at the library. According to scholars, many millennial students have stronger relationships with their parents than previous generations, and these relationships are maintained throughout a student’s collegiate career (Junco and Mastrodicasa 2007). Indeed, a similar study indicates that students who maintain a strong connection with their parents do better academically, as they receive support from their parents that is largely beneficial for a student’s academic success (Bell 2008). Therefore, parent orientation programs for aca- demic libraries could provide parents with pertinent information regarding the services available at the library. In effect, students who maintain close connections with their parents will have a secure and resourceful support group that can advise them of the various services available at the library which can help them succeed academi- MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 403 cally. Ultimately, as many scholars have indicated, academic institutions should recognize parents as partners in ensuring the academic success of the student body (Cutright 2008, 43). Academic libraries should focus on explaining and instructing services to students, while informing parents on how they can best contribute to their student’s learning through the provided services. Some libraries are even implementing online tutorials of library services and resources for incoming stu- dents through social media websites (Grant and Finkle 2014, 506). These resources are extremely attractive to parents and students because they establish the library as a contemporary and up-to-date institution prepared to assist current students. If possible, academic libraries should also present other valuable services like re- search consultations, information literacy sessions, digital media hubs, study rooms, collaborative classrooms, and group-study terminals. Ultimately, by instituting parents as partners of the university, academic libraries can showcase these resources and services so that parents can “support success and foster independence by encour- aging the use of campus resources” (Coburn and Woodward 2011, 32). Methodology    The library worked with the Office of Admissions in order to offer library tours to the parents and incoming freshmen. However, orientation staff indicated that there is not enough time to provide thirty minutes for the li- brary to be involved. The Outreach Services Librarians requested that these tours be offered to the parents while they are waiting for their students who are attending specific sections. The orientation staff agreed to try the thirty-minute instruction/tour sessions for parents of incoming students. These instruction/tour sessions were not mandatory to attend. In order to stay within our timeline for the instruction/tours, we showcased the most important services that we thought parents would appreciate including the library website. In addition to tours, a six item IRB approved survey was distributed which would take less than 5 minutes to complete. The survey results were shared with the Dean of Students and orientation staff. The following year the library was able to offer the tours to both parents and incoming freshmen. At the end of these tours the library gave a ten item IRB approved survey to the attendees to gather feedback and comments in order to improve these tours. Results from the First Survey The Rod Library conducted an IRB approved survey that was initially meant to be distributed throughout forty- five sessions. However, due to popular demand we added eleven additional sessions. In attendance were 370 parents; 238 of them voluntarily completed the survey. The survey return rate was 64%. FIGURE 1 Were library resources informative? FIGURE 2 Did the session equip you with the necessary knowledge? ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch404 The first survey question asked respondents whether they found the resources available in the Rod Library to be informative. 95.4% of the respondents stated that they found the resources informative, 4.2% of the respon- dents indicated that they found the resources somewhat informative, while the remaining 0.4% of respondents stated that they did not find the resources informative. The second survey question asked whether the Rod Library session had equipped parents with the necessary information to assist their son/daughter in the event that their student calls the parent with a question about research. 99.2% of the respondents answered yes. The remaining 0.8% of respondents answered no. The third survey question asked what would their first course of action be in the event that their student is struggling with a research project or assignment. This was an open-ended question. The choices below were not offered. Forty-two percent of the respondents answered that they would refer their son/daughter to the Refer- ence Desk or to speak with a librarian. Almost 36% of the respondents answered that they would refer their son/daughter to the library. 13.7% of the respondents answered that they would refer their son/daughter to the library website. 5.3% of the respondents answered that they would inform their son/daughter to use the Ask US feature on the library website. The remaining 3.1% of respondents answers were categorized as other. The fourth survey question asked respondents for their opinion on whether the library should offer this ses- sion to the parents of freshmen students in the future. 99.6% of the respondents stated that the library should offer this service in the future. The remaining 0.4% of the respondents answered no. FIGURE 3 Course of action FIGURE 5 Amount of detail FIGURE 4 Should this session be offered in the future? FIGURE 6 Suggestions for improvement MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 405 The fifth survey question asked respondents for their opinion on whether the informational session pro- vided them with the right amount of details. 97.9% of the respondents answered that they received just the right amount of details. 1.7% of the respondents answered that they did not receive enough details. The remaining 0.4% of respondents answered that there were too many details. The sixth and final survey question asked respondents for their suggestions on improvement and what could the library do differently when offering these sessions in the future. This item was an open-ended question; therefore, similar answers were grouped together. 44.2% of the respondents answered that the library should offer these instruction/tour sessions to students. 34.1% of the respondents expressed their appreciation for the event. The remaining 21.7% of respondents answered other. The sixth and final survey question asked respondents for their suggestions on improvement and what could the library do differently when offering these sessions in the future. This item was an open-ended question; therefore, similar answers were grouped together. 44.2% of the respondents answered that the library should offer these instruction/tour sessions to students. 34.1% of the respondents expressed their appreciation for the event. The remaining 21.7% of respondents answered other. Results from the Second Survey The Rod Library conducted an IRB approved survey to be distributed throughout thirty-five sessions, but due to popular demand twelve addition session were added for a total of forty-seven sessions. There were 193 incoming students and parents in attendance; 134 of them voluntarily completed the survey. The survey return rate was FIGURE 7 Demographics FIGURE 9 Incoming students’ confidence level FIGURE 8 Was session informative? FIGURE 10 Parents’ confidence level ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch406 69.4%. The survey consisted of 10 questions utilizing a mixture of dichotomous scale and Likert Scale questions to assess the information obtained from these orientation sessions. The first survey question asked for basic demographic information regarding whether the respondents were either an incoming student or a parent of an incoming student. 51.5% of the respondents identified themselves as an incoming student and 48.5% as parents of an incoming student. The second survey question asked respondents whether they found the library session informative. 98.5% of the respondents indicated that the session was informative while 1.5% of the respondents stated that it was somewhat informative. No one answered that it was not informative. The third survey question asked respondents who marked incoming student or transfer student whether they felt more confident in their abilities to complete research projects and papers for class after attending the session. 71% of the respondents answered yes. This question was not applicable for the remaining 29% of respondents. The fourth survey question asked the respondents who marked parent of an incoming student how confi- dent they felt about their child’s success after having attended the informational session. 61.3% of the respon- dents answered that they were more confident and 38.7% answered that there was no change. The fifth survey question asked respondents whether they would visit the library more often after attending this session. 94.3% of the respondents answered yes while 5.7% answered no. The sixth survey question asked respondents what their first course of action would be in the event that they have questions about library services or if they were struggling with a research project or an assign- ment. 65.2% of the respondents answered that they would ask the librarian or go to the Help Desk for as- sistance. 17.4% of the respondents answered that they would use other library resources or go to the Circu- lation Desk. 15.2% of the respondents would use the library website to search for answers or use the sup- port chat system. The remaining 2.2% of respondents answered that they would use other. The seventh survey question asked respondents whether we should offer this session to future parents and incoming students. 99.2% of the respondents an- swered yes and 0.8% answered no. The eighth survey question asked respondents whether this session provided them with the right amount of details. 94.7% of the respondents answered that the amount of details were just right, 3% indicated not enough, and 2.3% answered too much information. When respondents were asked whether their ses- sion answered all of their questions about library ser- vices, 97% of them said yes while 3% answered no. The final survey question asked respondents what could we do differently to improve our sessions. This FIGURE 11 Will you visit the library more often? FIGURE 12 Course of action MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 407 was an open-ended question and similar answers were grouped together. 67.2% of the respondents indicated that the session was very informative. They had no comments on how to improve our sessions. 11.5% of the respon- dents commented that everyone should take the instruction/tour session, and 21.3% had comments advising modifications to the information presented such as “have the library session on the first day of the orientation.” Discussion The surveys were intended to gather information from incoming students and their parents in order to improve future library sessions. However, there were some limitations to this study. For example, some of the attendees were not informed about this survey and thus did not complete one. Therefore, this affected the return rate. The survey results clearly indicated that these library sessions increased the knowledge of library resources and ser- vices among incoming students and their parents through various means such as teaching them how to navigate through our library website in order to find relevant information. After reviewing the survey results, we improved our instruction/tour sessions. These survey results were dis- cussed with the Dean of Students and orientation staff. As a result of these successful sessions and from the feed- back that we received from incoming students and their parents, the library will now be a part of the extended four-day orientation program called UNI NOW which all incoming students will take part in; parents of incom- ing students will still receive the instruction/tour sessions during summer orientation. During UNI NOW, the library will set up different areas for all incoming students to visit and learn about library services that librarians FIGURE 13 Should we offer this session in the future? FIGURE 15 Did this session answer all of your questions? FIGURE 14 Amount of details FIGURE 16 Comments ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch408 think will be beneficial for them. Last year we had approximately 2,000 incoming students come to the library. One concern regarding freshmen students in academic libraries appears to be their lack of awareness about library services and resources. Even though being a part of the extended orientation program is helpful, we should also think about transfer students. Tag (2004) indicated that academic libraries presume that transfer students do not require orientation because they likely have experience in interacting with campus libraries; however, this is incorrect according to Tag. Indeed, according to Still, “Transfer students can easily slip through the support networks of both two and four-year schools” (Still 1991, 49). As scholars indicate, it is important for universities not to overestimate the preparedness of transfer students when arriving on campus, and proper orientation sessions are strongly encouraged (Grites 2013, 62). Also, libraries need to keep in mind that there are different models of orientation and one size does not fit all. In addition, library staff in charge of orientation need to remember that individuals have different learning styles and that one way of offering these sessions might not be effective for all. Even though Coburn and Woodward focused on parent orientations, their statement that follows is true for all orientations; designing any orientation program is hardly a “‘one size fits all’ proposition;” colleges and universities “must regularly re-examine the purpose, scope, and structure” of orientation programs” (Coburn and Woodward 2001, 28). Bibliography Banks, Maya Riley, and Vitalija Svencionyte. “Freshman Outreach Programs at Southern University” Louisiana Libraries 70, no. 4 (2008): 32–36. Bell, Steven. “Keeping Them Enrolled: How Academic Libraries Contribute to Student Retention.” Library Issues 29, no. 1 (2008): 1–4. Brown, Ann Goebel, Sandra Weingart, Judith R. J. Johnson, and Betty Dance. “Librarians Don’t Bite: Assessing Library Orientation for Freshman.” References Services Review 32, no. 4 (2004): 394–403. Coburn, Karen Levin, and Bill Woodward. “More than Punch and Cookies: A New Look at Parent Orientation Programs.” New Direc- tions for Student Services no. 94 (2001): 27–38. Collins, Nancy, and Eva Dodsworth. “Reaching First-Year Students During Orientation Week.” Partnership: The Canadian Journal of Library and Information Practice and Research 6, no. 2 (2011): 1–8. Cutright, Marc. “From Helicopter Parent to Valued Partner: Shaping the Parental Relationship for Student Success.” New Directions for Higher Education no. 144 (2008): 39–48. Dabbour, Katherine Strober. “Applying Active Learning Methods to the Design of Library Instruction for a Freshman Seminar.” College & Research Libraries 58, no. 4 (1997): 299–308. Donald, Jeremy W. “The ‘Blood on the Stacks’ ARG: Immersive Marketing Meets Library New Student Orientation.” Association of College and Research Libraries. (2008): Accessed November 14, 2016. http://digitalcommons.trinity.edu/cgi/viewcontent. cgi?article=1048 &context=lib_faculty Erickson, Sue, and Celia Walker. “Customer Service and the First Year Student.” Tennessee Libraries 59 (2009): 1–16. Grites, Thomas J. “Successful Transitions from Two-Year to Four-Year Institutions.” New Directions for Higher Education no. 162 (2013): 61–68. Jiao, Qun G., Anthony J. Onwuegbuzie, and Art A. Lichtenstein. “Library anxiety: Characteristics of ‘at-risk’ college students.” Library & Information Science Research 18, no. 2 (1996): 151–163. Junco, Reynol, and Jeanna Mastrodicasa. Connecting to the Net Generation: What Higher Education Professionals Need to Know About Today’s Students. Washington, DC: National Association of Student Personnel Administrators, 2007. Accessed February 17, 2015. http://blog.reyjunco.com/pdf/NetGenerationProof.pdf. Kenyon, DenYelle Baete, and Susan Silverberg Koerner. “College Student Psychological Well-Being during the Transition to College: Examining Individualization from Parents.” College Student Journal 43, no. 4 (2009): 1145–160. Kunkel, Lilith R., Susan M. Weaver, and Kim N. Cook. “What Do They Know?: An Assessment of Undergraduate Library Skills.” Jour- nal of Academic Librarianship 22, no. 6 (1996): 430–34. Marcus, Sandra, and Sheila Beck. “A library Adventure: Comparing a Treasure Hunt with a Traditional Freshman Orientation Tour.” College & Research Libraries 64, no. 1 (2003): 23–44. Mellon, Constance A. “Library Anxiety: A Grounded Theory and Its Development.” College & Research Libraries 47, no. 2 (1986): 160–165. Mills, Melanie, and Marisa Mitchell. “It Takes a Village to Raise a Tent: A Case Study in Pitching the Academic Library to Incoming Undergraduate Students.” Canadian Journal of Library and Information Practice and Research 4, no. 1 (2009): 1–16. Morrill, Richard L., C. Eric Mount, Jr., and Richard A. Fass. “In Loco Parentis Revisited?” Change 18, no. 1 (1986): 34–41. Oling, Lori and Michelle Mach, “Tour Trends in Academic ARL Libraries,” College and Research Libraries 63, no. 1 (2002): 13–23. MARCH 22–25, 2017 • BALTIMORE, MARYLAND Let’s Get Oriented 409 http://digitalcommons.trinity.edu/cgi/viewcontent.cgi?article=1048 http://digitalcommons.trinity.edu/cgi/viewcontent.cgi?article=1048 http://blog.reyjunco.com/pdf/NetGenerationProof.pdf Rhoades, James G., Jr., and Arianne Hartsell. “Marketing First Impressions: Academic Libraries Creating Partnerships and Connections at New Student Orientations.” Library Philosophy and Practice, no. 202 (2008): 1–11. Robinson, Debra AG, Carl F. Burns, and Kevin F. Gaw. “Orientation programs: A foundation for student learning and success.” New Directions for Student Services 1996, no. 75 (1996): 55–68. Savage, Marjorie. “Developing, Staffing, and Assessing Parent Programs.” New Directions for Student Services no. 122 (2008): 67–79. Smith, William L., and Pidi Zhang. “The Impact of Key Factors on the Transition from High School to College Among First and Second Generation Students.” Journal of the First-Year Experience and Students in Transition 22, no. 2 (2010): 49–70. Still, Julie. “Library Services for Transfer Students.” Community & Junior College Libraries 7, no. 1 (1991): 49–53. Tag, Sylvia G. “A Library Instruction Survey for Transfer Students: Implications for Library Services.” Journal of Library Academic Librarianship 30, no. 2 (2004): 102–08. Twork, Monica. “Filling in the Blanks: Developing a Library Orientation for Incoming Community College Students.” Journal of Library Innovation 4, no. 2 (2013): 69– 74. Wartman, Katherine Lynk, and Marjorie Savage. “Parental Involvement in Higher Education: Understanding the Relationship among Students, Parents, and the Institution.” ASHE Education Report 33, no. 6 (2008): 1–125. Wong, Shun Han Rebekah, and Dianne Cmor. “Measuring Association between Library Instruction and Graduation.” College & Re- search Libraries 72, no. 5 (2011): 464–473. ACRL 2017 • AT THE HELM: LEADING TRANSFORMATION Leila June Rod-Welch410 www-brookings-edu-5003 ---- Five things John Lewis taught us about getting in “good trouble” Skip to main content Search Brookings About Us Press Room Experts Events The Brookings Press WashU at Brookings Careers Support Brookings Cart 0 Search   Guidance for the Brookings community and the public on our response to the coronavirus (COVID-19) » Learn more from Brookings scholars about the global response to coronavirus (COVID-19) » Five things John Lewis taught us about getting in “good trouble” Facebook Twitter LinkedIn Print SMS Email More Reddit AI Transition 2021 Cities & Regions Global Dev Intl Affairs U.S. Economy U.S. Politics & Govt More 0 How We Rise Five things John Lewis taught us about getting in “good trouble” Rashawn Ray Thursday, July 23, 2020 How We Rise Facebook Twitter LinkedIn Print SMS Email More Reddit “Get in good trouble, necessary trouble, and redeem the soul of America.” John Lewis made this statement on the Edmund Pettus Bridge in Selma, Alabama on March 1, 2020 commemorating the tragic events of Bloody Sunday. Bloody Sunday occurred on March 7, 1965 as peaceful protesters were beaten by law enforcement officers for crossing the bridge. Lewis and others like Amelia Boynton Robinson were beaten so badly they were hospitalized. Rashawn Ray David M. Rubenstein Fellow - Governance Studies @SociologistRay The context behind the march is significant. The 600-person civil rights march was actually about police brutality. Jimmie Lee Jackson, a 26-year-old church deacon, was killed by James Bonard Fowler, a state trooper in Alabama. This march also occurred a year and a half after the infamous March on Washington highlighting that little had changed in the lives of Black people in America. Bloody Sunday was highlighted in Ava Duvernay’s Oscar-nominated best picture film Selma. Musicians John Legend and Common won an Oscar for the song “Glory.” Bloody Sunday is often noted as a pinnacle of Lewis’ life. This defining moment encapsulates five things he taught us about getting in good trouble. Vote, always “Your vote matters. If it didn’t, why would some people keep trying to take it away? #goodtrouble” Lewis sent this tweet on July 3, 2018. It highlights his life’s work—equitable voting. One major part of the Civil Rights Movement was Black people gaining the right to vote. This finally occurred with the Voting Rights Act of 1965. But the Shelby v Holder Supreme Court decision in 2013 essentially gutted the Voting Rights Act and paved the way for widespread voter suppression and gerrymandering. This is why it is imperative for Congress to act swiftly to pass the John Lewis Voting Rights Advancement Act to ensure equitable access to the polls.  Lewis was an original Freedom Rider, participated in many sit-ins, and was arrested dozens of times for people to have the right to vote. “Some of us gave a little blood for the right to participate in the democratic process,” said Lewis. Now, Congress must honor Lewis’ legacy and ensure an equitable participation in the democratic process. As Lewis noted, “The vote is precious. It is almost sacred. It is the most powerful non-violent tool we have in a democracy.” Never too young to make a difference As a founder and leader of the Student Non-violent Coordinating Committee (SNCC), Lewis was the youngest person to speak at the March on Washington. Elder civil rights leaders aimed to taper his words. Lewis was critical of the Kennedy administration and the slowness by which broad scale legislation change was occurring at the federal level. Lewis also critiqued civil rights legislation for not addressing police brutality against Black people. Imagine how this moment in the Movement for Black Lives may be different had elder Civil Rights leaders listened to Lewis. Lewis’ youth gave him a vision for a more transformative society that was mostly socialized out and, in some cases beaten out, of older leaders. Lewis teaches us that age is nothing but a number and young people have to be the change they want to see by pushing and forcing older people for equitable change. Older people are often socialized in the current arrangement of society and cannot fully envision a radically different world. Lewis stated, “I want to see young people in America feel the spirit of the 1960s and find a way to get in the way. To find a way to get in trouble. Good trouble, necessary trouble.” Young people can and should push for transformative change and hold us accountable to it.   Speak truth to power  “Speak up, speak out, get in the way,” said Lewis. He taught us the importance of speaking up and speaking out. We have to be willing to speak up about injustice, always, no matter the costs. My grandfather who served in two wars earning a Purple Heart and Bronze Star taught me from birth that my silence is my acceptance. Lewis stated, “When you see something that is not right, not fair, not just, you have to speak up. You have to say something; you have to do something.” This motto should apply in all aspects of our lives. Lewis epitomizes it and encourages us to not be silent. He was adamant about supporting free speech, but he was also adamant about condemning hate speech. “I believe in freedom of speech, but I also believe that we have an obligation to condemn speech that is racist, bigoted, anti-Semitic, or hateful.” Become a racial equity broker Lewis is the personification of transitioning from a political activist to a politician. I frame it as transitioning from a racial equity advocate to a racial equity broker. A racial equity advocate speaks up and speaks out, stands in the gap, and sits at the table to advocate for people who cannot advocate for themselves. There is a saying— “If you are not at the table, you are on the menu and someone is eating you for lunch.” Shirley Chisholm said, “If they don’t give you a seat at the table, bring a folding chair.” Lewis realized that to make transformative change, he had to be at the table and often bring his own chair. Once at the table, he realized that he needed to help draft the documents that got discussed at the table. This led him to becoming an elected official and a racial equity broker to alter, deconstruct, and restructure the laws, policies, procedures, and rules that inhibit racial equity. Never give up When Lewis was elected to Congress in 1986, one of his first bills was the creation of a national museum to chronicle the history, culture, and successes of Black Americans. The culmination of this bill was passed in 2003 and opened in 2016 as the National Museum of African American History and Culture. Lewis taught us persistence. He taught us that when a person has transformative ideas, they should not taper those ideas. Instead, they should push those ideas until others get on board. Simply because change is slow does not mean change agents have to move slowly towards it. Lewis was a lightning bolt for equity, social change, and social justice. We must continue his legacy, never forget history, pursue equity, and get in good trouble. Related Content Brookings President John R. Allen statement on the passing of John R. Lewis John R. Allen Saturday, July 18, 2020 How We Rise The diversity of the recent Black Lives Matter protests is a good sign for racial equity Dana R. Fisher Wednesday, July 8, 2020 FixGov When it comes to public opinion on race, it’s not 1968 anymore William A. Galston Monday, June 22, 2020 Related Topics Income Inequality & Social Mobility Race in American Public Policy Social Issues Find us on Facebook Find us on Twitter Find us on YouTube Listen to our Podcast Browse Newsletters Subscribe to our RSS Languages Español 中文 عربي About Us Research Programs Find an Expert Careers Contact Terms and Conditions Brookings Privacy Policy Copyright 2020 The Brookings Institution Trending U.S. Politics & Government Campaigns & Elections Topics AI Transition 2021 Cities & Regions Global Dev Intl Affairs U.S. Economy U.S. Politics & Govt More About Us Press Room Experts Events The Brookings Press WashU at Brookings Careers Support Brookings Cart 0 Get daily updates from Brookings Enter Email Send to Email Address Your Name Your Email Address Cancel Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email. www-brookings-edu-8636 ---- Neighborhood broadband data makes it clear: We need an agenda to fight digital poverty Skip to main content Search Brookings About Us Press Room Experts Events The Brookings Press WashU at Brookings Careers Support Brookings Cart 0 Search   Guidance for the Brookings community and the public on our response to the coronavirus (COVID-19) » Learn more from Brookings scholars about the global response to coronavirus (COVID-19) » Neighborhood broadband data makes it clear: We need an agenda to fight digital poverty Facebook Twitter LinkedIn Print SMS Email More Reddit AI Transition 2021 Cities & Regions Global Dev Intl Affairs U.S. Economy U.S. Politics & Govt More 0 Series: Metropolitan Infrastructure Initiative The Avenue Neighborhood broadband data makes it clear: We need an agenda to fight digital poverty Lara Fishbane and Adie Tomer February 6, 2020 The Avenue Facebook Twitter LinkedIn Print SMS Email More Reddit Lara Fishbane Former Senior Research Assistant - Metropolitan Policy Program larafishbane Adie Tomer Fellow - Metropolitan Policy Program AdieTomer How would you feel if half of the homes your neighborhood didn’t have electricity? Or if a quarter didn’t have running water? It’s hard to imagine, mostly because the United States benefits from near-universal access to electricity and water. That’s not the story for another crucial utility: broadband, or high-speed internet service. Digital platforms have transformed most parts of daily life, from how we talk to one another, to how we consume media, to how we travel. But those platforms are only meaningful if you can access them via broadband. In 2018, more than 18 million American households lived without a broadband subscription. This means that today’s digital economy is out of reach for far too many people. The digital gap between urban and rural parts of the country tends to garner the most attention. However, our analysis of the Census Bureau’s American Community Survey (ACS) data tells another story: The majority of digitally disconnected households live in metropolitan areas, and the gaps are especially large when comparing neighborhoods within the same place. Effectively, some residents live in digital poverty even as their neighbors thrive. Until metropolitan leaders and their state and federal partners can address the situation, we can expect a kind of digital segregation to persist across metropolitan America. Broadband inequities are more than a rural issue Broadband gaps in rural areas are pervasive—it’s expensive for internet service providers to reach places that are sparsely populated or geographically isolated. This kind of market failure demands a response from Congress and state legislatures who want to ensure all Americans get physical access to broadband networks. But rural issues overshadow an even larger national challenge: a lack of universal broadband adoption in metropolitan areas of all sizes. From dense urban cities to emerging exurban counties, 13.9 million metropolitan households live without an in-home or wireless broadband subscription, according to 1-year ACS estimates. That’s more than triple the 4.5 million rural households without a broadband subscription. What’s unique about metropolitan broadband gaps is the variation within the same community. Even though urban cores and mature suburbs in the nation’s largest 100 metro areas have the highest median broadband adoption rates, they also experience the widest variation among their residents (Figure 1). Policymakers must look beyond top-level adoption numbers to understand where metropolitan broadband gaps exist and what drives them. Digital poverty in metropolitan America Data on the metropolitan broadband gap reveals a misconception in our dominant economic narrative. While it is true that some metropolitan areas house the industries and workforce leading the country’s tech-powered economic growth, that doesn’t mean every resident of those high-growth markets are able to join the digital age. To get a sense of broadband disparity within metropolitan areas, we compared broadband subscription rates within census tracts, or an area roughly equivalent to a neighborhood of 5,000 people. We used standard deviations to measure discrepancies in broadband adoption, finding that larger deviations indicated a higher level of broadband inequality in a given metropolitan area. Select a metropolitan area ... Map loading... In general, metropolitan areas with the highest overall broadband adoption rates tend to have the smallest discrepancies between neighborhoods (Figure 2). Metro areas such as Seattle, San Jose, Calif., and Colorado Springs, Colo. all have well-connected neighborhoods and fewer outliers. On the other hand, Memphis, Tenn., El Paso, Texas, and New Orleans have lower overall adoption rates, signifying the large gaps between neighborhood subscription levels. To understand just how deep these disparities run, we created a measure of digital poverty to flag those neighborhoods with the lowest levels of broadband connection. We have defined a tract as experiencing “digital poverty” if half the households do not have a wireline subscription and half the households do not have a wireless subscription. For reference, of the roughly 46,000 tracts across the 100 largest metro areas, 3,362 tracts (7.2%) are in digital poverty. Some regions perform well on digital poverty indicators. The Colorado Springs, San Jose, and Provo, Utah metro areas, for example, all have zero tracts in digital poverty. Moreover, in a quarter of the 100 largest metro areas, less than 3% of tracts are experiencing digital poverty. Though these numbers are promising, they are by no means universal. Eight metro areas, all in the Southeast, have more than 20% of their tracts in digital poverty. Digital poverty is akin to an entire neighborhood with spotty electricity or unreliable water service. These are places where students struggle to engage with digital coursework and adults can’t check online job boards. Digital poverty is a tangible drag on economic prosperity. Metro Name % of Tracts in Digital Poverty McAllen-Edinburg-Mission, TX 47.3 Jackson, MS 26.7 Lakeland-Winter Haven, FL 34.2 El Paso, TX Metro Area 30.1 Augusta-Richmond County, GA-SC 30 New Orleans-Metairie, LA Metro Area 22.9 Birmingham-Hoover, AL Metro Area 22.8 How policymakers can close intraregional digital divides Metropolitan areas cannot maximize their economic potential if residents live in digital poverty. Lack of broadband adoption stymies educational and labor market opportunities, and as long as some households remain disconnected, they will not be able to access government-provided online services such as filing tax returns or renewing a driver’s license. Addressing digital poverty requires moving beyond the urban-rural divide and the geography of physical networks. Local leaders, plus their state and federal peers, need a new agenda focused on comprehensive digital equity. That should include: Expanding digital equity tracking, to objectively understand where network and adoption gaps exist and easily communicate the results to policymakers. Building networks of local champions, ensuring community advocates, government officials, and private network providers share intelligence, debate priorities, and deploy new programming. Funding digital equity programs, including a mix of device subsidies, digital skills curricula, and means-tested subscription benefits. Broadband is essential infrastructure, and we need to start treating it as the same kind of elemental priority as electricity and water service. That process begins by recognizing the extent of digital poverty found across metropolitan America. Interactive maps produced by Alec Friedhoff.  Related Content The Avenue Broadband adoption is on the rise, but states can do much more Lara Fishbane and Adie Tomer Thursday, October 10, 2019 The Avenue Broadband is too important for this many in the US to be disconnected Lara Fishbane and Adie Tomer August 14, 2019 Cities & Regions Signs of digital distress Adie Tomer, Elizabeth Kneebone, and Ranjitha Shivaram Tuesday, September 12, 2017 Related Topics Cities & Regions Economic Development Income Inequality & Social Mobility Infrastructure Social Issues Telecommunications & Internet U.S. Metro Areas Find us on Facebook Find us on Twitter Find us on YouTube Listen to our Podcast Browse Newsletters Subscribe to our RSS Languages Español 中文 عربي About Us Research Programs Find an Expert Careers Contact Terms and Conditions Brookings Privacy Policy Copyright 2020 The Brookings Institution Trending U.S. Politics & Government Campaigns & Elections Topics AI Transition 2021 Cities & Regions Global Dev Intl Affairs U.S. Economy U.S. Politics & Govt More About Us Press Room Experts Events The Brookings Press WashU at Brookings Careers Support Brookings Cart 0 Get daily updates from Brookings Enter Email Send to Email Address Your Name Your Email Address Cancel Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email. www-cisco-com-2227 ---- Consumer Privacy Report - Cisco Cybersecurity Series Feb 2020 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 1 CISCO CYBERSECURITY SERIES 2019 • DATA PRIVACY NOVEMBER 2019 Consumer Privacy Survey The growing imperative of getting data privacy right CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 2 Introduction 3 Results 4 Insight 1: People care about privacy, and a surprisingly large 4 number have already taken actions to protect it Insight 2: Privacy regulation provides “guardrails” for innovation 7 and helps to build trust Insight 3: Consumers value government’s role in regulating 9 the use of personal data, and they view GDPR very favorably Insight 4: Many consumers feel they are unable to protect their 11 personal data, and their biggest challenge is to figure out what companies are doing with their data Conclusion 13 About the Cisco Cybersecurity Series 14 Contents CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 3 Introduction We've seen a constant stream of news headlines regarding hundreds of millions of personal records exposed in data breaches and many examples of companies using customers’ personal data in ways that were not anticipated – nor agreed to. With this background, the Cisco Privacy Office explored end-user (referred to in this report as “consumer”) perspectives on what companies, governments, and individuals have done, and could do, to better protect and respect privacy. The Cisco Consumer Privacy Study uses data gathered on a double-blind basis in May 2019. The survey was completed by over 2,600 adult respondents in 12 of the world’s largest economies – five in Europe, four in Asia Pacific, and three in the Americas.1 Their profiles span various age groups, gender, and income levels. Participants were asked about their attitudes and actions regarding their personal data, the products and services they use, their comfort level with potential new business models, and the impact of data privacy regulations on their behavior. The findings from this study, along with prior Cisco research, reveal a new landscape where privacy has become a critical business imperative and an important driver of consumer behavior. Specifically, this paper explores four areas of insights: • People care about privacy, and a surprisingly large number of them have already taken actions to protect it • Privacy regulations and policies provide “guardrails” for innovation and help to build trust • Consumers value government’s role in regulating the use of data, and they view the EU’s General Data Protection Regulation (GDPR) very favorably • Many consumers worry they are unable to protect their data, and their biggest challenge is figuring out what companies are doing with their data As a result, this research also suggests a new framework for measuring the benefits and return on privacy investment beyond regulatory and compliance requirements. As more consumers place a premium on the proper protection of their data, companies have a significant opportunity to meet regulatory requirements while they capture business benefits and build trust with their customers. Most people today understand it's beneficial and often necessary to provide certain personal information to companies and applications they use in order to receive the benefits of products, services, and business relationships. At the same time, they're increasingly concerned about protecting their privacy and personal data. Companies have a significant opportunity to capture business benefits while building trust and brand value with their customers. 1 Australia, Brazil, China, France, Germany, Italy, India, Japan, Mexico, Spain, UK and US. “Privacy is a business imperative and ethical responsibility – not just a compliance requirement.” Harvey Jang Chief Privacy Officer & Counsel, Cisco CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 4 Insight 1: People care about privacy, and a surprisingly large number have already taken actions to protect it Over the past few years, the public has become more vocal in expressing that they care about data privacy. The big question has been whether they are willing to act, for instance, by giving up certain benefits or paying more to have stronger protection and control. On one hand, many experts and the media have expressed the view that there are very few users who take actions to protect their own privacy.2 On the other hand, user awareness has recently increased in the wake of the EU’s GDPR – which requires disclosures to users about their rights – and constant headlines of data breaches affecting billions of records and millions of users. With this Cisco Consumer Privacy Survey of 2019, we sought to better understand user behaviors and how far they are willing to go (and have gone) to protect their data privacy. Based on the survey responses, we have identified a surprisingly large segment of the population that indicates it cares about data privacy, is willing to act, and in fact has already acted. This segment, which we are calling “Privacy Actives”, accounts for nearly one-third of all respondents. We reached this result by first identifying the vast majority of respondents (84%) who indicated that they care about privacy. They care for their own data, they care about the data of other members of society, and they want more control over how their data is being used. Of this group, 80% also said they are willing to act to protect it. They are willing to spend time or money to keep their data safe, they see data privacy as an important factor influencing their buying decisions, and they expect to pay more for products and services with better protection. Among these respondents, nearly half (48%) indicated they had already switched companies or providers because of their data policies or data sharing practices. Putting all these attributes together, we have a segment of 32% of all respondents who care about data privacy, are willing to act, and have already taken action to protect their privacy. (See Figure 1.) These Privacy Actives are not only sizable, they also represent an attractive demographic for companies selling to them. Compared to the rest of the survey respondents, the Results 2 Sample headlines: “You don’t care enough about your data. This is why”, World Economic Forum, June 26, 2018. “Why You Don’t Care About Internet Privacy”, Medium.com, May 24, 2018. “Privacy is Completely and Utterly Dead, and We Killed It”, Forbes, August 19, 2014. The Privacy Actives Segment N=2601 Figure 1 I care and I’m willing to act and I’ve acted 84% • I care about data privacy • I care about protecting others • I want more control 80% • I am willing to spend time and money to protect my data • This is a buying factor for me • I expect to pay more 48% • I have switched companies or providers over their data policies or data sharing practices Privacy Actives32% Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 5 Privacy Actives are younger: 61% of them are under age 45 versus 46% of other respondents. (See Figure 2.) They also do more of their shopping online (32% vs. 23%). Perhaps even more importantly, Privacy Actives see respect for privacy as core to the brand of the companies with which they do business. Ninety percent say they believe how their data is treated is indicative of the way they will be treated as a customer; and 91% won’t buy from a company if they don’t trust how their data will be used. (See Figure 3.) The emergence of the Privacy Actives segment also helps explain some of the more interesting findings from the Cisco 2019 Data Privacy Benchmark Study. That study highlighted that 87% of companies are experiencing sales delays caused by their customers’ privacy concerns. (See Figure 4.) People today are more concerned about privacy; they are asking more questions about what data is collected, how it is used, who has access to it, and how long it is retained. The fact that more consumers are willing to choose (or change) providers shows evidence consistent with this trend. In addition, we noted that 97% of companies recognized they were realizing benefits such as competitive advantage or investor appeal from their privacy investments. With a large number of consumers closely associating a company’s privacy practices with its brand, it makes sense that companies are realizing these business benefits well beyond any compliance requirements. Organizational respondents experiencing delays in their sales cycles due to customers' data privacy concerns Percent of respondents, N=2064 Figure 4 Yes No 13% 87% Source: Cisco 2019 Data Privacy Benchmark Study Attitudes of Privacy Actives versus others N=2601 Figure 3 Others How they treat data is how they treat me Won’t buy if don’t trust how data is used 0 20% 40% 60% 80% 100% 67% Privacy Actives 90% Others 0 20% 40% 60% 80% 100% 61% Privacy Actives 91% Source: Cisco Consumer Privacy Study - 2019 Percentage aged 18-44 Privacy Actives vs. others N=2601 Figure 2 0% 20% 60% 40% 80% 100% Privacy Actives Others 46% 61% Source: Cisco Consumer Privacy Study - 2019 https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 6 “This research from Cisco confirms that people have become aware of their privacy rights, and they will proactively choose to interact with organizations who they trust will be responsible with their data. It is therefore a business imperative and a competitive advantage for companies to embrace transparency and accountability in how they manage personal data and focus on building digital trust with their customers.” Bojana Bellamy President, Centre of Information Policy Leadership (CIPL) CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 6 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 7 In future research, we’ll continue to monitor the Privacy Actives segment, including its size, demographic makeup, and behaviors. Insight 2: Privacy regulation provides “guardrails” for innovation and helps build trust A second area of focus in the survey was to understand consumers’ interest and acceptance of emerging business models that might involve using their personal data in new ways that could benefit the individual or society at large. Some users find these models invasive, while others find them acceptable. We wanted to better understand this dynamic, and also wanted to understand whether privacy regulations play a role in user acceptability. While each of the models we tested included using personal data in a potentially unanticipated way, each also included a personal or societal benefit. The models we tested included: • Sharing personal information from your home or your car in exchange for receiving health or safety warnings that could benefit you and your family. • Allowing a smart home speaker (e.g., Alexa, Echo) to “listen” for personal information in exchange for receiving health or safety warnings that could benefit you and your family. • Sharing personal information from your social networks (e.g., Facebook, Twitter) that could be aggregated and anonymized to improve the health of the overall population. • Sharing personal information about your past purchases combined with relevant health information to enable a retainer to suggest products (e.g., shoe style) that would be best for you. “Data privacy and protection differentiates business today. Do it right, you stand out. Do it wrong, and you will be called out.” John N. Stewart SVP, Chief Security and Trust Officer, Cisco Info from car/home Home speaker Social networks Past Purchases Workplace Location info 28% 32% 40% 26% 27% 47% 29% 31% 40% 30% 31% 31% 39% 33% 36% 29% 31% 40% Comfortable UncomfortableNeutral Users’ comfort levels with new business models. N=2601 Figure 5 Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 8 • Sharing personal information from your workplace (e.g., your location and movements) that could be aggregated to improve the efficiency and safety of the work environment for everyone. • Sharing personal information about your current geographic location in exchange for promotional offers and pricing advantages from local stores. Survey respondents were generally not supportive of these new business models. Despite the potential personal or societal health and safety benefits associated with the models, 36% to 47% (depending on the model) indicated they were not comfortable having their data used in this way, while only 26%-31% indicated they were comfortable. (See Figure 5.) As a result, companies seeking to introduce products and services using personal data in new ways should make sure they have considered and addressed customers’ potential data privacy concerns. Privacy regulations, to the extent people are aware of them, seem to play an important role in making users more comfortable with how their data might be used. Specifically, respondents who were aware of privacy regulations (like GDPR) indicated they were much more comfortable with these potential new business models than those who were not aware. Averaged across all six of these models, 38% of respondents who were aware of GDPR were comfortable with them versus only 24% of respondents who were unaware of GDPR. Interestingly, this increase in comfort level was consistent across every country in the study. While there are differences as to the absolute comfort level, each geography showed higher comfort levels among the respondents who were aware of GDPR. When privacy controls are clearly identified (e.g., in a specific law or standard), they seem to be beneficial for both consumer and corporate activities. (See Figure 6.) 0% 10% 18 23 32 60 34 70 20% 30% 40% 50% 60% 70% 80% Respondents not aware of GDPR Respondents who are aware of GDPR Australia Brazil China France Germany India Italy Japan Mexico Spain UK USA 16 21 13 21 46 27 41 12 25 33 46 18 27 19 26 18 52 69 Average comfort level with six new business models, by country. N=2601 Figure 6 Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 9 In the Cisco 2019 Data Privacy Benchmark Study, 42% of companies indicated that their privacy investments enabled agility and innovation at their companies. By knowing what they couldn’t do from a privacy perspective, they were much freer (and in some cases, compelled) to pursue new ideas on what they could do. These results do not imply that every regulation would be beneficial to corporate innovation or to consumers. Too much, too prescriptive, or inconsistent regulation could be costly, burdensome, and confusing for both companies and users. Nonetheless, it appears that at least some regulation provides benefits to all in an otherwise confusing landscape. Insight 3: Consumers value government’s role in regulating the use of personal data, and they view GDPR very favorably Survey respondents were asked which entity – federal or local government, companies, industry associations, or individuals – should have primary responsibility for protecting personal data. Governments can provide regulation and oversight, but confusing or overly broad regulation can also become burdensome on companies and individuals. Companies have a responsibility to protect the data of their customers, but sometimes their short-term profit motives interfere. Many consumers might accept they are also partially responsible for their decisions on when and how they share their data, but they might struggle to understand exactly what is being done with their data. While respondents were somewhat split on the question of who is responsible for protecting data privacy, most selected federal government (45%), followed by the individual user (24%) and companies (21%). (See Figure 7.) Indeed, all three would seem to have an important role to play in protecting personal information. Governments can oversee what companies are doing, companies can set and follow appropriate data policies anchored in the principles of transparency, fairness, and accountability, and individuals can take steps to protect their own privacy and accept responsibility for the choices they make. With more respondents indicating they wanted the government to be responsible, perhaps it's not surprising that those familiar with GDPR felt it had a very positive impact. An overwhelming majority of respondents expressed a positive view of the GDPR, with 55% of respondents in favor and only 5% of respondents expressing a negative view. (See Figure 8.) National Government Individual User Companies Local Government Associations 45% 24% 21% 7% 3% Who is primarily responsible for protecting data privacy N=2601 Figure 7 Source: Cisco Consumer Privacy Study - 2019 NegativeNeutral 55% 5% 40% Positive Overall sentiment regarding the impact of GDPR N=941 Figure 8 Source: Cisco Consumer Privacy Study - 2019 https://www.cisco.com/c/en/us/products/security/security-reports.html https://www.cisco.com/c/en/us/products/security/security-reports.html CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 10 Although there is some variation across countries, there is generally a very positive view of GDPR among consumers worldwide with very little negative sentiment. (See Figure 9.) Respondents were also asked about whether GDPR was effective in meeting various privacy goals for the individual. Fifty-two percent said they felt they had more control of their personal data as a result of GDPR, 59% said they have a greater ability to exercise their rights regarding data, and 47% said they have greater trust in companies that use their data. On the negative side, 47% expressed notification fatigue and said they receive far too many meaningless privacy-related notifications as a result of GDPR. (See Figure 10.) Impact of GDPR on the individual. N=941 Figure 10 I have more control over my personal data I have greater ability to exercise my rights regarding my data I have a greater level of trust in companies that use my data I receive too many meaningless noti�cations as a result of GDPR 18% 30% 52% 13% 28% 59% 19% 34% 47% 21% 32% 47% Disagree AgreeNeutralSource: Cisco Consumer Privacy Study - 2019 Australia Brazil China France Germany India Italy Japan Mexico Spain UK USA 4% 57% 39% 6% 30% 64% 18% 82% 2% 64% 34% 10% 53% 37% 1% 10% 89% 8% 39% 53% 5% 55% 40% 5% 17% 78% 5% 41% 54% 6% 48% 46% 2% 33% 65% Negative 10%0% 30%20% 50%40% 70%60% 90% 100%80% PositiveNeutral Overall sentiment regarding the impact of GDPR, by country. N=941 Figure 9 Note: For Australia, Brazil, and Japan, the number of respondents familiar with GDPR is relatively small, so the margin of error is significant. The results are included because the margin of error is still much smaller than the percentage differences between respondents with positive and negative sentiment. Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 11 Our survey also revealed limitations to the public perception of privacy regulations. Public awareness is still only partial and has much room for improvement. Overall, only about one-third of respondents across the 12 countries in our survey are familiar with these new regulations. Even in Western Europe, where the GDPR went into effect with considerable press and corporate communications in mid-2018, about a third of respondents are still not aware of GDPR, and a minority of respondents is still neutral regarding its benefits. (See Figure 11.) Insight 4: Many consumers feel they are unable to protect their personal data, and their biggest challenge is figuring out what companies are doing with their data The increased focus on privacy has brought a number of challenges, and one of the biggest issues raised by our survey respondents is the need for greater transparency and simplicity in understanding how their data is being used. Forty-three percent of all respondents don’t believe they can adequately protect “This Cisco research shows that privacy has become a critical issue for individuals worldwide, and companies (like ours) need to continue to treat our customers' data properly to build and maintain their trust. ” Tom Moore Chief Privacy Officer and SVP, AT&T Aware Not aware All respondents By country 64% 36% 0% 10% 20% 30% 40% 50% 60% 70% AU Brazil USAJapan China Mex Italy France India Spain Ger UK 12% 17% 20% 22% 25% 30% 42% 48% 48% 56% 64% 67% Awareness of GDPR N=2601 Figure 11 Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 12 their personal data today. This concern is also higher with respondents 55 years of age and above, with 52% indicating they cannot protect their personal data today. Respondents who worried they could not protect their data were also asked the primary cause of this problem. The top answer, cited by nearly three-fourths of respondents, was that “it’s too hard to figure out what companies are doing with my data.” Other significant responses included: “If I want the service, I have to accept how my data is used” (49%); “I feel my data is already available” (49%); and “I don’t trust companies to follow their stated policies” (41%). (See Figure 12.) These responses reveal a gap between consumers’ expectations and companies' stated and actual practices. It appears that companies haven’t done an ample job of explaining clearly to customers how their data is being used, and demonstrating that they are, in fact, following stated policies to respect and protect data privacy. Ability of users to protect their data and reasons why they think they can’t Left: N=2601 Right: N=1129 Figure 12 No Yes Are you able to e�ectively protect your personal data today? Reasons why not? 43% 57% 0% 10% 20% 30% 40% 50% 60% 70% 80% Too hard to �gure out what companies are actually doing with my data If I want the service, I have to accept how my data is used Feel my personal data is already available Don’t trust companies to follow stated policies Don’t understand what service choices are 73% 41% 41% 49% 46% Source: Cisco Consumer Privacy Study - 2019 CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 13 Conclusion The results of this survey, combined with past Cisco data privacy research, suggest a new framework for measuring the benefits and return on privacy investments. Interviews with privacy decision-makers show that companies and their governance entities (board of directors) have generally focused on legal compliance and avoiding the potential of regulatory fines and penalties. Our recent findings suggest an even broader value model for capturing the business benefits of privacy, including the following areas. 1. Attracting and retaining customers who care about privacy and are willing to act. This research shows the vast majority of people care about protecting their privacy, and a third are already acting by switching providers when one falls short. This segment represents an attractive portion of the customer base, as they are younger, more affluent, and more online than the rest of the population. Customers are increasingly seeing data privacy as a critical part of the brand of a company, and companies need to invest in privacy to make sure their customers understand and are comfortable with their data practices and policies. If not, customers will migrate to other companies with which they are more comfortable. 2. Improving business agility and innovation. In this research, customers have shown an increased willingness to accept new uses of their data when they feel adequate protections are in place. They’re looking to governments, as well as companies, to adopt rules and policies that provide these protections. When these “guardrails“ are in place, there is greater flexibility for companies to innovate and greater acceptance by customers of new business models. This further validates our previous research showing companies are seeing these benefits from their privacy investments. 3. Reducing sales friction. Having more customers care about privacy and being willing to act can also create friction in a company’s sales cycle. Potential customers are increasingly asking questions about how their data will be used when choosing a vendor. If companies don’t have transparent and easily understood information, they will see significant delays and lost opportunities in their sales cycles. 4. Enhancing the overall attractiveness of the company. Shareholders and investors are also beginning to understand the increasing importance of privacy to a company’s brand and value, and they will reward those companies who get it right. In conclusion, organizations should think of the value of privacy broadly, beyond compliance and risk avoidance. For many organizations, privacy has now become a critical business imperative. CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 14 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Published November 2019 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1876404) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA), Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Throughout the past decade, Cisco has published a wealth of definitive security and threat intelligence information for security professionals interested in the state of global cybersecurity. These comprehensive reports have provided detailed accounts of threat landscapes and their organizational implications, as well as best practices to defend against the adverse impacts of data breaches. In our new approach to thought leadership, Cisco Security is publishing a series of research- based, data-driven publications under the banner Cisco Cybersecurity Series. We’ve expanded the number of titles to include different reports for security professionals with different interests. Calling on the depth and breadth of expertise of threat researchers and innovators in the security industry, the reports in the 2019 series include the Data Privacy Benchmark Study, the Threat Report, and the CISO Benchmark Study, with others published throughout the year. For more information, and to access all the reports and archived copies, visit www.cisco.com/go/securityreports. About the Cisco Cybersecurity Series PRIV_07_1119_FINAL CISCO CYBERSECURITY SERIES 2019 Consumer Privacy Survey 1 CISCO CYBERSECURITY SERIES 2019 • DATA PRIVACY NOVEMBER 2019 Consumer Privacy Survey: The Growing Imperative of Getting Data Privacy Right http://www.cisco.com/go/offices http://www.cisco.com/go/trademarks https://www.cisco.com/c/en/us/products/security/security-reports.html www-facebook-com-7672 ---- Update Your Browser | Facebook Update Your Browser You’re using a web browser that isn’t supported by Facebook. To get a better experience, go to one of these sites and get the latest version of your preferred browser: Google Chrome Mozilla Firefox Get Facebook on Your Phone Stay connected anytime, anywhere. www-fastcompany-com-1041 ---- Here are 3 privacy-focused alternatives to Google Analytics Fast Company Follow COVID-19 Co.Design Tech Work Life News Impact Podcasts Video Recommender Subscribe Newsletters Magazine FastCo Works Honeywell Lenovo Siemens Homepage COVID-19 Co.Design Tech Work Life News Impact Podcasts Video Recommender Subscribe Help Centerfastco works Booz Allen Hamilton Capital One EPOS Facebook GSK Honeywell Lenovo SAP FOR MIDMARKET SIEMENS FastCo Works An award-winning team of journalists, designers, and videographers who tell brand stories through Fast Company's distinctive lens collections Tech Forecast What’s next for hardware, software, and services Most Innovative Companies Our annual guide to the businesses that matter the most Most Creative People Leaders who are shaping the future of business in creative ways World Changing Ideas New workplaces, new food sources, new medicine--even an entirely new economic system Innovation By Design Celebrating the best ideas in business NewsletterEvents Innovation Festival The Grill Courses and LearningAdvertiseCurrent IssueCurrent IssueSUBSCRIBE Follow us: advertisement advertisement 02-01-19 It’s time to ditch Google Analytics In the last year, a swell of privacy-focused website analytics platforms have started to provide an alternative to Google’s tracking behemoth. [Illustration: FC] By Katharine Schwab7 minute Read advertisement advertisement advertisement Google is so embedded in the infrastructure of the web that you don’t always know when it’s there–but Google isn’t just tracking your movements online so it can sell ads. It also provides Google Analytics, which helps other companies and individuals identify who visits their websites, along with a host of other information, like how much time you spend on a given site, where you came from, and even where you’re located. For businesses, Google Analytics provides crucial information about their customers. advertisement advertisement But it also tracks a lot of data. And as Google has come under fire for a host of privacy scandals and consumers have grown wary of a general lack of privacy on the internet, a series of new startups has launched in the past few months to provide privacy-centric analytics, claiming not to collect any personal data and only display simple metrics like page views, referral websites, and screen sizes in clean, pared-down interfaces. [Image: courtesy Fathom]For Paul Jarvis, a writer and developer who’s been creating websites for 20 years, Google Analytics tracks more data than he’s comfortable with, including where people live and their age range. “This isn’t cool,” he says. “I don’t want my sites to do this.” Google says that Google Analytics offers customization on what types of data website owners collect, and users who don’t want to be tracked by Google Analytics can download a browser extension that blocks it. The company also says that Google Analytics doesn’t track any personally identifiable information, which includes things like names, phone numbers, mailing or email addresses, and geographical coordinates. In June 2018, Jarvis launched an open-source analytics platform called Fathom, which anyone can use for free (though it requires technical knowledge to set up). The simple interface is just one web page, with a graph showing page views and visitors; a column of the biggest, most important numbers many users care about, like average time on site and bounce rate; and lists of top referral sites and most popular pages on the site. Crucially, everything is aggregated. “I came to the conclusion that I need aggregate data, not personal data,” Jarvis says. “It tracks the sum of actions that are taken, but nothing about a person.” After seeing a surge of interest from developers, Jarvis launched a paid version of the service, where he and his partner Danny van Kooten will host the analytics on one of their servers and take care of maintenance, with prices ranging from $14 per month for less than 100,000 page views per month to $79 per month if the website gets more than 10 million page views per month (Google Analytics is free). The tiny company now has about 230 paying customers, many of whom are from Europe, which makes sense given the region’s stricter data laws and greater awareness of privacy issues. Jarvis says that the company processes more payments in euros than in U.S. dollars, and has been profitable since launch. [Image: Simple Analytics]Around the same time Fathom launched a paid service, another data analytics company launched with a similar proposition, encapsulated in its name: Simple Analytics. Amsterdam-based developer Adriaan van Rossum founded it because he became worried about how much data Google Analytics was hoovering up about people without them knowing. He built the platform on a simple concept–no cookies, those pesky trackers that follow you around the internet, at all. Van Rossum’s code, which is only two lines embedded into the web page, also honors a browser setting called “Do Not Track,” which sends a message to the analytics software requesting for the user not to be tracked (it’s not turned on by default, but is available in most browsers). Most analytics ignore this setting since website owners have to opt-in to it, but Simple Analytics respects it and doesn’t include that visitor in its metrics. “The person or the visitor or browser user should be able to say, I don’t want to be tracked,” van Rossum says. There are a few types of people who have gravitated toward van Rossum’s platform, which costs $9 per month for less than 100,000 page views, and $49 for less than a million (an enterprise package for bigger sites is also available). Some people sign up for Simple Analytics because they care about privacy, he says; but others sign up because they prefer the simple interface. “There’s a group of people that want to have analytics but are overwhelmed with the amount of information you get from Google Analytics,” he says. “You already get a headache when you open the page.” advertisement [Image: Simple Analytics]That’s certainly been the case for some of Fathom’s users as well, like the dieting website Paleo Leap. “We’re a very small company, and I’m the one who wears all the hats, and I don’t have time to dig very deep into analytics and conversion numbers,” says site creator Seb Noël. “I just need a tool that tells me how many visitors the site gets, what the most popular pages are, and what other sites refer to Paleo Leap. With other analytic solutions, there’s just no way not to gather other data, and I don’t like the idea of having more data points than I need.” While Simple Analytics and Fathom are both recent additions to the world of privacy-focused data analytics, 1.5% of the internet already uses an open-source, decentralized platform called Matomo, according to the company. The project, which began in 2007, started as an open-source alternative to Google Analytics, which launched two years earlier. “When [Google] released Google Analytics, [it] was obvious to me that a certain percent of the world would want the same technology, but decentralized, where it’s not provided by a centralized corporation and you’re not dependent on them,” says Matthieu Aubry, Matomo’s founder. “If you use it on your own server, it’s impossible for us to get any data from it.” Aubry says that 99% of Matomo users use the analytics code, which is open for anyone to use, and host their analytics on their own servers–which means that the company has no access to it whatsoever. For Aubry, that’s his way of ensuring privacy by design. United Nations, Amnesty International, NASA, and the European Commission and about 1.5 million other websites use Matomo. But Matomo also offers significantly more robust tracking than Fathom or Simple Analytics–Aubry says it can do about 95% of what Google Analytics does. Still, there are a few key differences. Like Simple Analytics, Matomo honors Do Not Track. It was one of the first analytics platforms to anonymize IP addresses, a feature that Google introduced many years later. Matomo is also GDPR-compliant and gives its users the ability to delete information (Google is as well). And importantly, Matomo gives website owners more control over what specific pieces of data to track. “What we did is we gave people the tools to control how much they wanted to track and how precise they wanted to track,” Aubry says. In the last few years, Matomo has focused on becoming more of a sustainable business rather than a large community project. It launched premium features for its business users that are paid, offers paid support for those that host their own analytics servers, and most recently launched a cloud service so less tech-savvy organizations can pay Matomo to host their data. For some businesses, ensuring that analytics capture as little personal information as possible is paramount. The encrypted search engine DuckDuckGo’s entire business model is built on not tracking users, so the company built an internal analytics platform that would live up to its privacy standards. For others, it’s more a question of caution. Fathom user JSFiddle, a coding playground application for developers, uses Fathom for that reason. “As you might imagine, web developers are pretty tech-savvy people, and these days very privacy-cautious–they understand what tracking is, what is remarketing, and how scripts follow you across the internet,” Oskar Krawczyk, cofounder of JSFiddle, tells Fast Company via email. “With that in mind and the fact that I personally am not a fan of tracking, we decided to remove all external resources from JSFiddle that may potentially do tracking for remarketing purposes–obviously the biggest abuser here is Google Analytics.” advertisement A spokesperson from Google denied that Google uses any data from Analytics as part of its advertising, but the fact that so many developers worry about it points to Google’s reputation as an opaque, data-hungry goliath. After all, the company failed to disclose its widespread location tracking of Android users and only admitted that a data breach affecting 500,000 Google+ users occurred after it was caught–not to mention that the company collects reams of data through its vast number of free services, such as Google Search, Google Maps, and Gmail. The rise of these analytics startups speaks to a growing desire for alternatives to the corporate ecosystems controlled by giants like Google, Amazon, and Apple, a swell that has helped privacy-focused search engine DuckDuckGo reach 36 million searches in a day. There’s even an entire website dedicated to alternates to all of Google’s services. For Aubry of Matomo, this concentration of power in the hands (or servers) of billion-dollar companies is the reason to support smaller, decentralized networks like his own that share code. “We want to control our future technology–be able to understand it, study it, see what it does beneath the hood,” he says. “And when it doesn’t work we can fix it ourselves.” About the author Katharine Schwab is the deputy editor of Fast Company's technology section. Email her at kschwab@fastcompany.com and follow her on Twitter @kschwabable More Fast Company Daily Newsletter Sign Up Receive special Fast Company offers. See All Newsletters Video Impact ImpactWhat environmental rule rollbacks will Trump try to sneak through before the end? ImpactThis sweater was grown in a bioreactor ImpactThis vertical farm is growing food—but it’s for cows News NewsThis 2-second cable news mishap captures the difficulty of trying to do your job right now NewsThese 50 ‘surprising’ remote jobs will actually surprise you NewsA new Beyoncé-Peloton collab? 2020 is turning around after all Co.Design Co.DesignKamala Harris’s white suit was a nod to the suffragists before her—but that’s only part of the story Co.DesignIs your home office chair destroying your body? Herman Miller wants to help Co.DesignMany U.S. stores will close forever. That’s a good thing Work Life Work LifeFrom e-commerce to curbside pickup: What will Black Friday 2020 look like? Work LifeHow Kacey Musgraves relit her creativity and productivity with her ‘Slow Burn’ candle Work LifeHow emotional intelligence can help you find your next job Advertise Privacy Policy Terms Notice of Collection Do Not Sell My Data Permissions Contact About Us Site Map Fast Company & Inc © 2020 Mansueto Ventures, LLC www-gartner-com-1162 ---- Gartner's Top 10 Strategic Technology Trends for 2017 - Smarter With Gartner Smarter With Gartner Subscribe COVID-19 Executive Finance Human Resources IT Legal & Compliance Marketing Sales Service Supply Chain Subscribe to Smarter With Gartner Subscribe Gartner’s Top 10 Strategic Technology Trends for 2017 Trends October 18, 2016 Contributor: Kasey Panetta Artificial intelligence, machine learning, and smart things promise an intelligent future. Today, a digital stethoscope has the ability to record and store heartbeat and respiratory sounds. Tomorrow, the stethoscope could function as an “intelligent thing” by collecting a massive amount of such data, relating the data to diagnostic and treatment information, and building an artificial intelligence (AI)-powered doctor assistance app to provide the physician with diagnostic support in real-time. AI and machine learning increasingly will be embedded into everyday things such as appliances, speakers and hospital equipment. This phenomenon is closely aligned with the emergence of conversational systems, the expansion of the IoT into a digital mesh and the trend toward digital twins. Explore the latest: Gartner Top Strategic Technology Trends for 2021 Three themes — intelligent, digital, and mesh — form the basis for the Top 10 strategic technology trends for 2017, announced by David Cearley, vice president and Gartner Fellow, at Gartner Symposium/ITxpo 2016 in Orlando, Florida. These technologies are just beginning to break out of an emerging state and stand to have substantial disruptive potential across industries. Intelligent AI and machine learning have reached a critical tipping point and will increasingly augment and extend virtually every technology enabled service, thing or application.  Creating intelligent systems that learn, adapt and potentially act autonomously rather than simply execute predefined instructions is primary battleground for technology vendors through at least 2020. Trend No. 1: AI & Advanced Machine Learning AI and machine learning (ML), which include technologies such as deep learning, neural networks and natural-language processing, can also encompass more advanced systems that understand, learn, predict, adapt and potentially operate autonomously. Systems can learn and change future behavior, leading to the creation of more intelligent devices and programs.  The combination of extensive parallel processing power, advanced algorithms and massive data sets to feed the algorithms has unleashed this new era. Read more: The Disruptive Power of Artificial Intelligence In banking, you could use AI and machine-learning techniques to model current real-time transactions, as well as predictive models of transactions based on their likelihood of being fraudulent. Organizations seeking to drive digital innovation with this trend should evaluate a number of business scenarios in which AI and machine learning could drive clear and specific business value and consider experimenting with one or two high-impact scenarios.. Trend No. 2: Intelligent Apps Intelligent apps, which include technologies like virtual personal assistants (VPAs), have the potential to transform the workplace by making everyday tasks easier (prioritizing emails) and its users more effective (highlighting important content and interactions). However, intelligent apps are not limited to new digital assistants – every existing software category from security tooling to enterprise applications such as marketing or ERP will be infused with AI enabled capabilities.  Using AI, technology providers will focus on three areas — advanced analytics, AI-powered and increasingly autonomous business processes and AI-powered immersive, conversational and continuous interfaces. By 2018, Gartner expects most of the world’s largest 200 companies to exploit intelligent apps and utilize the full toolkit of big data and analytics tools to refine their offers and improve customer experience. Read more: 5 Steps to Address IoT Integration Challenges Trend No. 3: Intelligent Things New intelligent things generally fall into three categories: robots, drones and autonomous vehicles. Each of these areas will evolve to impact a larger segment of the market and support a new phase of digital business but these represent only one facet of intelligent things.  Existing things including IoT devices will become intelligent things delivering the power of AI enabled systems everywhere including the home, office, factory floor, and medical facility. As intelligent things evolve and become more popular, they will shift from a stand-alone to a collaborative model in which intelligent things communicate with one another and act in concert to accomplish tasks. However, nontechnical issues such as liability and privacy, along with the complexity of creating highly specialized assistants, will slow embedded intelligence in some scenarios. Digital Business The Real Business of Blockchain How leaders can create value in a new digital age. Download Book Chapter Digital The lines between the digital and physical world continue to blur creating new opportunities for digital businesses.  Look for the digital world to be an increasingly detailed reflection of the physical world and the digital world to appear as part of the physical world creating fertile ground for new business models and digitally enabled ecosystems. Trend No. 4: Virtual and augmented reality Virtual reality (VR) and augmented reality (AR) transform the way individuals interact with each other and with software systems creating an immersive environment.  For example, VR can be used for training scenarios and remote experiences. AR, which enables a blending of the real and virtual worlds, means businesses can overlay graphics onto real-world objects, such as hidden wires on the image of a wall.  Immersive experiences with AR and VR are reaching tipping points in terms of price and capability but will not replace other interface models.  Over time AR and VR expand beyond visual immersion to include all human senses.  Enterprises should look for targeted applications of VR and AR through 2020. Read more: Why IT Leaders Should Pay Attention to Augmented Reality Trend No. 5: Digital twin Within three to five years, billions of things will be represented by digital twins, a dynamic software model of a physical thing or system. Using physics data on how the components of a thing operate and respond to the environment as well as data provided by sensors in the physical world, a digital twin can be used to analyze and simulate real world conditions, responds to changes, improve operations and add value. Digital twins function as proxies for the combination of skilled individuals (e.g., technicians) and traditional monitoring devices and controls (e.g., pressure gauges). Their proliferation will require a cultural change, as those who understand the maintenance of real-world things collaborate with data scientists and IT professionals.  Digital twins of physical assets combined with digital representations of facilities and environments as well as people, businesses and processes will enable an increasingly detailed digital representation of the real world for simulation, analysis and control. Read more: Gartner Top 10 Strategic Technology Trends for 2018 Trend No. 6: Blockchain Blockchain is a type of distributed ledger in which value exchange transactions (in bitcoin or other token) are sequentially grouped into blocks.  Blockchain and distributed-ledger concepts are gaining traction because they hold the promise of transforming industry operating models in industries such as music distribution, identify verification and title registry.  They promise a model to add trust to untrusted environments and reduce business friction by providing transparent access to the information in the chain.  While there is a great deal of interest the majority of blockchain initiatives are in alpha or beta phases and significant technology challenges exist. Read more: Are You Ready for Blockchain? [Infographic] Trends Gartner Top Strategic Technology Trends 2021 Technology trends IT can’t afford to ignore Download eBook Mesh The mesh refers to the dynamic connection of people, processes, things and services supporting intelligent digital ecosystems.  As the mesh evolves, the user experience fundamentally changes and the supporting technology and security architectures and platforms must change as well. Trend No. 7: Conversational systems Conversational systems can range from simple informal, bidirectional text or voice conversations such as an answer to “What time is it?” to more complex interactions such as collecting oral testimony from crime witnesses to generate a sketch of a suspect.  Conversational systems shift from a model where people adapt to computers to one where the computer “hears” and adapts to a person’s desired outcome. Read more: AI Gives Customers a Valuable Resource: Time Conversational systems do not use text/voice as the exclusive interface but enable people and machines to use multiple modalities (e.g., sight, sound, tactile, etc.) to communicate across the digital device mesh (e.g., sensors, appliances, IoT systems). Trend No. 8: Mesh app and service architecture The intelligent digital mesh will require changes to the architecture, technology and tools used to develop solutions. The mesh app and service architecture (MASA) is a multichannel solution architecture that leverages cloud and serverless computing, containers and microservices as well as APIs and events to deliver modular, flexible and dynamic solutions.  Solutions ultimately support multiple users in multiple roles using multiple devices and communicating over multiple networks. However, MASA is a long term architectural shift that requires significant changes to development tooling and best practices. Trend No. 9: Digital technology platforms Digital technology platforms are the building blocks for a digital business and are necessary to break into digital. Every organization will have some mix of five digital technology platforms: Information systems, customer experience, analytics and intelligence, the Internet of Things and business ecosystems. In particular new platforms and services for IoT, AI and conversational systems will be a key focus through 2020.   Companies should identify how industry platforms will evolve and plan ways to evolve their platforms to meet the challenges of digital business. Trend No. 10: Adaptive security architecture The evolution of the intelligent digital mesh and digital technology platforms and application architectures means that security has to become fluid and adaptive. Security in the IoT environment is particularly challenging. Security teams need to work with application, solution and enterprise architects to consider security early in the design of applications or IoT solutions. Multilayered security and use of user and entity behavior analytics will become a requirement for virtually every enterprise. Read more: Gartner Top 10 Strategic Technology Trends for 2018 Subscribe to Smarter With Gartner Subscribe Related Content 1. 3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020 2. 5 Habits of Organizations With Successful AI 3. Gartner Top 10 Strategic Predictions for 2021 and Beyond 4. 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Read the complimentary report, Top 10 Strategic Technology Trends for 2017. Get Smarter Follow #Gartner Attend a Gartner event Explore Gartner Conferences View Free, Relevant Gartner Research Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence. Read Free Gartner Research Webinars Get actionable advice in 60 minutes from the world's most respected experts. Keep pace with the latest issues that impact business. Start Watching I use Gartner to bolster my confidence in decision making. Stay smarter Become a Client Most Read Gartner Top 10 Strategic Technology Trends for 2018 Trends Gartner’s Top 10 Strategic Technology Trends for 2017 Trends Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017 Trends Gartner Top 10 Strategic Technology Trends for 2019 Trends Editor’s Picks Gartner Top 3 Priorities for HR Leaders in 2021 Gartner Top 3 Priorities for HR Leaders in 2021 Human Resources 7 Digital Disruptions You Might Not See Coming In the Next 5 Years 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Trends Manage Risks From the U.S. Election Today Manage Risks From the U.S. Election Today Legal & Compliance Use Zero-Based Budgeting to Rightsize Tight Budgets Use Zero-Based Budgeting to Rightsize Tight Budgets Executive About Smarter With Gartner Careers Newsroom Ombudsman Investor Relations Policies IT Glossary Contact Us Privacy Policy Terms Of Use © 2020 Gartner, Inc. and/or its affiliates. All rights reserved. Subscribe to Smarter With Gartner Subscribe www-gartner-com-2512 ---- Gartner Top 10 Strategic Technology Trends for 2018 - Smarter With Gartner Smarter With Gartner Subscribe COVID-19 Executive Finance Human Resources IT Legal & Compliance Marketing Sales Service Supply Chain Subscribe to Smarter With Gartner Subscribe Gartner Top 10 Strategic Technology Trends for 2018 Trends Live from #GartnerSYM October 3, 2017 Contributor: Kasey Panetta Artificial intelligence, immersive experiences, digital twins, event-thinking and continuous adaptive security create a foundation for the next generation of digital business models and ecosystems. How do designers make cars safer? They treat them like a school of fish. Safe Swarm, recently unveiled by Honda, uses vehicle-to-vehicle communication to allow cars to pass information on to other cars in the vicinity. For example, alerts about an accident miles up the road could be relayed to cars miles back, enabling them to operate collaboratively and intelligently to avoid accidents and mitigate traffic. The evolution of intelligent things, such as collective thinking car swarms, is one of 10 strategic trends with broad industry impact and significant potential for disruption. Explore the latest: Gartner Top Strategic Technology Trends for 2021 “The continuing digital business evolution exploits new digital models to align more closely the physical and digital worlds for employees, partners and customers,” says David Cearley, vice president and Gartner Fellow, at Gartner 2017 Symposium/ITxpo in Orlando, Florida. “Technology will be embedded in everything in the digital business of the future.” The intelligent digital mesh Gartner calls the entwining of people, devices, content and services the intelligent digital mesh. It’s enabled by digital models, business platforms and a rich, intelligent set of services to support digital business. Intelligent: How AI is seeping into virtually every technology and with a defined, well-scoped focus can allow more dynamic, flexible and potentially autonomous systems. Digital: Blending the virtual and real worlds to create an immersive digitally enhanced and connected environment. Mesh: The connections between an expanding set of people, business, devices, content and services to deliver digital outcomes. Intelligent Trend No. 1: AI foundation The ability to use AI to enhance decision making, reinvent business models and ecosystems, and remake the customer experience will drive the payoff for digital initiatives through 2025. Given the steady increase in inquiry calls, it’s clear that interest is growing. A recent Gartner survey showed that 59% of organizations are still gathering information to build their AI strategies, while the remainder have already made progress in piloting or adopting AI solutions. Read more: Lessons from Artificial Intelligence Pioneers Although using AI correctly will result in a big digital business payoff, the promise (and pitfalls) of general AI where systems magically perform any intellectual task that a human can do and dynamically learn much as humans do is speculative at best. Narrow AI, consisting of highly scoped machine-learning solutions that target a specific task (such as understanding language or driving a vehicle in a controlled environment) with algorithms chosen that are optimized for that task, is where the action is today. “Enterprises should focus on business results enabled by applications that exploit narrow AI technologies and leave general AI to the researchers and science fiction writers,” says Cearley. Trends You Can’t Afford to Ignore These Gartner presents the top 10 strategic technology trends for 2019. Watch Webinar Trend No. 2: Intelligent apps and analytics Over the next few years every app, application and service will incorporate AI at some level. AI will run unobtrusively in the background of many familiar application categories while giving rise to entirely new ones. AI has become the next major battleground in a wide range of software and service markets, including aspects of ERP. “Challenge your packaged software and service providers to outline how they’ll be using AI to add business value in new versions in the form of advanced analytics, intelligent processes and advanced user experiences,” notes Cearley. Intelligent apps also create a new intelligent intermediary layer between people and systems and have the potential to transform the nature of work and the structure of the workplace, as seen in virtual customer assistants and enterprise advisors and assistants.   “Explore intelligent apps as a way of augmenting human activity, and not simply as a way of replacing people,” says Cearley. Augmented analytics is a particularly strategic growing area that uses machine learning for automating data preparation, insight discovery and insight sharing for a broad range of business users, operational workers and citizen data scientists. Trend No. 3: Intelligent things Intelligent things use AI and machine learning to interact in a more intelligent way with people and surroundings. Some intelligent things wouldn’t exist without AI, but others are existing things (i.e., a camera) that AI makes intelligent (i.e., a smart camera.) These things operate semiautonomously or autonomously in an unsupervised environment for a set amount of time to complete a particular task. Examples include a self-directing vacuum or autonomous farming vehicle. As the technology develops, AI and machine learning will increasingly appear in a variety of objects ranging from smart healthcare equipment to autonomous harvesting robots for farms. As intelligent things proliferate, expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things. In this model, multiple devices will work together, either independently or with human input. The leading edge of this area is being used by the military, which is studying the use of drone swarms to attack or defend military targets. It’s evident in the consumer world in the opening example showcased at CES, the consumer electronics event. Read more: How to Listen to the Voice of Things in the IoT Digital Trend No. 4: Digital twins A digital twin is a digital representation of a real-world entity or system. In the context of IoT, digital twins are linked to real-world objects and offer information on the state of the counterparts, respond to changes, improve operations and add value. With an estimated 21 billion connected sensors and endpoints by 2020, digital twins will exist for billions of things in the near future. Potentially billions of dollars of savings in maintenance repair and operation (MRO) and optimized IoT asset performance are on the table, says Cearley. In the short term, digital twins offer help with asset management, but will eventually offer value in operational efficiency and insights into how products are used and how they can be improved. Read more: How to Use Digital Twins in Your IoT Strategy Outside of the IoT, there is a growing potential to link digital twins to entities that are not simply “things.” “Over time, digital representations of virtually every aspect of our world will be connected dynamically with their real-world counterparts and with one another and infused with AI-based capabilities to enable advanced simulation, operation and analysis,” says Cearley. “City planners, digital marketers, healthcare professionals and industrial planners will all benefit from this long-term shift to the integrated digital twin world.” For example, future models of humans could offer biometric and medical data, and digital twins for entire cities will allow for advanced simulations. Trend No. 5: Cloud to the edge Edge computing describes a computing topology in which information processing and content collection and delivery are placed closer to the sources of this information. Connectivity and latency challenges, bandwidth constraints and greater functionality embedded at the edge favors distributed models. Enterprises should begin using edge design patterns in their infrastructure architectures — particularly for those with significant IoT elements. A good starting point could be using colocation and edge-specific networking capabilities. While it’s common to assume that cloud and edge computing are competing approaches, it’s a fundamental misunderstanding of the concepts. Edge computing speaks to a computing topology that places content, computing and processing closer to the user/things or “edge” of the networking. Cloud is a system where technology services are delivered using internet technologies, but it does not dictate centralized or decentralized service delivering services. When implemented together, cloud is used to create the service-oriented model and edge computing offers a delivery style that allows for executions of disconnected aspects of cloud service. Tech & Service Providers Managing at the Speed of Change Four imperatives for today’s general manager Download the Free E-Book Trend No. 6: Conversational platforms Conversational platforms will drive a paradigm shift in which the burden of translating intent shifts from user to computer. These systems are capable of simple answers (How’s the weather?) or more complicated interactions (book a reservation at the Italian restaurant on Parker Ave.) These platforms will continue to evolve to even more complex actions, such as collecting oral testimony from crime witnesses and acting on that information by creating a sketch of the suspect’s face based on the testimony. The challenge that conversational platforms face is that users must communicate in a very structured way, and this is often a frustrating experience. A primary differentiator among conversational platforms will be the robustness of their conversational models and the API and event models used to access, invoke and orchestrate third-party services to deliver complex outcomes. Trend No. 7: Immersive experience Augmented reality (AR), virtual reality (VR) and mixed reality are changing the way that people perceive and interact with the digital world. Combined with conversational platforms, a fundamental shift in the user experience to an invisible and immersive experience will emerge. Application vendors, system software vendors and development platform vendors will all compete to deliver this model. Over the next five years the focus will be on mixed reality, which is emerging as the immersive experience of choice, where the user interacts with digital and real-world objects while maintaining a presence in the physical world. Mixed reality exists along a spectrum and includes head-mounted displays (HMD) for AR or VR, as well as smartphone- and tablet-based AR. Given the ubiquity of mobile devices, Apple’s release of ARkit and iPhone X, Google’s Tango and ARCore, and the availability of cross-platform AR software development kits such as Wikitude, we expect the battles for smartphone-based AR and MR to heat up in 2018.   David Cearley, vice president and Gartner Fellow, discusses the Top Strategic Technology Trends 2018 at Gartner 2017 Symposium/ITxpo in Orlando, Florida.   Mesh Trend No. 8: Blockchain Blockchain is a shared, distributed, decentralized and tokenized ledger that removes business friction by being independent of individual applications or participants. It allows untrusted parties to exchange commercial transactions. The technology holds the promise to change industries, and although the conversation often surrounds financial opportunities, blockchain has many potential applications in government, healthcare, content distribution, supply chain and more. However, many blockchain technologies are immature and unproven, and are largely unregulated. A practical approach to blockchain demands a clear understanding of the business opportunity, the capabilities and limitations of blockchain, a trust architecture and the necessary implementation skills. Before embarking on a distributed-ledger project, ensure your team has the cryptographic skills to understand what is and isn’t possible. Identify the integration points with existing infrastructures, and monitor the platform evolution and maturation. Use extreme caution when interacting with vendors, and ensure you are clearly identifying how the term “blockchain” is being used. Trend No. 9: Event-driven Digital businesses rely on the ability to sense and be ready to exploit new digital business moments. Business events reflect the discovery of notable states or state changes, such as completion of a purchase order. Some business events or combinations of events constitute business moments — a detected situation that calls for some specific business action. The most consequential business moments are those that have implications for multiple parties, such as separate applications, lines of business or partners.   With the advent of AI, the IoT, and other technologies, business events can be detected more quickly and analyzed in greater detail. Enterprises should embrace “event thinking” as part of a digital business strategy. By 2020, event-sourced, real-time situational awareness will be a required characteristic for 80% of digital business solutions, and 80% of new business ecosystems will require support for event processing. Trend No. 10: Continuous adaptive risk and trust Digital business creates a complex, evolving security environment. The use of increasingly sophisticated tools increases the threat potential. Continuous adaptive risk and trust assessment (CARTA) allows for real-time, risk and trust-based decision making with adaptive responses to security-enable digital business. Traditional security techniques using ownership and control rather than trust will not work in the digital world. Infrastructure and perimeter protection won’t ensure accurate detection and can’t protect against behind-the-perimeter insider attacks. This requires embracing people-centric security and empowering developers to take responsibility for security measures. Integrating security into your DevOps efforts to deliver a continuous “DevSecOps” process and exploring deception technologies (e.g., adaptive honeypots) to catch bad guys that have penetrated your network are two of the new techniques that should be explored to make CARTA a reality. Subscribe to Smarter With Gartner Subscribe Related Content 1. 3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020 2. 5 Habits of Organizations With Successful AI 3. Gartner Top 10 Strategic Predictions for 2021 and Beyond 4. 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Learn more about the top trends in the complimentary research Top Strategic Technology Trends for 2018, by David Cearley, et al. Gartner clients can read more about each trend in the full research Top 10 Strategic Technology Trends for 2018. Get Smarter Follow #Gartner Attend a Gartner event Explore Gartner Conferences View Free, Relevant Gartner Research Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence. Read Free Gartner Research Webinars Get actionable advice in 60 minutes from the world's most respected experts. Keep pace with the latest issues that impact business. Start Watching I use Gartner to bolster my confidence in decision making. Stay smarter Become a Client Most Read Gartner Top 10 Strategic Technology Trends for 2018 Trends Gartner’s Top 10 Strategic Technology Trends for 2017 Trends Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017 Trends Gartner Top 10 Strategic Technology Trends for 2019 Trends Editor’s Picks Gartner Top 3 Priorities for HR Leaders in 2021 Gartner Top 3 Priorities for HR Leaders in 2021 Human Resources 7 Digital Disruptions You Might Not See Coming In the Next 5 Years 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Trends Manage Risks From the U.S. Election Today Manage Risks From the U.S. Election Today Legal & Compliance Use Zero-Based Budgeting to Rightsize Tight Budgets Use Zero-Based Budgeting to Rightsize Tight Budgets Executive About Smarter With Gartner Careers Newsroom Ombudsman Investor Relations Policies IT Glossary Contact Us Privacy Policy Terms Of Use © 2020 Gartner, Inc. and/or its affiliates. All rights reserved. Subscribe to Smarter With Gartner Subscribe www-gartner-com-3401 ---- Gartner Top 10 Strategic Technology Trends for 2020 - Smarter With Gartner Smarter With Gartner Subscribe COVID-19 Executive Finance Human Resources IT Legal & Compliance Marketing Sales Service Supply Chain Subscribe to Smarter With Gartner Subscribe Gartner Top 10 Strategic Technology Trends for 2020 Trends Live from #GartnerSYM October 21, 2019 Contributor: Kasey Panetta Hyperautomation, blockchain, AI security, distributed cloud and autonomous things drive disruption and create opportunities in this year's strategic technology trends.  Human augmentation conjures up visions of futuristic cyborgs, but humans have been augmenting parts of the body for hundreds of years. Glasses, hearing aids and prosthetics evolved into cochlear implants and wearables. Even laser eye surgery has become commonplace.  But what if scientists could augment the brain to increase memory storage, or implant a chip to decode neural patterns? What if exoskeletons became a standard uniform for autoworkers, enabling them to lift superhuman weights? What if doctors could implant sensors to track how drugs travel inside a body? Explore the latest: Gartner Top Strategic Technology Trends for 2021 Trends Gartner Top 10 Strategic Technology Trends 2021 Download eBook Technology is now on the cusp of moving beyond augmentation that replaces a human capability and into augmentation that creates superhuman capabilities.  How these changes will impact the world and business makes human augmentation one of Gartner’s top 10 strategic technology trends that will drive significant disruption and opportunity over the next five to 10 years.  The trends are structured around the idea of “people-centric smart spaces,” which means considering how these technologies will affect people (i.e., customers, employees) and the places that they live in (i.e., home, office, car). “These trends have a profound impact on the people and the spaces they inhabit,” says David Cearley, Gartner Distinguished VP Analyst, Gartner. “Rather than building a technology stack and then exploring the potential applications, organizations must consider the business and human context first.”  These trends don’t exist in isolation; IT leaders must decide what combination of the trends will drive the most innovation and strategy.  For example, artificial intelligence (AI) in the form of machine learning (ML) with hyperautomation and edge computing can be combined to enable highly integrated smart buildings and city spaces. In turn, these technology combinations enable further democratization of the technology.  Trend No 1. Hyperautomation Automation uses technology to automate tasks that once required humans. Hyperautomation deals with the application of advanced technologies, including artificial intelligence (AI) and machine learning (ML), to increasingly automate processes and augment humans. Hyperautomation extends across a range of tools that can be automated, but also refers to the sophistication of the automation (i.e., discover, analyze, design, automate, measure, monitor, reassess.) Hyperautomation often results in the creation of a digital twin of the organization As no single tool can replace humans, hyperautomation today involves a combination of tools, including robotic process automation (RPA), intelligent business management software (iBPMS) and AI, with a goal of increasingly AI-driven decision making.  Although not the main goal, hyperautomation often results in the creation of a digital twin of the organization (DTO), allowing organizations to visualize how functions, processes and key performance indicators interact to drive value. The DTO then becomes an integral part of the hyperautomation process, providing real-time, continuous intelligence about the organization and driving significant business opportunities.  Trend No. 2: Multiexperience Multiexperience replaces technology-literate people with people-literate technology. In this trend, the traditional idea of a computer evolves from a single point of interaction to include multisensory and multitouchpoint interfaces like wearables and advanced computer sensors.  For example, Domino’s Pizza created an experience beyond app-based ordering that includes autonomous vehicles, a pizza tracker and smart speaker communications.  In the future, this trend will become what’s called an ambient experience, but currently multiexperience focuses on immersive experiences that use augmented reality (AR), virtual (VR), mixed reality, multichannel human-machine interfaces and sensing technologies. The combination of these technologies can be used for a simple AR overlay or a fully immersive VR experience.  Trend No. 3: Democratization Democratization of technology means providing people with easy access to technical or business expertise without extensive (and costly) training. It focuses on four key areas — application development, data and analytics, design and knowledge — and is often referred to as “citizen access,” which has led to the rise of citizen data scientists, citizen programmers and more.  For example, democratization would enable developers to generate data models without having the skills of a data scientist. They would instead rely on AI-driven development to generate code and automate testing.  IT Leadership You Control the Temperature Join us virtually for this year's Gartner IT Symposium/Xpo® View Conference Trend No. 4: Human augmentation Human augmentation is the use of technology to enhance a person’s cognitive and physical experiences. Physical augmentation changes an inherent physical capability by implanting or hosting a technology within or on the body. For example, the automotive or mining industries use wearables to improve worker safety. In other industries, such as retail and travel, wearables are used to increase worker productivity.  Physical augmentation falls into four main categories: Sensory augmentation (hearing, vision, perception), appendage and biological function augmentation (exoskeletons, prosthetics), brain augmentation (implants to treat seizures) and genetic augmentation (somatic gene and cell therapy).  AI and ML are increasingly used to make decisions in place of humans Cognitive augmentation enhances a human’s ability to think and make better decisions, for example, exploiting information and applications to enhance learning or new experiences. Cognitive augmentation also includes some technology in the brain augmentation category as they are physical implants that deal with cognitive reasoning.  Human augmentation carries a range of cultural and ethical implications. For example, using CRISPR technologies to augment genes has significant ethical implications.  Trend No. 5: Transparency and traceability The evolution of technology is creating a trust crisis. As consumers become more aware of how their data is being collected and used, organizations are also recognizing the increasing liability of storing and gathering the data.  Additionally, AI and ML are increasingly used to make decisions in place of humans, evolving the trust crisis and driving the need for ideas like explainable AI and AI governance.  This trend requires a focus on six key elements of trust: Ethics, integrity, openness, accountability, competence and consistency.  Legislation, like the European Union’s General Data Protection Regulation (GDPR), is being enacted around the world, driving evolution and laying the ground rules for organizations.  Trend No. 6: The empowered edge Edge computing is a topology where information processing and content collection and delivery are placed closer to the sources of the information, with the idea that keeping traffic local and distributed will reduce latency. This includes all the technology on the Internet of Things (IoT). Empowered edge looks at how these devices are increasing and forming the foundations for smart spaces, and moves key applications and services closer to the people and devices that use them. By 2023, there could be more than 20 times as many smart devices at the edge of the network as in conventional IT roles.  Trend No. 7: The distributed cloud Distributed cloud refers to the distribution of public cloud services to locations outside the cloud provider’s physical data centers, but which are still controlled by the provider. In distributed cloud, the cloud provider is responsible for all aspects of cloud service architecture, delivery, operations, governance and updates. The evolution from centralized public cloud to distributed public cloud ushers in a new era of cloud computing.  Distributed cloud allows data centers to be located anywhere. This solves both technical issues like latency and also regulatory challenges like data sovereignty. It also offers the benefits of a public cloud service alongside the benefits of a private, local cloud.  Trend No. 8: Autonomous things Autonomous things, which include drones, robots, ships and appliances, exploit AI to perform tasks usually done by humans. This technology operates on a spectrum of intelligence ranging from semiautonomous to fully autonomous and across a variety of environments including air, sea and land. While currently autonomous things mainly exist in controlled environments, like in a mine or warehouse, they will eventually evolve to include open public spaces. Autonomous things will also move from stand-alone to collaborative swarms, such as the drone swarms used during the Winter Olympic Games in 2018. However, autonomous things cannot replace the human brain and operate most effectively with a narrowly defined, well-scoped purpose.  Read more: Human Beings, AI and Robotics Represent the New Workforce in 2028 Trend No. 9: Practical blockchain Blockchain is a type of distributed ledger, an expanding chronologically ordered list of cryptographically signed, irrevocable transactional records shared by all participants in a network.  Blockchain also allows parties to trace assets back to their origin, which is beneficial for traditional assets, but also paves the way for other uses such as tracing food-borne illnesses back to the original supplier. It also allows two or more parties who don’t know each other to safely interact in a digital environment and exchange value without the need for a centralized authority.  The complete blockchain model includes five elements: A shared and distributed ledger, immutable and traceable ledger, encryption, tokenization and a distributed public consensus mechanism. However, blockchain remains immature for enterprise deployments due to a range of technical issues including poor scalability and interoperability. Blockchain, which is already appearing in experimental and small-scope projects, will be fully scalable by 2023 Enterprise blockchains today take a practical approach and implement only some of the elements of a complete blockchain by making the ledger independent of individual applications and participants and replicating the ledger across a distributed network to create an authoritative record of significant events. Everyone with permissioned access sees the same information, and integration is simplified by having a single shared blockchain. Consensus is handled through more traditional private models. Read more: The 4 Phases of the Gartner Blockchain Spectrum Digital Business The Real Business of Blockchain How leaders can create value in a new digital age. Download Book Chapter In the future, true blockchain or “blockchain complete” will have the potential to transform industries, and eventually the economy, as complementary technologies such as AI and the IoT begin to integrate alongside blockchain. This expands the type of participants to include machines, which will be able to exchange a variety of assets — from money to real estate. For example, a car would be able to negotiate insurance prices directly with the insurance company based on data gathered by its sensors.  Blockchain, which is already appearing in experimental and small-scope projects, will be fully scalable by 2023. Trend No. 10: AI security  Evolving technologies such as hyperautomation and autonomous things offer transformational opportunities in the business world. However, they also create security vulnerabilities in new potential points of attack. Security teams must address these challenges and be aware of how AI will impact the security space.  AI security has three key perspectives: Protecting AI-powered systems: Securing AI training data, training pipelines and ML models.  Leveraging AI to enhance security defense: Using ML to understand patterns, uncover attacks and automate parts of the cybersecurity processes.  Anticipating nefarious use of AI by attackers: Identifying attacks and defending against them.   Download the full complimentary research: Top 10 Strategic Technology Trends for 2020 Subscribe to Smarter With Gartner Subscribe Related Content 1. 3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020 2. 5 Habits of Organizations With Successful AI 3. Gartner Top 10 Strategic Predictions for 2021 and Beyond 4. 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Learn more about the top trends in the full complimentary research Top Strategic Technology Trends for 2020 by David Cearley, et al. Gartner clients who are IT leaders can read more in the full report Top 10 Strategic Technology Trends for 2020 by David Cearley et al. Get Smarter Follow #Gartner Attend a Gartner event Explore Gartner Conferences View Free, Relevant Gartner Research Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence. Read Free Gartner Research Webinars Get actionable advice in 60 minutes from the world's most respected experts. Keep pace with the latest issues that impact business. Start Watching I use Gartner to bolster my confidence in decision making. Stay smarter Become a Client Most Read Gartner Top 10 Strategic Technology Trends for 2018 Trends Gartner’s Top 10 Strategic Technology Trends for 2017 Trends Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017 Trends Gartner Top 10 Strategic Technology Trends for 2019 Trends Editor’s Picks Gartner Top 3 Priorities for HR Leaders in 2021 Gartner Top 3 Priorities for HR Leaders in 2021 Human Resources 7 Digital Disruptions You Might Not See Coming In the Next 5 Years 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Trends Manage Risks From the U.S. Election Today Manage Risks From the U.S. Election Today Legal & Compliance Use Zero-Based Budgeting to Rightsize Tight Budgets Use Zero-Based Budgeting to Rightsize Tight Budgets Executive About Smarter With Gartner Careers Newsroom Ombudsman Investor Relations Policies IT Glossary Contact Us Privacy Policy Terms Of Use © 2020 Gartner, Inc. and/or its affiliates. All rights reserved. Subscribe to Smarter With Gartner Subscribe www-gartner-com-9426 ---- Gartner Top 10 Strategic Technology Trends for 2019 - Smarter With Gartner Smarter With Gartner Subscribe COVID-19 Executive Finance Human Resources IT Legal & Compliance Marketing Sales Service Supply Chain Subscribe to Smarter With Gartner Subscribe Gartner Top 10 Strategic Technology Trends for 2019 Trends October 15, 2018 Contributor: Kasey Panetta Blockchain, quantum computing, augmented analytics and artificial intelligence will drive disruption and new business models. Although science fiction may depict AI robots as the bad guys, some tech giants now employ them for security. Companies like Microsoft and Uber use Knightscope K5 robots to patrol parking lots and large outdoor areas to predict and prevent crime. The robots can read license plates, report suspicious activity and collect data to report to their owners. Explore the latest: Gartner Top Strategic Technology Trends for 2021 These AI-driven robots are just one example of “autonomous things,” one of the Gartner Top 10 strategic technologies for 2019 with the potential to drive significant disruption and deliver opportunity over the next five years. Trends Gartner Top 10 Strategic Technology Trends 2021 Download eBook “The future will be characterized by smart devices delivering increasingly insightful digital services everywhere,” said David Cearley, Gartner Distinguished Vice President Analyst, at Gartner 2018 Symposium/ITxpo in Orlando, Florida. “We call this the intelligent digital mesh.” Intelligent: How AI is in virtually every existing technology, and creating entirely new categories. Digital: Blending the digital and physical worlds to create an immersive world. Mesh: Exploiting connections between expanding sets of people, businesses, devices, content and services. “Trends under each of these three themes are a key ingredient in driving a continuous innovation process as part of the continuous next strategy,” Cearley said. The Gartner Top 10 Strategic Technology trends highlight changing or not yet widely recognized trends that will impact and transform industries through 2023. Trend No. 1: Autonomous things Whether it’s cars, robots or agriculture, autonomous things use AI to perform tasks traditionally done by humans. The sophistication of the intelligence varies, but all autonomous things use AI to interact more naturally with their environments. Autonomous things exist across five types: Robotics Vehicles Drones Appliances Agents Those five types occupy four environments: Sea, land, air and digital. They all operate with varying degrees of capability, coordination and intelligence. For example, they can span a drone operated in the air with human-assistance to a farming robot operating completely autonomously in a field. This paints a broad picture of potential applications, and virtually every application, service and IoT object will incorporate some form of AI to automate or augment processes or human actions. Collaborative autonomous things such as drone swarms will increasingly drive the future of AI systems Explore the possibilities of AI-driven autonomous capabilities in any physical object in your organization or customer environment, but keep in mind these devices are best used for narrowly defined purposes. They do not have the same capability as a human brain for decision making, intelligence or general-purpose learning. Digital Business The Real Business of Blockchain How leaders can create value in a new digital age. Download Book Chapter Trend No. 2: Augmented analytics Data scientists now have increasing amounts of data to prepare, analyze and group — and from which to draw conclusions. Given the amount of data, exploring all possibilities becomes impossible. This means businesses can miss key insights from hypotheses the data scientists don’t have the capacity to explore. Augmented analytics represents a third major wave for data and analytics capabilities as data scientists use automated algorithms to explore more hypotheses. Data science and machine learning platforms have transformed how businesses generate analytics insight. By 2020, more than 40% of data science tasks will be automated Augmented analytics identify hidden patterns while removing the personal bias. Although businesses run the risk of unintentionally inserting bias into the algorithms, augmented analytics and automated insights will eventually be embedded into enterprise applications. Through 2020, the number of citizen data scientists will grow five times faster than professional data scientists. Citizen data scientists use AI powered augmented analytics tools that automate the data science function automatically identifying data sets, developing hypothesis and identifying patterns in the data. Businesses will look to citizen data scientists as a way to enable and scale data science capabilities. Gartner predicts by 2020, more than 40% of data science tasks will be automated, resulting in increased productivity and broader use by citizen data scientists. Between citizen data scientists and augmented analytics, data insights will be more broadly available across the business, including analysts, decision makers and operational workers. Trend No. 3: AI-driven development AI-driven development looks at tools, technologies and best practices for embedding AI into applications and using AI to create AI-powered tools for the development process. This trend is evolving along three dimensions: The tools used to build AI-powered solutions are expanding from tools targeting data scientists (AI infrastructure, AI frameworks and AI platforms) to tools targeting the professional developer community (AI platforms, AI services). With these tools the professional developer can infuse AI powered capabilities and models into an application without involvement of a professional data scientist. The tools used to build AI-powered solutions are being empowered with AI-driven capabilities that assist professional developers and automate tasks related to the development of AI-enhanced solutions. Augmented analytics, automated testing, automated code generation and automated solution development will speed the development process and empower a wider range of users to develop applications. AI-enabled tools are evolving from assisting and automating functions related to application development (AD) to being enhanced with business domain expertise and automating activities higher on the AD process stack (from general development to business solution design). The market will shift from a focus on data scientists partnered with developers to developers operating independently using predefined models delivered as a service. This enables more developers to utilize the services, and increases efficiency. These trends are also leading to more mainstream usage of virtual software developers and nonprofessional “citizen application developers.” Read more: How to Build a Business Case for Artificial Intelligence Trend No. 4: Digital twins A digital twin is a digital representation that mirrors a real-life object, process or system. Digital twins can also be linked to create twins of larger systems, such as a power plant or city. The idea of a digital twin is not new. It goes back to computer-aided design representations of things or online profiles of customers, but today’s digital twins are different in four ways: The robustness of the models, with a focus on how they support specific business outcomes The link to the real world, potentially in real time for monitoring and control The application of advanced big data analytics and AI to drive new business opportunities The ability to interact with them and evaluate “what if” scenarios The focus today is on digital twins in the IoT, which could improve enterprise decision making by providing information on maintenance and reliability, insight into how a product could perform more effectively, data about new products and increased efficiency. Digital twins of an organization are emerging to create models of organizational process to enable real time monitoring and drive improved process efficiencies. Trends Gartner Top Strategic Technology Trends 2021 Technology trends IT can’t afford to ignore Download eBook Trend No. 5: Empowered edge Edge computing is a topology where information processing and content collection and delivery are placed closer to the sources of the information, with the idea that keeping traffic local will reduce latency. Currently, much of the focus of this technology is a result of the need for IoT systems to deliver disconnected or distributed capabilities into the embedded IoT world. This type of topology will address challenges ranging from high WAN costs and unacceptable levels of latency. Further, it will enable the specifics of digital business and IT solutions. Technology and thinking will shift to a point where the experience will connect people with hundreds of edge devices Through 2028, Gartner expects a steady increase in the embedding of sensor, storage, compute and advanced AI capabilities in edge devices. In general, intelligence will move toward the edge in a variety of endpoint devices, from industrial devices to screens to smartphones to automobile power generators. Trend No. 6: Immersive technologies Through 2028, conversational platforms, which change how users interact with the world, and technologies such as augmented reality (AR), mixed reality (MR) and virtual reality (VR), which change how users perceive the world, will lead to a new immersive experience. AR, MR and VR show potential for increased productivity, with the next generation of VR able to sense shapes and track a user’s position and MR enabling people to view and interact with their world.  By 2022, 70% of enterprises will be experimenting with immersive technologies for consumer and enterprise use, and 25% will have deployed to production. The future of conversational platforms, which range from virtual personal assistants to chatbots, will incorporate expanded sensory channels that will allow the platform to detect emotions based on facial expressions, and they will become more conversational in interactions. Eventually, the technology and thinking will shift to a point where the experience will connect people with hundreds of edge devices ranging from computers to cars. Trend No. 7: Blockchain Blockchain is a type of distributed ledger, an expanding chronologically ordered list of cryptographically signed, irrevocable transactional records shared by all participants in a network. Blockchain allows companies to trace a transaction and work with untrusted parties without the need for a centralized party (i.e., a bank). This greatly reduces business friction and has applications that began in finance, but have expanded to government, healthcare, manufacturing, supply chain and others. Blockchain could potentially lower costs, reduce transaction settlement times and improve cash flow. The technology has also given way to a host of blockchain-inspired solutions that utilize some of the benefits and parts of blockchain. Pure blockchain models are immature and can bedifficult to scale.  . However, businesses should begin evaluating the technology, as blockchain will create $3.1T in business value by 2030.  Blockchain inspired approaches that do not implement all the tenets of blockchain deliver near term value but do not provide the promised highly distributed decentralized consensus models of a pure blockchain. Read more: The CIO’s Guide to Blockchain Trend No. 8: Smart spaces A smart space is a physical or digital environment in which humans and technology-enabled systems interact in increasingly open, connected, coordinated and intelligent ecosystems. As technology becomes a more integrated part of daily life, smart spaces will enter a period of accelerated delivery. Further, other trends such as AI-driven technology, edge computing, blockchain and digital twins are driving toward this trend as individual solutions become smart spaces. Smart spaces are evolving alone five key dimensions: Openness, connectedness, coordination, intelligence and scope. Essentially, smart spaces are developing as individual technologies emerge from silos to work together to create a collaborative and interaction environment. The most extensive example of smart spaces is smart cities, where areas that combine business, residential and industrial communities are being designed using intelligent urban ecosystem frameworks, with all sectors linking to social and community collaboration. Trends Gartner Top 10 Strategic Technology Trends 2021 Download eBook Trend No. 9: Digital ethics and privacy Consumers have an growing awareness of the value of their personal information, and they are increasingly concerned with how it’s being used by public and private entities. Enterprises that don’t pay attention are at risk of consumer backlash. Conversations regarding privacy must be grounded in ethics and trust. The conversation should move from “Are we compliant?” toward “Are we doing the right thing?” Governments are increasingly planning or passing regulations with which companies must be compliant, and consumers are carefully guarding or removing information about themselves. Companies must gain and maintain trust with the customer to succeed, and they must also follow internal values to ensure customers view them as trustworthy. Trend No. 10: Quantum computing Quantum computing is a type of nonclassical computing that is based on the quantum state of subatomic particles that represent information as elements denoted as quantum bits or “qubits.” Quantum computers are an exponentially scalable and highly parallel computing model.  A way to imagine the difference between traditional and quantum computers is to imagine a giant library of books. While a classic computer would read every book in a library in a linear fashion, a quantum computer would read all the books simultaneously. Quantum computers are able to theoretically work on millions of computations at once. Quantum computing in the form of a commercially available, affordable and reliable service would transform some industries.  Read more: The CIO’s Guide to Quantum Computing Real-world applications range from personalized medicine to optimization of pattern recognition. This technology is still in an emerging state, which means it is a good time for businesses to increase their understanding of potential applications and consider any security implications. Aside from a select group of businesses where specific quantum algorithms would provide a major advantage, most enterprises could remain in exploration phase through 2022 and begin exploiting the technology later. Subscribe to Smarter With Gartner Subscribe Related Content 1. 3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020 2. 5 Habits of Organizations With Successful AI 3. Gartner Top 10 Strategic Predictions for 2021 and Beyond 4. 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Learn more about the top trends in the complimentary research Top Strategic Technology Trends for 2019, by David Cearley, et al. Detailed analysis of each trend can be found in the Gartner Trend Insight Report Top 10 Strategic Technology Trends for 2019. Get Smarter Follow #Gartner Attend a Gartner event Explore Gartner Conferences View Free, Relevant Gartner Research Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence. Read Free Gartner Research Webinars Get actionable advice in 60 minutes from the world's most respected experts. Keep pace with the latest issues that impact business. Start Watching I use Gartner to bolster my confidence in decision making. Stay smarter Become a Client Most Read Gartner Top 10 Strategic Technology Trends for 2018 Trends Gartner’s Top 10 Strategic Technology Trends for 2017 Trends Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017 Trends Gartner Top 10 Strategic Technology Trends for 2019 Trends Editor’s Picks Gartner Top 3 Priorities for HR Leaders in 2021 Gartner Top 3 Priorities for HR Leaders in 2021 Human Resources 7 Digital Disruptions You Might Not See Coming In the Next 5 Years 7 Digital Disruptions You Might Not See Coming In the Next 5 Years Trends Manage Risks From the U.S. Election Today Manage Risks From the U.S. Election Today Legal & Compliance Use Zero-Based Budgeting to Rightsize Tight Budgets Use Zero-Based Budgeting to Rightsize Tight Budgets Executive About Smarter With Gartner Careers Newsroom Ombudsman Investor Relations Policies IT Glossary Contact Us Privacy Policy Terms Of Use © 2020 Gartner, Inc. and/or its affiliates. All rights reserved. Subscribe to Smarter With Gartner Subscribe www-ilovelibraries-org-6534 ---- Libraries Respond: COVID-19 Survey May2020 LIBRARIES RESPOND: C O V I D - 1 9 S U R V E Y SURVEY OF RESPONSE & ACTIVITIES RESULTS COLLECTED MAY 12-18, 2020 SURVEY METHOD Conducted by the American Library Association (ALA), with additional support from the Institute of Museum and Library Services and Colorado State Library's Library Research Service SURVEY Hosted in Survey Monkey DISTRIBUTION Survey link distributed via email, social media, and listservs SAMPLE All library types, with public, academic, and K-12 libraries representing the majority of respondents ANALYTICS Data were cleaned, de-duplicated, and anonymized SURVEY RESULTS The results in this report represent aggregate responses from a convenience survey. RESPONDENTS* 3,850 libraries GEOGRAPHY 50 US states + Washington, DC represented RESPONSE RATE ~30% of US public library systems**; ~20% of US academic libraries; <20% of other library types *Unless otherwise noted, n=3,850 when calculating responses. **Public library system is equivalent to a public library jurisdiction. Fully closed 62% Open for curbside pickup 26% Other limited access policies 11% BUILDING STATUS 99% of respondents reported having limited access policies currently in place. Fully open (no restrictions) 1% n=3,755 RE-OPENING TIMELINE A majority of libraries that are fully closed are uncertain about when they can re-open their building(s). of respondents did not know when their buildings would start to re-open to the public 47% of respondents expect re-opening to begin to occur in June or July 37% of respondents fell into the "other" category, reporting plans to open after July or that opening depends on state/school directives 16% n=2,214 PLANNING FOR IN-PERSON ACCESS Libraries are instituting a combination of approaches for in-person access, including: So cia l d ist an cin g pr ac tic es Cu rb sid e se rv ice s By a pp oin tm en t o nly De liv er y t o pa tro ns 3,000 2,000 1,000 0 Answers with 30% or higher response rate. PROCESSES & PROCEDURES Nearly all respondents will have a combination of protocols in place, including: STAFFING SAFETY & SANITATION 80%: Health and safety protocols for staff 73%: Phased re-opening of operations 30%: New or revised support services that require staffing (e.g., remote work, trauma response) 80%: Sanitizing/quarantining materials 76%: Social distancing requirements for patrons 61%: Deep cleaning of interior spaces EXAMPLES OF PLANS & PROCESSES WERE SHARED,1,500+ which ALA and its partners will work to curate and disseminate widely. PATRON NEEDS Libraries anticipate patrons' most urgent needs in the next six months will be: 60%64% Access to physical materials and/or special collections 60% Public access to computers and the internet Government applications and job search support K-20 LIBRARY TOP NEEDS INCLUDE: Student success (e.g., assignment completion) and faculty/teacher support (e.g., research assistance, online teaching support) We checked out 143 laptops to students needing devices to do work online. This helped some students persist who may not have in this new learning environment. - Hawkeye Community College Library (Iowa) STUDENT & FACULTY NEEDS The top three ways all libraries are addressing student and faculty needs include: CURBSIDE PICKUP VIRTUAL REFERENCE Via email, phone, chat NEW "HOW TO" RESOURCES Books, laptops, school materials For accessing virtual resources ...My library is part of a very small school, but I am the administrator for our school's program that uses and tracks Accelerated Reading, and I was instrumental in facilitating its use for teachers when they expanded their online resources to home use, helping with communications, trouble- shooting for teachers and students, etc. I see this role continuing and expanding this year. – High Mount Elementary School (Illinois) The mother of half a dozen children, ages 4-14, who were all out of school because of coronavirus. The kids were supposed to be reading 20 minutes a day, but after a week of lockdown they were out of books. I helped the mom with our online library, reassured her she could call back any time, and saved her $15 a month on her Audible subscription in the process. - Brigham City Public Library (Utah) STUDENT & FACULTY NEEDS Additional ways libraries are addressing student and faculty needs include: Transitioning summer learning from in-person to virtual and adding new enrichment learning activities Digitizing materials for remote use Providing access to textbooks and other resources Securing and/or distributing devices for students who lack access to laptops/tablets for classwork Purchasing and/or curating additional online research resources, including negotiating licensing contracts Increasing access to open research in support of COVID-19 Working with faculty/teachers to create new open textbooks or other educational materials FOR STUDENTS FOR FACULTY COVID-19 CRISIS RESPONSE Of those respondents who are involved in community crisis response, the majority reported: Developing new partnerships Making or distributing Personal Protective Equipment (e.g., face shields or fabric masks) Addressing hunger relief efforts Providing family-friendly facilities (e.g., for student parents) Relocating staff to other departments and/or helping in call centers (e.g., health, employment, 211) Our community has serious food insecurity issues, and we have been involved in addressing that for the past several years. COVID-19 has made the situation even worse. Ordinarily our (farmers) market has kids' activities, but those are not possible now. We are focusing solely on the food and working hard making sure those who have SNAP (Supplemental Nutrition Assistance) benefits are aware of this opportunity. - High Point Public Library (North Carolina) FUTURE NEEDS & CHALLENGES: HEALTH & SAFETY Respondents anticipate ongoing questions about safety protocols and having adequate PPE and cleaning supplies. Open-ended responses: 764 We want our staff to be safe. We want our community's needs met. How we SAFELY get both of those goals met can be tricky. It is really a balancing act. - Spring Valley Public Library (Minnesota) FUTURE NEEDS & CHALLENGES: UNCERTAINTY ABOUT THE FUTURE Open-ended responses: 764 The library's future will be dependent on the status of our course modalities (on campus, online, international), sustained enrollment, and state revenues. - Forsyth Library, Fort Hays State University (Kansas) Respondents reported being uncertain about how and when libraries will be allowed to make buildings accessible again; how people will continue to be affected by the virus and the ability of the library to respond; and how communities will change moving forward. FUTURE NEEDS & CHALLENGES: FUNDING & BUDGET CUTS Open-ended responses: 764 Funding, funding, funding and advocacy for the critical importance of libraries as crucial, essential secondary responders. - Connecticut State Library Respondents shared their concerns around reduced funding for library budgets and anticipated staff loss due to furloughs and layoffs. ACKNOWLEDGMENTS ALA Pandemic Preparedness Resources for Libraries: http://www.ala.org/tools/atoz/pandemic-preparedness Institute of Museum and Library Services COVID-19 updates: https://www.imls.gov/coronavirus-covid-19-updates Re-opening Archives, Libraries and Museums project: https://www.webjunction.org/explore-topics/COVID-19- research-project/news.html The American Library Association (ALA) would like to thank all of the libraries that responded to the survey so quickly. The May 2020 "Libraries Respond: COVID-19 Survey" is one of a series of data and research projects underway at ALA to learn and share information about the impacts of COVID-19 on libraries, library staff, and our work serving our communities. Analysis of data from the survey is ongoing and will be shared in coming weeks. We would also like to thank the Library Research Service, an office of the Colorado State Library, and the Institute of Museum and Library Services for their work helping clean and validate the survey data. To learn more about the COVID-19 surveys and view the full sets of questions, please visit: http://www.ala.org/tools/libraries-respond-covid-19-survey. Additional Resources: LIBRARIES RESPOND: C O V I D - 1 9 S U R V E Y http://www.ala.org/tools/atoz/pandemic-preparedness https://www.imls.gov/coronavirus-covid-19-updates https://www.webjunction.org/explore-topics/COVID-19-research-project/news.html http://www.ala.org/tools/libraries-respond-covid-19-survey www-journals-ala-org-6127 ---- Amplify Your Impact: The Insta-Story: A New Frontier for Marking and Engagement at the Sonoma State University Library | Fonseca | Reference & User Services Quarterly Journal Content Search Search Scope All Authors Title Abstract Index terms Full Text Browse By Issue By Author By Title Other Journals Article Tools Indexing metadata How to cite item Email this article (Login required) Email the author (Login required) Notifications View Subscribe Home About Search Current Archives About RUSA Sections Committees Home > Vol 58, No 4 (2019) > Fonseca Amplify Your Impact: The Insta-Story: A New Frontier for Marking and Engagement at the Sonoma State University Library Catherine Fonseca Abstract This month’s author, Catherine Fonseca from Sonoma State University Library, shares some innovative and fun ideas on how libraries can use the Instagram Stories feature to engage with their audience in multiple ways. We guarantee you will find a tidbit you can use in your own library.—Editor Full Text: HTML PDF DOI: https://doi.org/10.5860/rusq.58.4.7148 Refbacks There are currently no refbacks. ALA Privacy Policy © 2020 RUSA www-libraryjournal-com-2327 ---- Social Media: Libraries Are Posting, but Is Anyone Listening? | Library Journal SUBSCRIBE ACCESS DIGITIZED EDITION Free Access Account Logout Log In My Subscriptions My Library My Profile Manage Institution Logout Invalid email or password. Try again. Email Password Forgot password? LOG IN Don't have a Library Journal Account? Register Now News Reviews+ Technology Programs+ Design People Public Libraries Academic Libraries Events & More+ Events & PD COVID19 Leadership Advocacy Research Opinion infoDOCKET SUBSCRIBE Log In My Subscriptions My Library My Profile Logout ACCESS DIGITIZED EDITION News Archives & Preservation Awards Book News Budgets & Funding More Innovation LIS Management Marketing Buildings Conference Coverage Impacts Industry News Reviews+ Awards Best of Book News Booklists More Readers' Advisory Reference Collection Management Fiction Media Nonfiction Technology Archives & Preservation Awards Budgets & Funding Buildings More Management Marketing Readers' Advisory Impacts Industry News Innovation LIS Programs+ Archives & Preservation Awards Collection Management Impacts More Readers' Advisory Innovation Management Marketing Programming Design Architecture & Buildings Awards Budgets & Funding Buildings Impacts Innovation Management Leadership Archives & Preservation Awards Budgets & Funding Careers More Management Marketing Readers' Advisory Collection Management Impacts Innovation LIS People Awards Careers Industry News Innovation LIS Management Marketing Public Libraries Academic Libraries Advocacy Awards Budgets & Funding Impacts Innovation Management Marketing More COVID19 Research Opinion infoDOCKET Events & PD Live Events Virtual Events Online Courses Webcasts About LJ LJ Projects Self-Published Books Privacy Policy Get in Touch Subscriber Services Contact Us 888-282-5852 Social Media: Libraries Are Posting, but Is Anyone Listening? by Nancy Dowd May 07, 2013 | Filed in Advocacy 7 If there are over 1 billion people on Facebook and the Twitterverse can help topple governments, then it only makes sense that libraries would also be using these two social media channels to connect with their communities, right? Well yes and no. Libraries are using social media, that’s clear. According to Library Journal’s Survey on Public Library Marketing Methods and Best Practices, 86 percent of libraries said they were using social media. The top two social media platforms used by libraries were Facebook (99 percent) and Twitter (56 percent). Pinterest is making some gains, with 30 percent of libraries reporting that they are pinning. The problem is that 48 percent of libraries surveyed said they weren’t measuring their efforts at all. While the survey didn’t ask if libraries are getting fans to interact with them, most libraries I have spoken with lately have said they were still struggling with that. This is the fourth in a series of articles in which Nancy Dowd will examine the results of an exclusive survey of library professionals from more than 400 public libraries across the U.S. on public library marketing. The survey was sponsored by the NoveList division of EBSCO Publishing Nancy Dowd If there are over 1 billion people on Facebook and the Twitterverse can help topple governments, then it only makes sense that libraries would also be using these two social media channels to connect with their communities, right? Well yes and no. Libraries are using social media, that’s clear. According to Library Journal’s Survey on Public Library Marketing Methods and Best Practices, 86 percent of libraries said they were using social media. The top two social media platforms used by libraries were Facebook (99 percent) and Twitter (56 percent). Pinterest is making some gains, with 30 percent of libraries reporting that they are pinning. The problem is that 48 percent of libraries surveyed said they weren’t measuring their efforts at all. While the survey didn’t ask if libraries are getting fans to interact with them, most libraries I have spoken with lately have said they were still struggling with that. Four Steps to Facebook Success. Really?  It’s not a secret. The entire web is filled with ways to succeed on social media. Facebook offers an entire section on how to be successful using its platform. It even includes best practices for you to follow. Essentially they list four steps: Build Your Page Connect with People Engage Your Audience Influence Friends of Fans So, if it’s so easy, why isn’t every library having wild success with its Facebook page? Wandering Around Without Mapquest Without a plan, can you guess what your first problem will be? It has become evident that the recurring theme of these articles is the importance of setting goals and making plans to implement those goals. If you don’t know where you are going or what you want to achieve, it’s a pretty good assumption that you won’t know when you get there. Without direction, social media content creators can be at risk of working in silos without any strategy to communicate their brand, connect to services, or drive people to the library or its website. Columbus Metropolitan Library (CML) built its success by understanding the value of planning, and its social media efforts are no exception. Three years ago, CML had approximately 3,500 Facebook “likes.” A year later, they had 18,500, and today’s count is just over 28,000. That’s amazing growth, but it wasn’t a surprise. CML had a plan—the staff knew what they were looking to achieve and had a plan to guide them. CML’s Social Media Manager Julie Theodo’s whole plan fit into four pages and included the goals, tactics ,and metrics to take the library through the year. Without a plan to connect your social media efforts to the larger goals of your library, your efforts are guaranteed not to take your library where you need to go. We are posting all the time, but no one seems to notice If your library is posting and not getting any interactivity, then you are probably posting the wrong things. It may be as simple as not understanding your audience or not knowing what to say. Library Journal Mover & Shaker Ben Bizzle, Director of Technology for Crowley Ridge Regional Library, says, “Make them laugh and pull their heart strings. Facebook gives you a tiny little space that is competing with hundreds of other posts. You will never be able to convey anything with any depth or detail, so don’t try. But you can use that space as a way to entice people to click on a link to learn more or sign up for a cool program.” Bizzle encourages libraries to think visually, and mix in a little fun stuff with the real content. “The silly stuff gets people interested.” He is part of a group of librarians who created a DropBox repository for pictures that have created engagement for them on Facebook. Email him at ben@benbizzle.com for details and access to the folder. My team at LibraryAware suggests creating interest by posting five fast or interesting facts about every event or service you post. Space them over a short period of time and link back to your catalog, registration page, or website. People love trivia. They like hearing about interesting tidbits and behind the scenes stories about authors. Some libraries treat followers as V.I.P.s by announcing the arrival of the newest books. The New York Public Library does a terrific job of appealing to different audiences by posting photos or content that is relevant to them. Ask questions, pull photos from your archives, share photos, the list of ways to engage your community is endless. Experiment; if something works, keep it. If not, let it go. Susan Brown, marketing director for the Lawrence Public Library (soon to be the new director ofChapel HillPublic Library) says her library has been successful with both Facebook and Twitter. She believes the key is to select people with the right skill set, then provide them with a framework of principles and goals, then let them have fun. “I have a captain for each platform who is responsible for leading their team. I provide the playbook and then we meet every month to go over their game plan. The teams decide what they will post and each player uses their own voice. They are incredibly talented and creative—and effective.” Lawrence keeps its content hyper-local. Posts are mostly about the community with about 20 percent of the content specifically related to the library. The Twitter team is continually tweeting at live events and activities, both in the library and throughout the community. The Facebook team always has a camera ready to post lots of photos. Brown has plenty of success stories to share. “Last year we were live Tweeting from a program. A man showed up when we were well into the program. He told us that he was following our Tweets and the program sounded like so much fun that he couldn’t stand missing it,” she said. Challenging Followers With social media, it’s all about numbers. The more people you have following you, the better chance you will have of having them see your posts. Lawrence’s growth includes building in challenges to encourage people to “like” the library. When the library announced a new director, the social media team posted that he was coming May 1 and they needed to reach a certain amount of “likes” before he arrived. News about the annual book sale had the teams asking folks to retweet to help them get the word out and to “like” if they were attending the sale. They even had fun using a favorite puppet to declare he wasn’t going to come back to the library until they reached a certain number of followers. All of the challenges worked.Lawrence has increased its followers five times over. Brown suggests if you run a challenge to make sure it’s obtainable. “We keep it fun. I tell my staff that they should follow a very simple rule, don’t post anything you wouldn’t be comfortable saying at a service desk. Beyond that they are using their voice, following their passions, and engaging with our community,” commented Brown. To Advertise or Not to Advertise When asked about advertising, Brown explains that the library had tried advertisements but found better success when the teams grew their followers organically. “We were going to be closed for two weeks, so we partnered with local businesses to offer a daily deal on our Facebook page each day we were closed. At the same time we ran an ad. The overlap was actually a mistake, but when we tracked our numbers we saw a huge bump of 1,000 new likes. A very small percentage came from the ad. I can’t speak for everyone, but it didn’t work for us.” Bizzle, on the other hand, looks at advertising as a great way to increase followers without spending a whole lot of money. He created a case study by working with seven libraries that were willing to commit to $10 a day to advertise for 28 days. The increase in followers was stunning—a total of 8,413 fans. San Rafael Public Library saw a 427 percent increase, Wake County Library’s number rose 211 percent, and Chicago Public Library fans reached 17,335 fans – a 101 percent increase. Topeka & Shawnee County Public Library had a 110 percent increase with 8,666 fans, and has just celebrated the 10,000 milestone. It’s hard to argue against advertising when you see those results. Of course, Bizzle advocates for creative content in order to engage those new fans. “They call it social for a reason. If it isn’t interactive, then chances are no one is reading your posts. In a world where all a person has to do is click “like,” that isn’t too tough. SUGGESTED READINGS The Librarian’s Nitty Gritty Guide to Social Media by Laura Solomon Social Media Marketing: Strategies for Engaging in Facebook, Twitter and Other Social Media by Liana “Li” Evans Face2Face: Using Facebook, Twitter, and Other Social Media Tools to Create Great Customer Connections by David Lee King Facebook Marketing: An hour a Day (2nd Edition) by Mari Smith Graph Search Is Coming When Facebook’s graph search is fully implemented, people will be able to search through their content to find places and things based on what others have shared. This also means you’ll be able to easily identify the interests of your followers. Imagine the relevant content you will be able to share when you know the most popular books, movies, hobbies, etc. Talk about leveling the playing field! Facebook is potentially giving libraries the tools that big businesses are already utilizing. It could be very exciting, but you will need lots of followers in order to effectively use this tool. There’s No Turning Back Social media is not going away. As new platforms emerge, libraries will need to choose the channels that work for their communities. But whatever platforms they choose, they must have some kind of plan that outlines their goals and embrace philosophies that support interactivity with their communities. I think Bizzle summed it up best, “Successful libraries will determine what platforms most effectively reach their target audience and aggressively build sustainable presences there.” Get Print. Get Digital. Get Both! SUBSCRIBE NOW marketing-dowd social media Julie Theado says May 07, 2013 Hi Nancy, Great article. Thank you for including Columbus Metropolitan Library. The article provided practical ideas from other libraries that is incredibly useful to all of us working in social media. Thank you for this article. It's always great to read about what other libraries are doing in social media. Ben Bizzle says May 09, 2013 Nancy, Thanks for acknowledging the work we do at CCJPL. I've gotten a number of requests for dropbox access and wanted to encourage anyone wanting access to email me at ben@benbizzle.com. A few requests that came via Facebook message wound going into my "other" folder instead of my "inbox" and I don't want to miss any requests. Great article and thanks again for the kind words. Ben Josh Hadro says May 09, 2013 Thanks, Ben -- I went ahead and updated the sentence to include your email address. Josh Hadro, executive editor, LJ Jenifer Daniels says May 16, 2013 Great read and I am sharing with my colleagues at Charlotte Mecklenburg Library. It always helps to hear the language of social media from your peers. facebook.com/cmlibrary twitter.com/cmlibrary pinterest.com/cmlibrary Rodney says May 30, 2013 Interesting article. I think it's critical for most orgnanizations to be conscious of their fan/likes/followers counts because that number is important regardless of what some people say. That is one of the most important metrics that any visitor to a page sees right away and a high fan count instantly validates that page/site for that visitor. Libraries are no exception. I mean look at all of the services out there that help you get Facebook likes - as an example there's hundreds of them reviewed just here: www.buyfacebooklikesreviews.com - and even though most of these services suck, there are some good ones and the high demand for the good ones is evident. This goes to show you why Facebook fans/likes are still so important to businesses and individuals alike. jamshid says Jun 27, 2013 Thank you, I'm a library student and I would like to receive new articles as you please, "If possible, please email me. Peggy O'Kane says Apr 10, 2014 We have been using Twitter and Facebook to spread the word about the Maine Public Library Tax Check off. It has reached a wide audience primarily because we have had celebrity endorsers share our message with their followers. Between now and April 16 I plan to push the campaign. I did notice on the one ad we placed that we received a jump in Facebook followers but many of them were not legitimate (From outside the US who had no library/Maine connections and did not use English on their own pages.) https://twitter.com/MaineStLibrary https://www.facebook.com/MaineStateLibrary Add Comment :- UUID : Name : Email : URL : Comment : Comment Policy: Be respectful, and do not attack the author, people mentioned in the article, or other commenters. Take on the idea, not the messenger. Don't use obscene, profane, or vulgar language. Stay on point. Comments that stray from the topic at hand may be deleted. Comments may be republished in print, online, or other forms of media. If you see something objectionable, please let us know. Once a comment has been flagged, a staff member will investigate. Document type : UUID : Name : Email : Image : Comment Parent Id : Fill out the form or Login / Register to comment: (All fields required) First Name should not be empty !!! Last Name should not be empty !!! email should not be empty !!! Comment should not be empty !!! Please check the reCaptcha Something went wrong with Captcha Verificatioin. Please refresh and try again! POST COMMENT CLICK HERE TO COMMENT TO THIS ARTICLE Comment should not be empty !!! POST COMMENT Peggy O'Kane We have been using Twitter and Facebook to spread the word about the Maine Public Library Tax Check off. It has reached a wide audience primarily because we have had celebrity endorsers share our message with their followers. Between now and April 16 I plan to push the campaign. I did notice on the one ad we placed that we received a jump in Facebook followers but many of them were not legitimate (From outside the US who had no library/Maine connections and did not use English on their own pages.) https://twitter.com/MaineStLibrary https://www.facebook.com/MaineStateLibrary Posted : Apr 10, 2014 09:38 REPLY Comment should not be empty !!! POST REPLY jamshid Thank you, I'm a library student and I would like to receive new articles as you please, "If possible, please email me. Posted : Jun 27, 2013 10:59 REPLY Comment should not be empty !!! POST REPLY Rodney Interesting article. I think it's critical for most orgnanizations to be conscious of their fan/likes/followers counts because that number is important regardless of what some people say. That is one of the most important metrics that any visitor to a page sees right away and a high fan count instantly validates that page/site for that visitor. Libraries are no exception. I mean look at all of the services out there that help you get Facebook likes - as an example there's hundreds of them reviewed just here: www.buyfacebooklikesreviews.com - and even though most of these services suck, there are some good ones and the high demand for the good ones is evident. This goes to show you why Facebook fans/likes are still so important to businesses and individuals alike. Posted : May 30, 2013 11:26 REPLY Comment should not be empty !!! POST REPLY Jenifer Daniels Great read and I am sharing with my colleagues at Charlotte Mecklenburg Library. It always helps to hear the language of social media from your peers. facebook.com/cmlibrary twitter.com/cmlibrary pinterest.com/cmlibrary Posted : May 16, 2013 06:11 REPLY Comment should not be empty !!! POST REPLY Ben Bizzle Nancy, Thanks for acknowledging the work we do at CCJPL. I've gotten a number of requests for dropbox access and wanted to encourage anyone wanting access to email me at ben@benbizzle.com. A few requests that came via Facebook message wound going into my "other" folder instead of my "inbox" and I don't want to miss any requests. Great article and thanks again for the kind words. Ben Posted : May 09, 2013 06:47 REPLY Comment should not be empty !!! POST REPLY Josh Hadro Thanks, Ben -- I went ahead and updated the sentence to include your email address. Josh Hadro, executive editor, LJ Posted : May 09, 2013 06:47 REPLY Comment should not be empty !!! POST REPLY Julie Theado Hi Nancy, Great article. Thank you for including Columbus Metropolitan Library. The article provided practical ideas from other libraries that is incredibly useful to all of us working in social media. Thank you for this article. It's always great to read about what other libraries are doing in social media. Posted : May 07, 2013 07:47 REPLY Comment should not be empty !!! POST REPLY View More Comments CONTINUE READING? Non - Subscribers $99.99 ADD TO CART Subscribers $69.99 ADD TO CART Added To Cart 2018 School Spending Survey Report CONTINUE SHOPPING CHECKOUT RELATED  MARKETING Recap: True Monsters of Lovecraft Country Virtual Roundtable MARKETING #LJReadsRodham: Zoom Conversation with Author Curtis Sittenfeld MARKETING Library Grants Webinar NEWS Gale Analytics Demographic Data Platform Launches Interactive Dashboards by Matt Enis IMPACTS How to Articulate Your Library's Impact and Get What You Need by Lisa Peet INNOVATION Merchandising Your Collection by Erica Freudenberger More       RECOMMENDED REVIEWS+ Run Your Week: Big Books, Sure Bets & Titles Making News | July 17 2018 Neal Wyatt, Jul 17, 2018 The Other Woman by Daniel Silva leads holds this week. Former President Obama has more summer reading. Downton Abbey is heading to the movies. TECHNOLOGY Materials on Hand | Materials Handling Matt Enis, May 16, 2018 Automated systems are helping libraries move staff to patron-facing work, while manufacturers innovate new design features. PROGRAMS+ LGBTQ Collection Donated to Vancouver Archives Lisa Peet, Jun 21, 2018 Longtime archivist, former head of the Vancouver Public Library’s history division, and queer rights activist Ron Dutton donated more than 750,000 items documenting the British Columbia LGBTQ community to the City of Vancouver Archives in March. Log In Email Password You did not sign in correctly or your account is temporarily disabled Forgot password? LOGIN Don't have a Library Journal Account? REGISTER FREE to keep reading REGISTER FREE to keep reading If you are already a member, please Log In First Name Last Name Email Phone Number (Optional) Select Institution Not seeing your institution name? Select Other. Business Category * Select Option Academic Library: 2 year/Community College Academic Library: 4 year/University/College Academic Library: Post Graduate Level Book Manufacturer/Bookseller Consumer Educator/Board of Educators Government Library Library Science Studies/Faculty Literary/Rights Agent Other Library Print/Film/BCST Media Public Library/System Publisher/Publishing School District School Library: Elementary School Library: High School School Library: Middle School/Junior High School Library: Other (K-8, K-12, etc.) Service Provider Special Library: Business/Association/etc. Wholesaler/Distributor/Supplier Writing, Editing, or Illustration Job Function Select Option Adult/Public Library Services Librarian Assistant Library Director Cataloging Librarian Children's Services Librarian Circulation/Access Services Librarian Collection Development/Acquisition Librarian Librarian: Electronic Resources Librarian: Emerging Technologies Head Librarian/Department Head Library Director Library/Branch Manager LIS Student Outreach Librarian Paralibrarian/Paraprofessional Librarian: Readers Advisory Reference/Information Services Librarian Reviewer School Library Media Specialist Teacher Librarian Technical Services/Systems Librarian YA/Teen Librarian Educator User Experience Other Password Show Passwords must include at least 8 characters. Your password must include at least three of these elements: lower case letters, upper case letters, numbers, or special characters. Confirm Password Show I have read and agree to the Terms of Use You should agree the terms and services CONTINUE The email you entered already exists. Please reset your password to gain access to your account. × Close Success. CONTINUE TO ARTICLE OR Create a Password to complete your registration. Get access to: Uncommon insight and timely information Thousands of book reviews Blogs, expert opinion, and thousands of articles New Password Show Confirm Password Show Passwords must include at least 8 characters. Please try your entry again. Your password must include at least three of these elements: lower case letters, upper case letters, numbers, or special characters. Please try your entry again. CREATE ACCOUNT SIGN UP NOW Thank you for registering. To have the latest stories delivered to your inbox, select as many free newsletters as you like below. No thanks. Return to article SUBMIT SUBSCRIBE ALREADY A SUBSCRIBER? LOG IN SUBSCRIBE We are currently offering this content for free. Sign up now to activate your personal profile, where you can save articles for future viewing CREATE AN ACCOUNT ALREADY A SUBSCRIBER? LOG IN BACK TO HOMEPAGE Thank you for visiting. We’ve noticed you are using a private browser. To continue, please log in or create an account. LOG IN CREATE AN ACCOUNT SUBSCRIPTION OPTIONS BACK TO HOMEPAGE SUBSCRIBE Already a subscriber? Log In BACK TO HOMEPAGE Thank you for visiting. Most LJ reviews are exclusive to subscribers. As a subscriber, you'll receive unlimited access to all reviews dating back to 2010. To access other site content, visit our homepage. SUBSCRIBE Already a subscriber? Log In BACK TO HOMEPAGE SUBSCRIBE Already a subscriber? Log In News Reviews+ Technology Programs+ Design Leadership People COVID-19 Advocacy Opinion INFOdocket Job Zone Reviews+ Booklists Prepub Alert Book Pulse Media Readers' Advisory Self-Published Books Review Submissions Review for LJ Awards Library of the Year Librarian of the Year Movers & Shakers Paralibrarian of the Year Best Small Library Marketer of the Year All Awards Guidelines Community Impact Prize Resources LJ Index/Star Libraries Research White Papers / Case Studies Events & PD Online Courses In-Person Events Virtual Events Webcasts About Us Contact Us Advertise Subscribe Media Inquiries Newsletter Sign Up Submit Features/News Data Privacy Terms of Use Terms of Sale FAQs © 2020 Library Journal. All rights reserved. © 2020 Library Journal. All rights reserved. www-libraryjournal-com-6743 ---- Reopening Libraries: Public Libraries Keep Their Options Open | Library Journal SUBSCRIBE ACCESS DIGITIZED EDITION Free Access Account Logout Log In My Subscriptions My Library My Profile Manage Institution Logout Invalid email or password. Try again. Email Password Forgot password? LOG IN Don't have a Library Journal Account? Register Now News Reviews+ Technology Programs+ Design People Public Libraries Academic Libraries Events & More+ Events & PD COVID19 Leadership Advocacy Research Opinion infoDOCKET SUBSCRIBE Log In My Subscriptions My Library My Profile Logout ACCESS DIGITIZED EDITION News Archives & Preservation Awards Book News Budgets & Funding More Innovation LIS Management Marketing Buildings Conference Coverage Impacts Industry News Reviews+ Awards Best of Book News Booklists More Readers' Advisory Reference Collection Management Fiction Media Nonfiction Technology Archives & Preservation Awards Budgets & Funding Buildings More Management Marketing Readers' Advisory Impacts Industry News Innovation LIS Programs+ Archives & Preservation Awards Collection Management Impacts More Readers' Advisory Innovation Management Marketing Programming Design Architecture & Buildings Awards Budgets & Funding Buildings Impacts Innovation Management Leadership Archives & Preservation Awards Budgets & Funding Careers More Management Marketing Readers' Advisory Collection Management Impacts Innovation LIS People Awards Careers Industry News Innovation LIS Management Marketing Public Libraries Academic Libraries Advocacy Awards Budgets & Funding Impacts Innovation Management Marketing More COVID19 Research Opinion infoDOCKET Events & PD Live Events Virtual Events Online Courses Webcasts About LJ LJ Projects Self-Published Books Privacy Policy Get in Touch Subscriber Services Contact Us 888-282-5852 Reopening Libraries: Public Libraries Keep Their Options Open by Erica Freudenberger Jun 25, 2020 | Filed in News How do you reopen a library with no guidelines or best practices to work from? That’s the question public leaders and staff are considering as library buildings gradually open across the country. Reopening Libraries: Campus Concerns Reopening Libraries: Designing for Health As stay-at-home orders are lifted, public libraries must consider their reopening strategy—without the benefit of a playbook How do you reopen a library with no guidelines or best practices to work from? That’s the question public leaders and staff are considering as library buildings gradually open across the country. Library workers returning to their facilities are doing so during a social justice and public health crisis—steeling themselves to serve on the front lines of a changed landscape, planning responses and policies to deal with members of the public who may be unwilling to wear masks or participate in health precautions. Despite the many challenges, library workers are eager to reconnect with their patrons. Some are starting with no-contact service. Others have set time limits for customers to enter buildings and use computers. All are figuring out ways to balance a deep commitment to serving their communities with keeping staff and patrons healthy.   Illustration ©Benedetto Cristofani/Salzmanart PRIORITIZING COMMUNITY HEALTH Personal protective equipment (PPE), signage, sneeze guards, and gallons of hand sanitizer—these are the basics of library safety measures. “It’s about creating a balance,” says Pam Sandlian Smith, director of Anythink Libraries in Adams County, CO. “At some point in time, you do all you can to mitigate risk to provide the safest, cleanest environment possible. You just have to say, ‘We’re going to jump off the cliff,’ and go.” In New Mexico, state librarian Eli Guinee works with 100 public libraries and 19 tribal libraries. “The libraries that have been most successful have been a part of local emergency committees since before the pandemic began,” he says. “So much of resilience is having those networks in place. If you wait until a pandemic to build community partnerships, it's going to be a challenge.” New Mexico libraries are coordinating with fire departments to source PPE and with local distillers who adjusted their operations to manufacture hand sanitizer. Although he had to close the state’s public research library and bookmobiles, Guinee expanded services from the Libraries to the Blind. The New Mexico State Library also mapped public library Wi-Fi hotspots throughout the state and is looking into the possibility of providing satellite internet to communities without broadband through its bookmobiles. Amber Mathewson, the director of the Pima County Public Library, AZ, has 26 branches spread across 9,200 square miles. She leveraged county emergency procurement procedures to purchase personal protective equipment and cleaning products—including face masks for the public. To prepare for limited services on May 18, her staff made additional masks and used the library’s 3-D printers to create comfort clips. Hand sanitizing stations are available throughout the building.  The library is limiting the number of people who can be in the building. In addition to picking up holds, patrons can use computers, plus print, copy, and fax. All visitors will have their temperatures checked—those registering 100.4 degrees or higher will be asked to return later. In Ohio, the Cuyahoga County Public Library (CCPL) reopened June 1. The library’s cleaning company secured supplies, including masks made using specifications from the Cleveland Clinic. Disinfectant wipes remain elusive, so Executive Director Tracy Strobel says that staff will use paper towels and spray bottles. With more than 400,000 items checked out before the pandemic, “the logistics of getting everything back keeps me up at night,” says Strobel. The library will quarantine all materials for 72 hours. Eleven of the library’s branches have drive-up book returns and windows, allowing for no-contact service. Another two branches will provide curbside pickup, which Strobel will continue until limited visits to the library are instituted sometime in July. Her plans depend on county and health department guidance to determine the new occupancy rates for buildings. The Gray Public Library in Maine has been open for curbside and browsing since May 5. Director Josh Tiffany received PPE from the town and installed a plexiglass shield at the circulation desk. Local business New Balance donated masks. Browsers in the building are required to wear masks; those who decline may use the library’s curbside service. Inside, people return materials to a designated table rather than directly to the shelf. Tiffany has removed some seating to limit time in the library and promote social distancing. “What works here may not work for everyone else,” he notes. “We’re more rural than urban, we don't have a large homeless population, and we're well funded for our size.” Despite reduced hours, the library has been busy, and is reaping the benefit of a previous renovation. “In our expansion, we had a loading dock installed,” explains Tiffany. “We have people come to the loading dock, where we put the bags [of library materials] down. They don't get out of the car until we go back in the building—it's a completely touchless interaction.” He reports that for each person who uses curbside service, 10 come into the library to browse. PLAYING IT SAFE Libraries have instituted a range of safety measures to minimize contact. Top: Arapahoe Public Library’s Park and Pickup service at the Koelbel Library’s parking lot; bottom: plexiglass protection installed at the Gray Public Library’s circ desk. Top photo courtesy of Arapahoe Libraries; bottom photo by Josh Tiffany UNDER PRESSURE Not all libraries have the luxury of deciding when to reopen. “The most anxiety has been in communities where the community leaders want the library to open before the library is ready to,” says Guinee. St. Joseph Public Library, MO, opened its four branches on May 7 in response to community pressure. Workers returned three days earlier, preparing for contactless service. “We’re a hotbed because we’ve got a pork plant [in town], which is adding about 20 [COVID-19] cases each day right now,” explains Director Mary Beth Revels. Although all 58 library workers have homemade, cloth masks, most patrons do not. “In Missouri, not even half of people wear masks,” says Revels, who insists on and provides paper masks to customers who want to use computers—especially for one-on-one help. The reluctance of the public to use masks has staff on edge, so Revels has installed plexiglass at the circulation desk. She’s working with the library board to follow guidelines outlined by the Centers for Disease Control, planning to wait on expanding services until there have been no new infections in the community for 14 days. In the meantime, patrons can browse for 20 minutes, spend 30 minutes at a computer, or make arrangements for remote printing. For now, all library programming remains virtual, and public meeting rooms are closed. The Arapahoe Libraries began no-contact service on June 1. “We have recommendations from the state around wearing masks, but no state policy,” says Executive Director Oliver Sanidas. Although the library does not have a policy requiring patrons to wear masks, it will provide paper masks to visitors. Linda Speas, Arapahoe Libraries director of operations, began working on the library’s reopening plan when it closed in March. It will start with curbside pickup by appointment. Patrons will arrive at a designated parking spot, where staff place checked out materials into cars. To ensure equitable service, the library is also providing home delivery and delivery by mail. Meanwhile, new signage is springing up inside the buildings, including floor markings designating traffic patterns. Speas, like Tiffany and Revels, has moved the furniture in public areas to promote social distancing. Can public health be fashion? Arapahoe and Anythink Libraries think so and are creating branded face masks for library staff. Sanidas believes this approach may appeal to patrons and possibly encourage mask-wearing.   SAFETY FIRST A lack of clear guidance on the national, state, and local level has led to confusion about handling materials. Libraries are making educated guesses, allowing for anywhere from 24 to 96 hours for quarantine. Speas, who began accepting returns on May 26, plans to quarantine materials for 72 hours, manually sorting them into bins instead of using the mechanical sorter. All bins are stored in unused meeting rooms. Each container is dated and checked in after the quarantine period ends. Speas ordered additional bins to minimize the number of times staff have to touch materials. Revels quarantines items for four days, allowing people to return items through the library’s book drops or a designated indoor area. Workers will not be wiping items down, which would add to an already heavy workload. As buildings reopen, workers are returning to new spaces, protocols, and procedures with a mix of excitement and trepidation. Frontline staff members are concerned about infection, community health and safety, and job stability. But bringing the public back in can also be powerful, reminds Tiffany, who had people checking out material within five minutes of opening. “It's nice to actually go through the experience of being open, rather than being at home and feeling fearful,” he says. DRIVE ON UP Curbside contactless materials delivery at St. Joseph Public Library, MO. Photo by Mary Beth Revels “We decided the very first week that we were going to overcommunicate,” says Guinee. He began holding office hours, which morphed into daily drop-in sessions. “We haven't had a lot of answers to questions, but we've been helping people think through possible scenarios for reopening and do some proactive planning, even though we don't know what the future is,” says Guinee. He’s hosted virtual programs about updating policies and offers one-on-one video or phone chats to help work through stressful local situations. “We're going to come out of this much stronger, with a greater capacity—even with decreased budgets—because we've used this time to build up partnerships,” he adds. “We communicated early with our Mayor's office about our pandemic response and reopening plans,” says Kim Porter, director of the Batesville Memorial Public Library, IN. She submitted plans to the Board of Health, which made suggestions before approving the library’s June 1 opening. Porter has been in constant contact with her staff, “to acknowledge their fears and work together to address them.” “We’re summoning our inner Zen,” says Sandlian Smith. “When we closed down, we established some basic operating guidelines around how we would make decisions [and] what our priorities were, and made sure our staff felt as secure and supported as possible.” She encouraged professional development while the libraries were closed, providing subscriptions to Masterclass, and launched an Eagerness to Learn initiative. Sandlian Smith wanted staff “to be flexible and fluid” going forward. “We're going to be thoughtful, intentional, and we're going to take care of you as much as we possibly can,” she told them. Concerned with the health of vulnerable employees, Revels is limiting who works with the public. Everyone continues to work from home at least one day a week to take a break from the stress of customer-facing service during a public health pandemic. Mathewson agrees that both internal and external communication is key to a successful reopening. “I believe that attention to staff feedback and concerns should be weighed heavily,” she says. “After all, these are the people on the front lines, serving our community day after day. Their concerns and ideas can be instrumental in boosting morale and creating a new way of doing things that people can get behind.” Many libraries are responding to social distancing requirements with staggered work schedules, both to comply with public health concerns and provide additional break time for workers. Speas and her team are allowing only one staff member in the break room at a time, so that they may remove their masks. “We immediately learned how challenging it could be to wear masks for many hours,” says Speas.  The library’s human resources department provided webinars for staff on mindfulness, mental health, and stress. As the library begins to reopen, Speas is figuring out how to distribute 325 staff throughout the library’s eight public-facing branches while not having more than four workers in any one area. “People want to know that we’ve planned for everything and have processes in place,” says Strobel. “Having solid communications and a great foundational relationship with our workforce—having trust built up—has gone a long way in terms of maintaining staff morale and loyalty,” she notes. “People are very understanding of the challenges leadership has and are trusting that we'll make the right decisions on their behalf.” In May, CCPL saw a 35 percent reduction in funding over the previous 12 months. To preserve jobs, the library began participating in the Shared Work Ohio initiative. “We can reduce our [hours] up to 50 percent, and apply for unemployment benefits for the other 50 percent, and staff qualifies for the Cares Act,” Strobel explains. “Five hundred and fifty people did that—including me.” By doing so, the library has managed to save $2 million in payroll costs for May and June.   A NEW WAY FORWARD While considering how to reopen, public libraries also have to address the inequities that been exacerbated by the pandemic, including social injustice, systemic racism, and economic devastation. Plans made six months ago now seem quaint. There's a lot to do. The best place to begin, as Guinee says, is to “Approach your work with humility.” Virtual programming has boomed but highlighted digital inequity. “Policymakers and citizens on the street have heard a lot more and gained a better understanding of the big picture,” says Timothy Cherubini, executive director of Chief Officers of State Library Agencies (COSLA). Sanidas began offering mail and home service delivery to address the issue, but points out once libraries do so, they can’t stop.  Speas is anticipating a demand for workforce development and unemployment assistance. The library has a social worker on staff “to connect patrons with mental health and other resources.” As library buildings reopen and services resume, “communities will feel a tremendous sense of relief,” predicts Guinee. “The symbolic value of the bookmobile returning will be high—it represents a connection to the wider world and a sense of recurring normalcy.” The challenge, he says, is to welcome patrons while maintaining health social distancing boundaries. Libraries play a critical role in building future resilience, by “supporting local economies, rebuilding the local business ecosystem more sustainably, developing shared values and community priorities,” he adds. “There are so many forces seeking to take old divisions and move people even farther apart. There's not any other institution like public libraries that can reach across the divide and bring people together to talk about shared priorities and shared community values.” For those anxious about opening, “Don’t assume you can think of everything,” reminds Guinee. “You’re going to have blind spots. If possible, have an outside person do a safety audit of your building.” “This is a scary time, and I would not be honest if I didn’t say we have to be brave and have courage,” says Sandlian Smith.   If you're in the process of making plans to reopen, here are a couple of helpful places to begin: The New Jersey State Library assembled information about COVID-19 and reopening plans. A joint research project of OCLC, the Institute of Museum and Library Services, and Battelle, the REALM Information Hub is gathering information and developing best practices to reduce the risk of COVID-19 to staff and patrons. Information should be available in October.  Erica Freudenberger is outreach consultant, Southern Adirondack Library System, Saratoga Springs, NY, and a 2016 LJ Mover & Shaker. Get Print. Get Digital. Get Both! SUBSCRIBE NOW reopening covid-19 coronavirus Add Comment :- UUID : Name : Email : URL : Comment : Be the first reader to comment. Comment Policy: Be respectful, and do not attack the author, people mentioned in the article, or other commenters. Take on the idea, not the messenger. Don't use obscene, profane, or vulgar language. Stay on point. Comments that stray from the topic at hand may be deleted. Comments may be republished in print, online, or other forms of media. If you see something objectionable, please let us know. Once a comment has been flagged, a staff member will investigate. Document type : UUID : Name : Email : Image : Comment Parent Id : Fill out the form or Login / Register to comment: (All fields required) First Name should not be empty !!! Last Name should not be empty !!! email should not be empty !!! Comment should not be empty !!! Please check the reCaptcha Something went wrong with Captcha Verificatioin. Please refresh and try again! POST COMMENT CLICK HERE TO COMMENT TO THIS ARTICLE Comment should not be empty !!! POST COMMENT CONTINUE READING? Non - Subscribers $99.99 ADD TO CART Subscribers $69.99 ADD TO CART Added To Cart 2018 School Spending Survey Report CONTINUE SHOPPING CHECKOUT RELATED  BUILDINGS The Year in Architecture 2020 INDUSTRY NEWS Reference Publishers, Academic Librarians on Keeping Resources Current and Comprehensive by April Witteveen NEWS Library Land Project Gets Nonprofit Status, Continues Mission During COVID Shutdown by Lisa Peet INDUSTRY NEWS How COVID-19 Has Transformed Reference Services for Public and Academic Libraries by Mahnaz Dar NEWS Despite COVID Concerns, Library Measures Do Well at Polls in 2020 by Lisa Peet INNOVATION Maryland Libraries' Antiracism Programming Goes Global | Programs that Pop by Nicholas Alexander Brown More       RECOMMENDED REVIEWS+ Run Your Week: Big Books, Sure Bets & Titles Making News | July 17 2018 Neal Wyatt, Jul 17, 2018 The Other Woman by Daniel Silva leads holds this week. Former President Obama has more summer reading. Downton Abbey is heading to the movies. TECHNOLOGY Materials on Hand | Materials Handling Matt Enis, May 16, 2018 Automated systems are helping libraries move staff to patron-facing work, while manufacturers innovate new design features. PROGRAMS+ LGBTQ Collection Donated to Vancouver Archives Lisa Peet, Jun 21, 2018 Longtime archivist, former head of the Vancouver Public Library’s history division, and queer rights activist Ron Dutton donated more than 750,000 items documenting the British Columbia LGBTQ community to the City of Vancouver Archives in March. Log In Email Password You did not sign in correctly or your account is temporarily disabled Forgot password? LOGIN Don't have a Library Journal Account? REGISTER FREE to keep reading REGISTER FREE to keep reading If you are already a member, please Log In First Name Last Name Email Phone Number (Optional) Select Institution Not seeing your institution name? Select Other. Business Category * Select Option Academic Library: 2 year/Community College Academic Library: 4 year/University/College Academic Library: Post Graduate Level Book Manufacturer/Bookseller Consumer Educator/Board of Educators Government Library Library Science Studies/Faculty Literary/Rights Agent Other Library Print/Film/BCST Media Public Library/System Publisher/Publishing School District School Library: Elementary School Library: High School School Library: Middle School/Junior High School Library: Other (K-8, K-12, etc.) Service Provider Special Library: Business/Association/etc. Wholesaler/Distributor/Supplier Writing, Editing, or Illustration Job Function Select Option Adult/Public Library Services Librarian Assistant Library Director Cataloging Librarian Children's Services Librarian Circulation/Access Services Librarian Collection Development/Acquisition Librarian Librarian: Electronic Resources Librarian: Emerging Technologies Head Librarian/Department Head Library Director Library/Branch Manager LIS Student Outreach Librarian Paralibrarian/Paraprofessional Librarian: Readers Advisory Reference/Information Services Librarian Reviewer School Library Media Specialist Teacher Librarian Technical Services/Systems Librarian YA/Teen Librarian Educator User Experience Other Password Show Passwords must include at least 8 characters. Your password must include at least three of these elements: lower case letters, upper case letters, numbers, or special characters. Confirm Password Show I have read and agree to the Terms of Use You should agree the terms and services CONTINUE The email you entered already exists. Please reset your password to gain access to your account. × Close Success. CONTINUE TO ARTICLE OR Create a Password to complete your registration. Get access to: Uncommon insight and timely information Thousands of book reviews Blogs, expert opinion, and thousands of articles New Password Show Confirm Password Show Passwords must include at least 8 characters. Please try your entry again. Your password must include at least three of these elements: lower case letters, upper case letters, numbers, or special characters. Please try your entry again. CREATE ACCOUNT SIGN UP NOW Thank you for registering. To have the latest stories delivered to your inbox, select as many free newsletters as you like below. No thanks. Return to article SUBMIT SUBSCRIBE ALREADY A SUBSCRIBER? LOG IN SUBSCRIBE We are currently offering this content for free. Sign up now to activate your personal profile, where you can save articles for future viewing CREATE AN ACCOUNT ALREADY A SUBSCRIBER? LOG IN BACK TO HOMEPAGE Thank you for visiting. We’ve noticed you are using a private browser. To continue, please log in or create an account. LOG IN CREATE AN ACCOUNT SUBSCRIPTION OPTIONS BACK TO HOMEPAGE SUBSCRIBE Already a subscriber? Log In BACK TO HOMEPAGE Thank you for visiting. Most LJ reviews are exclusive to subscribers. As a subscriber, you'll receive unlimited access to all reviews dating back to 2010. To access other site content, visit our homepage. SUBSCRIBE Already a subscriber? Log In BACK TO HOMEPAGE SUBSCRIBE Already a subscriber? Log In News Reviews+ Technology Programs+ Design Leadership People COVID-19 Advocacy Opinion INFOdocket Job Zone Reviews+ Booklists Prepub Alert Book Pulse Media Readers' Advisory Self-Published Books Review Submissions Review for LJ Awards Library of the Year Librarian of the Year Movers & Shakers Paralibrarian of the Year Best Small Library Marketer of the Year All Awards Guidelines Community Impact Prize Resources LJ Index/Star Libraries Research White Papers / Case Studies Events & PD Online Courses In-Person Events Virtual Events Webcasts About Us Contact Us Advertise Subscribe Media Inquiries Newsletter Sign Up Submit Features/News Data Privacy Terms of Use Terms of Sale FAQs © 2020 Library Journal. All rights reserved. © 2020 Library Journal. All rights reserved. www-nbcnews-com-6908 ---- Google sells the future, powered by your personal data News NBC News NOW Nightly News Meet the Press Dateline MSNBC TODAY 2020 election Coronavirus U.S. News Opinion Business World Cyber Monday: Best Deals Share this — Search Sections CORONAVIRUS U.S. News Politics World Local Business Health Investigations Culture Matters Science Sports Tech & Media Decision 2020 Video Features Photos Weather Shopping TV Today MSNBC Nightly News Meet The Press Dateline Featured NBC NEWS NOW THINK BETTER NIGHTLY FILMS ASIAN AMERICA NBC LATINO NBCBLK NBC OUT STAY TUNED SPECIAL FEATURES NEWSLETTERS PODCASTS More from NBC CNBC NBC.COM NBC LEARN Peacock Next Steps for Vets Parent Toolkit NBC Archives Know Your Value COUPONS Follow NBC News Search Facebook Twitter Email SMS Print Whatsapp Reddit Pocket Flipboard Pinterest Linkedin Tech & Media Google sells the future, powered by your personal data Personal data collection practices are in the hot seat. So why isn't Google, which collects more data than Facebook, feeling the heat? A Google campus-network room at a data center in Council Bluffs, Iowa.Connie Zhou / Google via AP file May 10, 2018, 8:30 AM UTC / Updated May 10, 2018, 8:30 AM UTC By Ben Popken Google CEO Sundar Pichai stood on stage at the company’s yearly developer conference on Tuesday and rolled out some of its most advanced technology: an assistant that can schedule appointments for you over the phone, customized suggestions in Google Maps, and even a new feature that can help finish your sentences as you type an email. It’s all underpinned by the same thing: the massive trove of data that Google is collecting on billions of people every day. Until recently, most users may have either been unaware their data was being used like this or were fine with the tradeoff. Google has seven products that each have at least 1 billion active monthly users, and they couldn’t work as well without access to users’ data. Related tech techAs algorithms take over, YouTube's recommendations highlight a human problem That has helped make Google one of the world’s most well-regarded brands, according to a Morning Consult poll. But in a post-Cambridge Analytica world that is growing increasingly leery of how major tech companies track people, the data collection practices by the world’s leading digital advertising company have come under renewed scrutiny. "Google is walking a very fine line,” David Yoffie, a professor at the Harvard Business School, said in an email. “Search, plus Android gives Google amazing insight into individual behavior. Google’s stated privacy policies seem adequate, but the question that I cannot answer is whether Google’s stated policy and actual behavior are one and the same. Facebook had a stated policy for the last three years which most of us found acceptable, until Cambridge Analytica came to light.” Where does the data come from? The more Google products you use, the more Google can gather about you. Whether it’s Gmail, the Android smartphone operating system, YouTube, Google Drive, Google Maps, and, of course, Google Search — the company is collecting gigabytes of data about you. “We use the information we collect from all of our services to provide, maintain, protect and improve them, to develop new ones, and to protect Google and our users,” Google says in its privacy policy. “We also use this information to offer you tailored content – like giving you more relevant search results and ads.” Google offers free access to these tools and in return shows you super-targeted advertising, which is how it made $31.2 billion in revenue in just the first three months of 2018. The company’s data collection practices also include scanning your email to extract keyword data for use in other Google products and services and to improve its machine learning capabilities, Google spokesman Aaron Stein confirmed in an email to NBC News. Big-brother? Amazon, Google devices could become scary smart April 2, 201806:29 “We may analyze [email] content to customize search results, better detect spam and malware,” he added, later noting Google has customized search in this way since 2012. How Google collects data from Gmail users and what it uses that data for has been a particularly sensitive topic. In June 2017, Google said it would stop scanning Gmail messages in order to sell targeted ads. After this article was published, Google’s confirmation that it does still collect data from the email of Gmail users drew attention from some journalists that cover technology and digital privacy. Google reached out to NBC to clarify that the company’s spokesperson was referring to “narrow use cases” in Gmail. "First, since 2012, we’ve enabled people to use Google Search to find information from their Gmail accounts by answering questions like 'When is my restaurant reservation?'" Stein, the Google spokesperson, wrote in an email. "We present customized search results containing this information if someone is signed-in and asks us for it. Second, like other email providers, our systems may also automatically process email messages to detect spam, malware and phishing patterns, to help us stop this abuse and protect people’s inboxes. We have the most secure email service because of these systems - and they are powered by machine learning technology.” It doesn’t stop there, though. Google says it is also leverages some of its datasets to “help build the next generation of ground-breaking artificial intelligence solutions.” On Tuesday, Google rolled out “Smart Replies,” in which artificial intelligence helps users finish sentences. The extent of the information Google has can be eyebrow-raising even for technology professionals. Dylan Curran, an information technology consultant, recently downloaded everything Facebook had on him and got a 600-megabyte file. When he downloaded the same kind of file from Google, it was 5.5 gigabytes, about nine times as large. His tweets highlighting each kind of information Google had on him, and therefore other users, got nearly 170,000 retweets. “This is one of the craziest things about the modern age, we would never let the government or a corporation put cameras/microphones in our homes or location trackers on us, but we just went ahead and did it ourselves because … I want to watch cute dog videos,” Curran wrote. Want to freak yourself out? I'm gonna show just how much of your information the likes of Facebook and Google store about you without you even realising it — Dylan Curran (@iamdylancurran) March 24, 2018 What does Google guarantee? The company has installed various guardrails against this data being misused. It says it doesn’t sell your personal information, makes user data anonymous after 18 months, and offers tools for users to delete their recorded data piece by piece or in its (almost) entirety, and to limit how they’re being tracked and targeted for advertising. And it doesn't allow marketers to target users based on sensitive categories like beliefs, sexual interests or personal hardships. However, that doesn't prevent the company from selling advertising slots that can be narrowed to a user’s ZIP code. Combined with enough other categories of interest and behavior, Google advertisers can create a fairly tight Venn diagram of potential viewers of a marketing message, with a minimum of 100 people. "They collect everything they can, as a culture," Scott Cleland, chairman of NetCompetition, an advocacy group that counts Comcast and other cable companies among its members, told NBC News. "They know they'll find some use for it." What can you do about it? Users can see and limit the data Google collects on them by changing their advertising preferences through an online dashboard. The internet giant offers fine-tune controls to opt out of tracking via Google’s advertising cookie, as well as limiting whether you’ll see targeted ads based on your interest groups and categories. You can also see and delete many of the personal tracking data about yourself, including your entire search history and any geolocation data that may have been tracking your every physical movement if you were signed into Google services on your phone. “We give users controls to delete individual items, services or their entire account,” said Google’s Stein. “When a user decides to delete data, we go through a process over time to safely and completely remove it from our systems, including backups. We keep some data with a user’s Google Account, like when and how they use certain features, until the account is deleted.” In the wake of Facebook privacy scandal, how safe is Google? March 30, 201803:08 New European data privacy rules known as GDPR are set to go into effect on May 25. Those new regulations are supposed to limit what data can be collected on users and give them the ability to completely delete their data from systems, as well as bring their data from one service to another. Companies like Google will be forced to more clearly spell out to customers what kind of data is being collected and no longer be able to bury them in fine print, with fines for violations up to 4 percent of revenue. What might Google do in the future? All that data is already valuable to Google, but it could yield an even greater return once paired with advanced artificial intelligence systems that offer highly personalized services, like a souped-up version of Google Assistant. “On your way to a friend’s house and say ‘find wine’ and you’ll get recommendations for a store that is still open and also not out of the route,” said Oren Etzioni, CEO of the Allen Institute for Artificial Intelligence, a research group founded by Microsoft co-founder Paul Allen. Google rolled out personalized maps on Tuesday. But Etzioni recommended caution before we unleash swarms of digital agents. Already we’ve seen some unpleasant effects. Palantir, a security and data-mining firm, sells software that hoovers up data and allows law enforcement to engage in “predictive policing,” guesstimating who might commit crimes. Uber’s self-driving car experiment resulted in a pedestrian being killed after the software was tuned too far in the direction of ignoring stray objects, like plastic bags. “We need to think hard about how AI gathers and extrapolates data,” Etzioni said. “It has deep implications.” About Contact Careers Coupons Privacy policy Do Not Sell My Personal Information CA Notice Terms of Service NBCNews.COM Site Map Advertise Ad Choices © 2020 NBC UNIVERSAL www-nytimes-com-5788 ---- Parking Lots Have Become a Digital Lifeline - The New York Times SectionsSEARCH Skip to contentSkip to site index Technology Today’s Paper Technology|Parking Lots Have Become a Digital Lifeline https://nyti.ms/3c0KjT0 At Home Stop: Nap-Shaming Visit: The Museum of Smells Transform: Leftover Stuffing Listen To: Quarantine Soundscapes Advertisement Continue reading the main story Supported by Continue reading the main story Parking Lots Have Become a Digital Lifeline With cafes and libraries closed, Americans without internet access are sitting outside them to get free and fast connections. Beth Revis, an author, using the free Wi-Fi outside Mount Vernon-Ruth Elementary School in Rutherfordton, N.C.Credit...Jacob Biba for The New York Times By Cecilia Kang Published May 5, 2020Updated May 20, 2020 As the sun set on a recent evening in Rutherfordton, N.C., the author Beth Revis drove her green S.U.V. into the parking lot of a closed elementary school and connected to the building’s free Wi-Fi. Then, for the third time since the coronavirus pandemic had taken hold, she taught a two-hour writing class from her driver’s seat. Ms. Revis, 38, held a flashlight to her face with one hand. In the other, she held a selfie stick with her smartphone attached, looking at the device to speak to her students. Getting the internet in her area, about 70 miles west of Charlotte, had always been a headache, Ms. Revis said. “But during the pandemic,” she said, “it has turned from a mild inconvenience to a near impossibility.” For Ms. Revis and many others across the country, parking lots have been a digital lifeline during the pandemic. Instead of spending hours in restaurants, libraries and cafes, people without fast internet access at home are sitting in lots near schools, libraries and stores that have kept their signals on. In Ohio, Jon Husted, the lieutenant governor, has directed people to connect to hundreds of nonprofits, libraries and schools across the state. School leaders in Philadelphia and Sacramento have encouraged families to use free hot spots in library and school parking lots, and more than 100 people logged on to the Wi-Fi of one of Omaha’s libraries over three days recently. Image Gina Leonardo worked online while parked at Do Space, a community center in Omaha.Credit...Calla Kessler/The New York Times Near Topeka, Kan., a steady flow of cars now arrive outside the public library, while other cars cluster near connected bookmobiles parked in lots near a women’s correctional facility and a mobile home park. “I hope that there is a lesson learned from this,” said Gina Millsap, the chief executive of the Topeka & Shawnee County Public Library. “Broadband is like water and electricity now, and yet it’s still being treated like a luxury.” The dependence on Wi-Fi in parking lots shows the lengths to which people are going to combat the country’s digital divide, one of the most stubborn problems in technology — and one the coronavirus has exacerbated. One in four Americans has no high-speed internet access at home, according to the Pew Research Center, either because it’s too expensive or because the home is in a rural area with limited service. Some use their smartphone data plans for high-speed internet access, but those plans are often insufficient to handle work from home and distance learning. That makes it harder for many people to work from home during the health crisis and for their children to keep up with their schoolwork away from the classroom. In recent weeks, numerous federal lawmakers, both Republicans and Democrats, have pushed for legislation to make service more affordable, especially for families with school-age children. But such legislative pushes have happened in the past without ever crossing the finish line. “What is disappointing is that we have done nothing for years to address the problem,” said Mignon Clyburn, a former commissioner at the Federal Communications Commission who has long pressed for more funding for rural broadband and subsidies for low-income families. “Now we are in a crisis, and we are triaging.” On federal internet service maps, Louis Derry appears to have broadband access, because a few people in his area of upstate New York have high speeds, defined by the government as 25 megabits per second. But at his home, seven miles from Cornell University, only a much slower speed is available from his provider — 5 megabits per second. It is not enough to support the needs of his family. The family takes turns driving down to Brookton’s Market, a small country store with a gravel driveway, to park and connect to its free internet. Mr. Derry’s daughter, Ellie, a freshman at Colorado College, goes almost daily for her Zoom class sessions and to download big files that she can take home and work on offline. Other cars are almost always parked nearby, drivers typing away at their laptops and using the free Wi-Fi. They often keep one empty spot between them, to follow social distancing guidelines. In more urban areas, the problems are due to affordability. Mary Anne Mendoza, 26, a doctoral student at the University of California, Irvine, shares the least expensive internet service available with her mother and sister in their two-bedroom apartment near the college. When her mother, an M.B.A. candidate, is on a videoconference call, and her sister is online for an undergraduate class, the Wi-Fi at home slows to a crawl. As a result, Ms. Mendoza, who also teaches political science at California State Polytechnic University, Pomona, has been driving to the parking lot of a nearby Starbucks to get online. “In my car, I get the privacy I need, and the quality of service is better,” she said. Anna Haskins, a professor of sociology at Cornell, said she feared that relying on parking lots was inadequate for her students, who are taking classes remotely. One student, in St. Louis, dropped all electronic communication for two weeks until he was able to find a public Wi-Fi hot spot. Another, in rural Oklahoma, is driving several miles a day to the nearest parking lot Wi-Fi spot to do her quizzes and homework from her car. “To leave the house and take a quiz in a car shows how hard this transition is for some,” Ms. Haskins said. “It’s hard to evaluate people fairly. Is their grade on a quiz low because they didn’t study or because they didn’t have the best situation to take the quiz?” Image Internet access in her area, Ms. Revis said, “has turned from a mild inconvenience to a near impossibility.”Credit...Jacob Biba for The New York Times In Philadelphia, the high cost of broadband has left an estimated 17 percent of residents without internet at home, according to the Movement Alliance Project, a consumer advocacy group. The city’s school district will begin formal online classes on May 4, and educators fear that many lower-income students will be left behind. The district has passed out 80,000 Chromebooks to its 130,000 students, but is concerned that residents won’t have broadband access to participate in classes and make the most of their new devices. The school district has pointed to free and reduced-priced services offered by providers like Comcast, but some parents have complained of long waits to get the service. Officials have also pointed families to free parking lot hot spots around the city as a last resort for students, said Monica Lewis, a spokeswoman for the school district. The idea of using a parking lot for studies has rubbed many residents the wrong way. “In a city like Philadelphia, you can’t expect people to socially distance in a parking lot,” said Devren Washington, a senior policy director at the Movement Alliance Project. “You can’t expect some students to be sitting in a parking lot doing their schoolwork while others are in a much better position at home.” Advertisement Continue reading the main story Site Index Site Information Navigation © 2020 The New York Times Company NYTCo Contact Us Work with us Advertise T Brand Studio Your Ad Choices Privacy Policy Terms of Service Terms of Sale Site Map Canada International Help Subscriptions www-pewinternet-org-789 ---- Demographics of Social Media Users and Adoption in the United States | Pew Research Center HomeU.S. PoliticsMedia & NewsSocial TrendsReligionInternet & TechScienceHispanicsGlobalMethods Blog About Follow My Account DONATE Numbers, Facts and Trends Shaping Your World About Follow Donate Internet & Technology HomeU.S. PoliticsMedia & NewsSocial TrendsReligionInternet & TechScienceHispanicsGlobalMethods Publications Topics Presentations Datasets Interactives Fact Sheets Our Experts Internet & Technology Main More June 12, 2019 Social Media Fact Sheet MORE FACT SHEETS: INTERNET/BROADBAND | MOBILE TECHNOLOGY Today around seven-in-ten Americans use social media to connect with one another, engage with news content, share information and entertain themselves. Explore the patterns and trends shaping the social media landscape over the past decade below. Social media use over time When Pew Research Center began tracking social media adoption in 2005, just 5% of American adults used at least one of these platforms. By 2011 that share had risen to half of all Americans, and today 72% of the public uses some type of social media. U.S. adults 3/21/2005 5% 12/8/2005 8% 8/31/2006 11% 5/11/2008 21% 8/10/2008 26% 8/31/2008 25% 12/4/2008 27% 12/20/2008 26% 4/19/2009 36% 9/14/2009 37% 12/27/2009 42% 1/19/2010 43% 5/30/2010 48% 9/13/2010 46% 11/24/2010 45% 11/28/2010 46% 12/21/2010 47% 5/22/2011 50% 8/26/2011 50% 2/19/2012 53% 8/7/2012 59% 12/9/2012 54% 5/19/2013 61% 7/14/2013 60% 9/30/2013 63% 1/26/2014 62% 7/12/2015 65% 11/6/2016 69% 1/10/2018 69% 2/7/2019 72% Pew Research Center Who uses social media As more Americans have adopted social media, the social media user base has also grown more representative of the broader population. Young adults were among the earliest social media adopters and continue to use these sites at high levels, but usage by older adults has increased in recent years. Age Race Gender Income Education Community 18-29 30-49 50-64 65+ 3/21/2005 7% 6% 4% 3% 12/8/2005 16% 9% 5% 2% 8/31/2006 41% 6% 3% 0% 5/11/2008 60% 21% 7% 2% 8/10/2008 65% 27% 10% 3% 8/31/2008 68% 27% 9% 2% 12/4/2008 67% 30% 12% 2% 12/20/2008 59% 28% 8% 3% 4/19/2009 70% 42% 20% 5% 9/14/2009 67% 44% 21% 6% 12/27/2009 78% 47% 25% 8% 1/19/2010 76% 51% 26% 7% 5/30/2010 82% 53% 37% 11% 9/13/2010 80% 52% 31% 9% 11/24/2010 74% 54% 33% 11% 11/28/2010 78% 54% 33% 14% 12/21/2010 76% 55% 36% 12% 5/22/2011 79% 61% 38% 14% 8/26/2011 82% 59% 36% 12% 2/19/2012 82% 64% 39% 16% 8/7/2012 88% 68% 48% 22% 5/19/2013 87% 72% 50% 24% 7/14/2013 87% 72% 49% 21% 9/30/2013 89% 74% 54% 27% 1/26/2014 84% 77% 52% 27% 7/12/2015 90% 77% 51% 35% 11/6/2016 86% 80% 64% 34% 1/10/2018 88% 78% 64% 37% 2/7/2019 90% 82% 69% 40% Pew Research Center White Black Hispanic 3/21/2005 5% 4% 12/8/2005 8% 7% 8/31/2006 9% 11% 5/11/2008 19% 21% 8/10/2008 21% 32% 8/31/2008 22% 25% 12/4/2008 26% 25% 12/20/2008 24% 27% 4/19/2009 35% 33% 9/14/2009 39% 33% 12/27/2009 42% 42% 1/19/2010 41% 44% 5/30/2010 46% 51% 9/13/2010 47% 41% 40% 11/24/2010 45% 43% 39% 11/28/2010 47% 40% 44% 12/21/2010 48% 41% 44% 5/22/2011 50% 46% 51% 8/26/2011 51% 49% 45% 2/19/2012 53% 48% 51% 8/7/2012 59% 58% 58% 12/9/2012 54% 50% 53% 5/19/2013 60% 64% 61% 7/14/2013 56% 57% 9/30/2013 62% 58% 66% 1/26/2014 59% 61% 66% 7/12/2015 65% 56% 65% 11/6/2016 69% 63% 74% 1/10/2018 68% 69% 72% 2/7/2019 73% 69% 70% Pew Research Center Men Women 3/21/2005 6% 4% 12/8/2005 10% 8% 8/31/2006 13% 10% 5/11/2008 21% 22% 8/10/2008 25% 27% 8/31/2008 25% 24% 12/4/2008 26% 29% 12/20/2008 25% 26% 4/19/2009 33% 38% 9/14/2009 36% 37% 12/27/2009 38% 45% 1/19/2010 39% 46% 5/30/2010 44% 52% 9/13/2010 42% 49% 11/24/2010 39% 50% 11/28/2010 42% 50% 12/21/2010 44% 50% 5/22/2011 47% 54% 8/26/2011 50% 50% 2/19/2012 50% 56% 8/7/2012 54% 64% 12/9/2012 50% 58% 5/19/2013 59% 63% 7/14/2013 57% 62% 9/30/2013 60% 66% 1/26/2014 60% 63% 7/12/2015 62% 68% 11/6/2016 66% 72% 1/10/2018 65% 73% 2/7/2019 65% 78% Pew Research Center Less than $30,000 $30,000-$49,999 $50,000-$74,999 $75,000+ 3/21/2005 3% 6% 8% 7% 12/8/2005 5% 9% 9% 15% 8/31/2006 8% 16% 9% 10% 5/11/2008 23% 23% 19% 25% 8/10/2008 27% 28% 28% 30% 8/31/2008 22% 26% 33% 28% 12/4/2008 24% 34% 27% 35% 12/20/2008 26% 29% 27% 32% 4/19/2009 30% 39% 43% 47% 9/14/2009 32% 40% 43% 50% 12/27/2009 37% 43% 47% 53% 1/19/2010 39% 43% 48% 49% 5/30/2010 42% 54% 50% 60% 9/13/2010 38% 48% 54% 63% 11/24/2010 39% 46% 53% 57% 11/28/2010 40% 50% 50% 58% 12/21/2010 39% 52% 59% 60% 5/22/2011 42% 60% 56% 66% 8/26/2011 42% 54% 55% 64% 2/19/2012 46% 58% 57% 68% 8/7/2012 55% 59% 61% 73% 12/9/2012 48% 56% 60% 65% 5/19/2013 57% 63% 69% 68% 7/14/2013 52% 59% 63% 71% 9/30/2013 58% 64% 70% 73% 1/26/2014 58% 64% 67% 74% 7/12/2015 56% 69% 72% 78% 11/6/2016 60% 71% 73% 78% 1/10/2018 63% 74% 74% 77% 2/7/2019 68% 70% 83% 78% Pew Research Center High school or less Some college College graduate 3/21/2005 3% 5% 10% 12/8/2005 5% 10% 13% 8/31/2006 9% 17% 9% 5/11/2008 18% 29% 21% 8/10/2008 22% 32% 29% 8/31/2008 19% 28% 32% 12/4/2008 20% 38% 33% 12/20/2008 19% 35% 32% 4/19/2009 27% 44% 44% 9/14/2009 27% 44% 48% 12/27/2009 29% 53% 55% 1/19/2010 32% 54% 50% 5/30/2010 37% 58% 59% 9/13/2010 34% 55% 57% 11/24/2010 33% 55% 56% 11/28/2010 36% 54% 56% 12/21/2010 35% 56% 60% 5/22/2011 39% 58% 63% 8/26/2011 39% 64% 59% 2/19/2012 41% 65% 64% 8/7/2012 48% 68% 69% 12/9/2012 44% 62% 62% 5/19/2013 52% 67% 69% 7/14/2013 47% 67% 71% 9/30/2013 51% 70% 73% 1/26/2014 50% 71% 69% 7/12/2015 54% 70% 76% 11/6/2016 59% 73% 78% 1/10/2018 60% 72% 79% 2/7/2019 64% 74% 79% Pew Research Center Urban Suburban Rural 3/21/2005 6% 5% 3% 12/8/2005 10% 8% 6% 8/31/2006 14% 10% 10% 5/11/2008 24% 22% 16% 8/10/2008 30% 25% 19% 8/31/2008 29% 24% 18% 12/4/2008 30% 28% 21% 12/20/2008 24% 19% 14% 4/19/2009 29% 33% 21% 9/14/2009 33% 31% 28% 12/27/2009 45% 43% 34% 1/19/2010 45% 43% 35% 5/30/2010 53% 50% 39% 9/13/2010 48% 50% 32% 11/24/2010 48% 46% 40% 11/28/2010 50% 46% 41% 12/21/2010 51% 49% 39% 5/22/2011 53% 52% 44% 8/26/2011 53% 51% 42% 2/19/2012 56% 54% 45% 8/7/2012 60% 61% 50% 12/9/2012 56% 55% 47% 5/19/2013 64% 61% 56% 7/14/2013 64% 60% 49% 9/30/2013 66% 63% 55% 1/26/2014 63% 64% 53% 7/12/2015 64% 68% 58% 11/6/2016 69% 71% 60% 1/10/2018 75% 69% 59% 2/7/2019 76% 72% 66% Pew Research Center Which social media platforms are most popular YouTube and Facebook are the most-widely used online platforms, and its user base is most broadly representative of the population as a whole. Smaller shares of Americans use sites such as Twitter, Pinterest, Instagram and LinkedIn. Facebook Pinterest Instagram LinkedIn Twitter Snapchat YouTube WhatsApp Reddit 8/5/2012 54% 10% 9% 16% 13% 8/7/2012 14% 12/9/2012 13% 11% 13% 12/16/2012 57% 5/19/2013 15% 7/14/2013 16% 9/16/2013 57% 17% 14% 17% 14% 9/30/2013 16% 1/26/2014 16% 9/21/2014 58% 22% 21% 23% 19% 4/12/2015 62% 26% 24% 22% 20% 4/4/2016 68% 26% 28% 25% 21% 1/10/2018 68% 29% 35% 25% 24% 27% 73% 22% 2/7/2019 69% 28% 37% 27% 22% 24% 73% 20% 11% Pew Research Center Who uses each social media platform Usage of the major social media platforms varies by factors such as age, gender and educational attainment. Facebook/Instagram/LinkedIn Twitter/Pinterest/Snapchat YouTube/WhatsApp/Reddit % of U.S. adults who use each social media platform Facebook Instagram LinkedIn Total 69% 37% 27% Men 63% 31% 29% Women 75% 43% 24% Ages 18-29 79% 67% 28% 30-49 79% 47% 37% 50-64 68% 23% 24% 65+ 46% 8% 11% White 70% 33% 28% Black 70% 40% 24% Hispanic 69% 51% 16% High school or less 61% 33% 9% Some college 75% 37% 26% College graduate 74% 43% 51% Urban 73% 46% 33% Suburban 69% 35% 30% Rural 66% 21% 10% Source: Survey conducted Jan. 8 to Feb. 7, 2019. Pew Research Center % of U.S. adults who use each social media platform Twitter Pinterest Snapchat Total 22% 28% 24% Men 24% 15% 24% Women 21% 42% 24% Ages 18-29 38% 34% 62% 30-49 26% 35% 25% 50-64 17% 27% 9% 65+ 7% 15% 3% White 21% 33% 22% Black 24% 27% 28% Hispanic 25% 22% 29% High school or less 13% 19% 22% Some college 24% 32% 29% College graduate 32% 38% 20% Urban 26% 30% 29% Suburban 22% 30% 20% Rural 13% 26% 20% Source: Source: Survey conducted Jan. 8 to Feb. 7, 2019. Pew Research Center % of U.S. adults who use each social media platform YouTube WhatsApp Reddit Total 73% 20% 11% Men 78% 21% 15% Women 68% 19% 8% Ages 18-29 91% 23% 22% 30-49 87% 31% 14% 50-64 70% 16% 6% 65+ 38% 3% 1% White 71% 13% 12% Black 77% 24% 4% Hispanic 78% 42% 14% High school or less 64% 18% 6% Some college 79% 14% 14% College graduate 80% 28% 15% Urban 77% 24% 11% Suburban 74% 19% 13% Rural 64% 10% 8% Source: Source: Survey conducted Jan. 8 to Feb. 7, 2019. Pew Research Center How often Americans use social media sites For many users, social media is part of their daily routine. Roughly three-quarters of Facebook users – and around six-in-ten Instagram users – visit these sites at least once a day. Platform Less often Weekly Daily Facebook 9% 17% 74% Snapchat 22% 17% 61% Instagram 16% 21% 63% Twitter 29% 29% 42% YouTube 17% 32% 51% Pew Research Center Find out more Follow these links for more in-depth analysis of the impact of social media on American life. 10 facts about Americans and Facebook May 16, 2019 Social media usage in the U.S. in 2019 April 10, 2019 Millennials stand out for their technology use, but older generations also embrace digital life May 2, 2018 Americans’ complicated feelings about social media in an era of privacy concerns March 27, 2018 Social Media Use in 2018 March 1, 2018 The Future of Truth and Misinformation Online Oct. 19, 2017 The Future of Free Speech, Trolls, Anonymity and Fake News Online March 29, 2017 All reports and blog posts related to social media. 1615 L St. NW, Suite 800 Washington, DC 20036 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 | Media Inquiries Research Areas U.S. Politics & Policy Journalism & Media Internet & Technology Science & Society Religion & Public Life Hispanic Trends Global Attitudes & Trends Social & Demographic Trends Methods Follow Us Email Newsletters Facebook Twitter Tumblr YouTube RSS About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of The Pew Charitable Trusts. Copyright 2020 Pew Research Center About Terms & Conditions Privacy Policy Reprints, Permissions & Use Policy Feedback Careers We need to confirm your email address To complete the subscription process, please click the link in the email we just sent you. Cancel OK www-pewresearch-org-8444 ---- Half of Americans decided not to use something over privacy concerns in past year | Pew Research Center HomeU.S. PoliticsMedia & NewsSocial TrendsReligionInternet & TechScienceHispanicsGlobalMethods Blog About Follow My Account DONATE Numbers, Facts and Trends Shaping Your World About Follow Donate HomeU.S. PoliticsMedia & NewsSocial TrendsReligionInternet & TechScienceHispanicsGlobalMethods Publications Topics Interactives Datasets Fact Tank Our Experts Main More NEWS IN THE NUMBERS April 14, 2020 Half of Americans have decided not to use a product or service because of privacy concerns By Andrew Perrin At a time when many Americans believe their personal information is less secure and are concerned with how companies and the government use their personal data, a substantial share of the public has opted out of using a product or service because of privacy concerns, according to a Pew Research Center survey conducted June 3-17, 2019. About half (52%) of U.S. adults said they decided recently not to use a product or service because they were worried about how much personal information would be collected about them. Pew Research Center has long explored the growing concerns about privacy and security of personal information. This post draws on a survey of 4,272 U.S. adults conducted June 3-17, 2019, for research about Americans’ views about privacy and surveillance by companies and the government. Everyone who took part is a member of Pew Research Center’s American Trends Panel (ATP), an online survey panel that is recruited through national, random sampling of residential addresses. This way nearly all U.S. adults have a chance of selection. The survey is weighted to be representative of the U.S. adult population by gender, race, ethnicity, partisan affiliation, education and other categories. Read more about the ATP’s methodology. Here are the questions used for this report, along with responses, and its methodology. There are some distinctions among certain Americans. For instance, people’s own experience with data breaches in the last 12 months is a factor. Those who said someone attempted to open a line of credit or apply for a loan using their name were more likely than those who did not experience this to say they decided not to use a product or service out of privacy concerns (64% vs. 51%). A similar pattern exists when comparing those who said someone took over their social media or email account without their permission and those who did not experience this (63% vs. 51%). And those who said someone put fraudulent charges on their debit card or credit card were more likely than those who did not experience this to share this concern (56% vs. 51%). Overall, adults who experienced any of these three data breaches were more likely than those who did not to avoid products or services out of privacy concerns (57% vs. 50%). There are also some differences between those with higher and lower levels of education and annual household incomes. Some 55% of college graduates and adults with some college education said they had decided not to use a product or service because of privacy concerns, compared with 45% of those with a high school education or less who said the same. And 54% of adults with an annual household income of $75,000 or more annually shared this concern, compared with 48% of those who make $30,000 or less. The survey also included a two-part open-ended question. Adults who had decided not to use a product or service out of concern for their personal information were asked to describe a recent situation where they decided not to use a product or service. They were then asked, specifically, what the product or service was, and what they found problematic. Roughly one-in-five Americans (21%) said they decided not to use particular websites. A smaller share (11%) said they decided not to use certain electronics. Similar shares said they avoided social media or specific services such as DNA ancestry kits, financial tools or health care. As far as the reasons for not using these things, the most cited concern was that they must share personal information (15%) in order to get access to the product or service. The second largest concern was that the product or service is untrustworthy (9%). A similar share (8%) cited surveillance as a concern. Smaller shares mentioned concerns such as giving payment information, potential third-party involvement and the risk of spam. Some respondents elaborated on their reasoning. For instance, a 64-year-old man said: “An email arrived with links to articles. When I clicked the link, the site asked for demographic information about me. I declined to provide the information.” Explaining her concern about electronics, a 29-year-old woman wrote, “My smart TV requested permission to collect audio data and other types of data for research. I am not comfortable with that, so I declined.” Some people said they were interested in using various services but did research that changed their minds. One 27-year-old woman said, “I recently was interested in doing a gene analysis to get a better understanding of my ancestors. After doing research I found that companies actually keep this information and use it in other situations. This deterred me from going further with their service. I honestly do not have a clear understanding of what happens with such services but that is exactly what makes me wary of using such services.” See also: Key takeaways on Americans’ views about privacy, surveillance and data-sharing Note: Here are the questions used for this report, along with responses, and its methodology. Topics Internet ActivitiesOnline Privacy and Safety Share this link: Andrew Perrin  is a research analyst focusing on internet and technology at Pew Research Center. POSTS BIO EMAIL SIGN UP FOR OUR WEEKLY NEWSLETTER MAKE A FINANCIAL CONTRIBUTION TO SUPPORT OUR WORK DONATE Related How Americans see digital privacy issues amid the COVID-19 outbreak The state of privacy in post-Snowden America Roughly six-in-ten online daters in the U.S. are concerned about data collection How Americans balance privacy concerns with sharing personal information: 5 key findings Key takeaways on Americans’ views about privacy, surveillance and data-sharing Popular on pew research So far, Trump has granted clemency less frequently than any president in modern history How people around the world see the U.S. and Donald Trump in 10 charts Quiz: Where do you fit in the political typology? In past elections, U.S. trailed most developed countries in voter turnout 5 facts about the QAnon conspiracy theories 1615 L St. NW, Suite 800 Washington, DC 20036 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 | Media Inquiries Research Areas U.S. Politics & Policy Journalism & Media Internet & Technology Science & Society Religion & Public Life Hispanic Trends Global Attitudes & Trends Social & Demographic Trends Methods Follow Us Email Newsletters Facebook Twitter Tumblr YouTube RSS About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of The Pew Charitable Trusts. Copyright 2020 Pew Research Center About Terms & Conditions Privacy Policy Reprints, Permissions & Use Policy Feedback Careers We need to confirm your email address To complete the subscription process, please click the link in the email we just sent you. Cancel OK www-statista-com-8407 ---- • Google: ad revenue 2001-2018 | Statista Try our corporate solution for free! (212) 419-8286 hadley.ward@statista.com Are you interested in testing our corporate solutions? Please do not hesitate to contact me. Hadley WardMon - Fri, 9am - 6pm (EST) (212) 419-8286hadley.ward@statista.com statista.com statista.es statista.de statista.fr Prices & Access Single Accounts Corporate Solutions Universities Statistics All Industries Consumer Goods & FMCG Internet Media & Advertising Retail & Trade Sports & Recreation Technology & Telecommunications Transportation & Logistics Travel, Tourism & Hospitality Most-viewed Statistics Recent Statistics Popular Statistics Facebook: number of monthly active users worldwide 2008-2020 Instagram accounts with the most followers worldwide 2020 Number of apps available in leading app stores 2020 Most popular global mobile messaging apps 2020 Twitter: number of monthly active users 2010-2019 Topics More Topics Mobile app usage - Statistics & Facts Internet usage in India - statistics & facts Top Study View Study Reports Report Shop Search our database Digital & Trend Reports Overview and forecasts on trending topics Industry Reports Industry insights and forecasts Brands & Company Reports Key figures and rankings about brands and companies Consumer Reports Consumer insights and preferences in various industries Politics & Society Reports Detailed information about political and social topics Country Reports All key figures about regions and countries Find your information in our database containing over 20,000 reports Outlooks Outlooks Consumer Market Outlook Everything you need to know about Consumer Goods Digital Market Outlook Identify market potentials of the digital future Mobility Market Outlook Key topics in mobility Technology Market Outlook Update Insights into the world's most important technology markets Advertising & Media Outlook New Figures and insights about the advertising and media world Industry Outlook New Everything you need to know about the industry development Country Outlook Key economic and social indicators Tools Publication Finder Find studies from all around the internet Company DB NewKey company figures at a glance Business Plan Export Data sets for your business plan Infographics Services The Statistics Portal Directly accessible data for 170 industries from 50 countries and over 1 Mio. facts. About Statista Why trust Statista First Steps and Help Centre Tools and Tutorials explained in our Media Centre Research & Analysis Customized Research & Analysis projects: Market Research & Market Data Modelling Quick Analysis with our professional Research Service: AskStatista Unique content meets Design: Whitepaper Configurator Content & Information Design Content Marketing & Information Design for your projects: Customized infographic service Presentation Design Animated videos Whitepapers, E-Books, etc. More Information eCommerceDB.com KPIs for more than 20,000 online stores Rankings by country Rankings by category Go to database Global Survey New Prices & Access Single Accounts Corporate Solutions Universities Statistics Popular Statistics Topics Markets Reports Outlooks Consumer Market Digital Market Mobility Market Country Outlook Technology Market Advertising & Media Industry Outlook Tools Publication Finder Company DB Business Plan Export Infographics Services Content & Information Design Research projects Ask Statista Global Consumer Survey DE ES FR Internet› Online Search Google: annual advertising revenue 2001-2019 Published by J. Clement, Feb 5, 2020 In 2019, Google's ad revenue amounted to almost 134.81 billion US dollars. The company generates advertising revenue through its Google Ads platform, which enables advertisers to display ads, product listings and service offerings across Google’s extensive ad network (properties, partner sites, and apps) to web users. Google advertising In 2019, advertising accounted for the majority of Google’s total revenue, which amounted to a total of 160.74 billion U.S. dollars. In the most recent fiscal period, advertising revenue through Google Sites made up 70.9 percent of the company's revenues. Google market share These revenue figures come as no surprise, as Google accounts for the majority of the online and mobile search market worldwide. As of January 2019, Google was responsible for almost 90 percent of global desktop search traffic. The company holds a market share of around 90 percent in a wide range of digital markets, having little to no domestic competition in many of them. China, Russia, and to a certain extent, Japan, are some of the few notable exceptions, where local products are more preferred. Read more Advertising revenue of Google from 2001 to 2019 (in billion U.S. dollars) Advertising revenue in billion U.S. dollars 2019 134.81 2018 116.46 2017 95.58 2016 79.38 2015 67.39 2014 59.62 2013 51.07 2012 43.69 2011 36.53 2010 28.24 2009 22.89 2008 21.13 2007 16.41 2006 10.49 2005 6.07 2004 3.14 2003 1.42 2002 0.41 2001 0.07 Loading statistic... Additional Information © Statista 2020 Show source Download for free You need to log in to download this statistic Register for free Already a member? Log in Source Show detailed source information? Register for free Already a member? Log in Sources Show sources information Show publisher information Release date February 2020 More information Region Worldwide Survey time period 2001 to 2019 Supplementary notes Values regarding 2013 and onwards have been adjusted retroactively to reflect Google segment revenue of Alphabet Inc. instead of Google's total company revenue as prior to restructuring. Figures regarding 2017 and 2018 have been restated in the 2019 Annual Report to conform with current period presentation. Alphabet Inc. is an American multinational conglomerate created in 2015 as the parent company of Google and several other companies previously owned by or tied to Google. Other statistics on the topic Google Online Video & Entertainment Most viewed YouTube videos of all time 2020 Online Search Google: global annual revenue 2002-2019 Mobile Internet & Apps Google Play: number of available apps 2009-2020 Online Search Global market share of search engines 2010-2020 J. Clement Research expert covering internet and e-commerce Get in touch with us now Profit from additional features with an Employee Account Please create an employee account to be able to mark statistics as favorites. Then you can access your favorite statistics via the star in the header. Register now Profit from additional features by authenticating your Admin account Please authenticate by going to "My account" → "Administration". Then you will be able to mark statistics as favourites and use personal statistics alerts. Authenticate Please log in to access our additional functions Register in seconds and access exclusive features. Basic Account Instant Access Single Account Our services Click the question mark for further information Free $39 per month* (billed annually)  Basic statistics  Premium statistics Graph download Download PDF Excel download Register Purchase now *Duration: 12 months, billed annually, single license Yes, let me download! ...and make my research life easier. Exclusive Corporate feature This feature is limited to our corporate solutions. Please contact us to get started with full access to dossiers, forecasts, studies and international data. Corporate Account Statista Accounts: Access All Statistics. Starting from $468 / Year Basic Account Get to know the platform You only have access to basic statistics. Single Account The ideal entry-level account for individual users Instant access to 1m statistics Download in XLS, PDF & PNG format Detailed references $59 $39 / Month * in the first 12 months Corporate Account Full access Corporate solution including all features. * Prices do not include sales tax. Statistics on "Google" The most important statistics Alphabet: global annual revenue 2011-2019 Alphabet: global annual revenue 2017-2019, by segment Google: global annual revenue 2002-2019 Google: revenue distribution 2017-2019, by segment Google: annual advertising revenue 2001-2019 Google sites: advertising revenue 2001-2019 Google network sites: advertising revenue 2001-2019 Google Cloud revenue worldwide 2017-2019 The most important statistics Market value of the largest internet companies worldwide 2019 Market capitalization of the largest U.S. internet companies 2020 Apple, Google, and Microsoft: revenue comparison 2008-2019 Most valuable brands worldwide 2019 Biggest revenue source of leading tech companies 2020 Most visited multi-platform U.S. web properties 2020 Reach of most popular U.S. smartphone apps 2020 The most important statistics Brand awareness of tech companies in the U.S. 2018 Brand empathy for Google in the U.S. 2018 Attitudes towards Google in the U.S. 2018 Products and services of tech companies in the U.S. 2018 Social responsibility of tech companies in the U.S. 2018 Innovation of tech companies in the U.S. 2018 Customer service of tech companies in the U.S. 2018 Data protection of tech companies in the U.S. 2018 The most important statistics Google: search engine market share in selected countries 2020 Global market share of search engines 2010-2020 Market share of search engines in the United States 2008-2020 U.S. search engines ranked by number of core searches 2008-2020 Mobile share of U.S. organic search engine visits 2013-2020 Mobile share of organic search engine traffic 2019, by platform U.S. total & mobile organic search visits 2020, by engine U.S. Google Search clickstream among U.S. users 2019 The most important statistics Global YouTube advertising revenues 2017-2019 YouTube: share of Google revenues 2017-2019 YouTube: global advertising revenues as of Q3 2020 Most viewed YouTube videos of all time 2020 YouTube: most viewed channels 2020 Most popular U.S. YouTube partner channels 2020, ranked by viewers YouTube: most popular brand channels 2020, by total number of video views The most important statistics Google Play Store usage in the U.S. 2018 Google Play: number of available apps as of Q3 2020 Google Play: quarterly growth of available apps as 2015-2020 Top digital publishers in the U.S. 2019, by user reach Time spent on leading mobile app publishers in the U.S. 2019 Google Play: number of available apps 2009-2020 Leading Android app reach in the United States 2019 Leading Android app categories in the United States 2019 The most important statistics Government requests for content removal from Google H1 2020 Number of infringing URLs requested to be removed from Google Search 2020 Google user data requests by U.S. federal authorities 2010-2019 Google user data requests from federal agencies and governments H2 2019, by country Google: quarterly federal lobbying expenses 2010-2020 EU Commission Google antitrust fines 2019 The most important statistics U.S. EPA Green Power Partnership: leading U.S. green power users EPA Green Power Partnership: main U.S. Fortune 500 green power users 2019 Google's GHG emissions 2011-2018 Google's carbon intensity 2011-2018 Google's energy consumption 2011-2018 Google's waste generation 2015-2018 Google's LEED-certified office space 2011-2018 Environmental friendliness of tech companies in the U.S. 2018 Further related statistics Google: U.S. revenue distribution 2015-2018, by platform Google: annual net income 2001-2015 Alphabet: revenue distribution 2015-2019, by region Alphabet: gross carrying amount of intangible assets 2007-2019 Attitudes towards Google as a brand in Germany 2013-2016 Leading non-desktop search engines ranked in Italy 2020, by market share Alphabet: number of full-time employees 2016, by department Websites hosting content requested for Google delisting in Italy 2020, by category Alphabet: ad spend in the U.S. 2012-2019 Google's non-desktop search market share in Italy 2018-2019 Search engine host market share on desktop in Luxembourg 2020 Price of selected acquisitions by Google 2017 Number of requests to Google to remove content in France 2010-2015 Search engine host market share on tablets in the Netherlands 2020 Media perception of Google in the Netherlands 2019, by characteristic Consumer trust in different types of advertising in North America 2011-2015 Preferred channel for advertising from stores/companies in Sweden 2018 Buying from brands with great advertising in European countries 2013 Italy: turnover of audio visual advertising 2013-2017 Further Content: You might find this interesting as well Statistics Google: U.S. revenue distribution 2015-2018, by platform Google: annual net income 2001-2015 Alphabet: revenue distribution 2015-2019, by region Alphabet: gross carrying amount of intangible assets 2007-2019 Attitudes towards Google as a brand in Germany 2013-2016 Leading non-desktop search engines ranked in Italy 2020, by market share Alphabet: number of full-time employees 2016, by department Websites hosting content requested for Google delisting in Italy 2020, by category Alphabet: ad spend in the U.S. 2012-2019 Google's non-desktop search market share in Italy 2018-2019 Search engine host market share on desktop in Luxembourg 2020 Price of selected acquisitions by Google 2017 Number of requests to Google to remove content in France 2010-2015 Search engine host market share on tablets in the Netherlands 2020 Media perception of Google in the Netherlands 2019, by characteristic Consumer trust in different types of advertising in North America 2011-2015 Preferred channel for advertising from stores/companies in Sweden 2018 Buying from brands with great advertising in European countries 2013 Italy: turnover of audio visual advertising 2013-2017 Topics GoogleSmartphonesInternet usage worldwideAndroidDigital Advertising Statista Accounts: Access All Statistics. Starting from $468 / Year Learn more about how Statista can support your business. Request webinar Alphabet. (February 5, 2020). Advertising revenue of Google from 2001 to 2019 (in billion U.S. dollars) [Graph]. In Statista. Retrieved November 29, 2020, from https://www.statista.com/statistics/266249/advertising-revenue-of-google/ Alphabet. "Advertising revenue of Google from 2001 to 2019 (in billion U.S. dollars)." Chart. February 5, 2020. Statista. Accessed November 29, 2020. https://www.statista.com/statistics/266249/advertising-revenue-of-google/ Alphabet. (2020). Advertising revenue of Google from 2001 to 2019 (in billion U.S. dollars). Statista. Statista Inc.. Accessed: November 29, 2020. https://www.statista.com/statistics/266249/advertising-revenue-of-google/ Alphabet. "Advertising Revenue of Google from 2001 to 2019 (in Billion U.S. Dollars)." Statista, Statista Inc., 5 Feb 2020, https://www.statista.com/statistics/266249/advertising-revenue-of-google/ Alphabet, Advertising revenue of Google from 2001 to 2019 (in billion U.S. dollars) Statista, https://www.statista.com/statistics/266249/advertising-revenue-of-google/ (last visited November 29, 2020) Home About Statista Career Contact Help & FAQ Report Bug Our Media Partners Privacy Imprint Menu Prices & Access Popular Statistics Industries Infographics Content & Design projects Research projects AskStatista statista.de statista.es statista.fr www-urbanlibraries-org-8027 ---- The Library’s Role in Bridging the Digital Divide Skip Navigation Join Member Hub Search Close About Us Resources Innovations Initiatives Events Newsroom Blog Back to Navigation The Library’s Role in Bridging the Digital Divide By Sarah Chase Webber, Senior Digital PR Coordinator, 2U, Inc. In today’s connected world, the ability to access the internet affects everything from health care to quality education to job hunting. Unfortunately, there is a gap in such access — a digital divide — that is more prevalent in particular regions and among individuals within certain demographics, such as minorities and those with low incomes. The below blog post examines the impact of the digital divide and how public libraries can work to bridge the gap to create social and racial equity for those within their communities. Libraries and the Digital Divide The term digital divide has traditionally been defined as “the gap between those with internet access and those without.” Such access is influenced by whether or not an individual possesses needed technology to get online, the ability to access an internet connection itself or a combination of both. Within these dynamics, the role of public libraries has shifted beyond the value of the print materials in their stacks to creating onramps into the digital world and supporting citizens who are stepping into it. Although the age of the internet has been upon us for many years, 23 percent of Americans still don’t have internet access at home. This is more often the case for minorities, older adults, those living in rural communities and those who have low incomes or low levels of education. Among these factors, income is the largest determinant of whether or not a person has internet access. Household Income Household Income Percent of Households with a Computer Percent of Households with an Internet Subscription Less than $25,000 67.1 51.7 $25,000-$49,999 84.3 71.7 $50,000-$99,999 93.9 86.2 $100,000-$149,999 97.6 93.3 $150,000 and more 98.4 95.6 Source: Morgridge College of Education's online Master of Library and Information Science program, “Libraries Evolve to Bridge the Digital Divide” Since income plays such a key role in access to the internet, people in lower-income communities often rely more on their libraries to meet this need. In contrast, suburban residents with higher median incomes use the library less for internet access, since they often have it at home. Though one may expect that this trend would mean that city patrons would use library computers less often, the opposite is true, likely because of a widening income disparity in some cities. Locale Locale Median Computer Users per Visit (as a percent of visitors) Median Library Visits per Capita Large City (250k +) 20.5 3.474 Medium City (100-250k) 20.0 4.097 Small City (Less than 100k) 17.3 4.316 Large Suburb (250k+) 14.4 5.567 Medium Suburb (100-250k) 15.0 4.518 Small Suburb (< 100k) 15.3 4.277 Town, Fringe 16.1 4.475 Town, Distant 19.1 4.101 Town, Remote 20.0 4.780 Rural, Fringe 13.9 4.171 Rural, Distant 18.2 4.284 Rural, Remote 21.9 5.029 Source: Morgridge College of Education's online Master of Library and Information Science program, “Libraries Evolve to Bridge the Digital Divide” Age Age is the second-most significant determinant – a higher percentage of households with younger occupants possess computers and the ability to access the internet. Age Percent of Households with a Computer Percent of Households with an Internet Subscription 15-34 94.3 81.2 35-44 94.4 84.6 45-64 89.7 80.9 65+ 70.9 63.1 Source: Morgridge College of Education's online Master of Library and Information Science program, “Libraries Evolve to Bridge the Digital Divide” Race Minority status is another factor, with the highest percentages of both computer and internet access being among non-Hispanic Asian households, and the lowest percentages being among non-Hispanic black households. Race Percent of Households with a Computer Percent of Households with an Internet Subscription White alone, non-Hispanic 88 79.9 Black alone, non-Hispanic 80.1 64.9 Asian alone, non-Hispanic 94.1 88.8 Hispanic (of any race) 84.2 70.9 Source: Morgridge College of Education's online Master of Library and Information Science program, “Libraries Evolve to Bridge the Digital Divide” Rural communities in general face challenges in obtaining high-speed internet access. Barriers include fewer providers and slower speeds; rural areas are also less likely to be wired for broadband services. According to a 2018 Pew Research survey, 24 percent of adults in rural areas say that access to high-speed internet is a major problem in their local community, and 34 percent living in these areas see it as a minor problem — totaling nearly 60 percent of rural Americans who are living with unreliable internet access. However, public libraries have adapted to society’s evolving digital needs. Mary Stansbury, PhD, associate professor at Morgridge College of Education’s online Master of Library and Information Science program from the University of Denver, says they have done so by providing digital access during the “very first years of widely geographically available internet” and making the most of an amendment to the Telecommunications Act of 1996 that allowed libraries and schools to adopt the internet at a heavily discounted rate. “Public libraries have been taking advantage of that E-rate discount for decades now,” Stansbury said. “Once that kind of funding emerged ... they received money to encourage and support deployment and internet access. Once the money was there, I think most libraries realized that [the internet] isn’t just a temporary phenomenon. It’s here to stay.” A specific example of this dynamic is taking place in Seattle, where portable hotspots are available for those who would like to sign them out — much like a library book. Some of the individuals taking advantage of this option are those living in homeless camps, where internet access can make a world of difference for tasks like finding a job, getting an education and staying connected to family. Racial and Social Equity in Libraries As noted in the Pew Research study mentioned previously, the digital divide is greater for minorities and low-income individuals — dynamics that influence racial and social equity in a variety of ways. For example, research from ACT’s Center for Equity in Learning revealed that underserved students who only have access to one electronic device in their home, which is often only a cell phone, may have more difficulty completing schoolwork than peers who have access to their own devices. Among students who have access to only one device at home, researchers noted that 85 percent were classified as underserved (low income, first generation in college or minority) and that American Indian/Alaskan, African-American and Hispanic/Latino students had the least amount of access, while white and Asian students had the highest. The impact is even greater in homes with no internet access, since students who are required to complete schoolwork online must find a place to do it — creating a digital divide referred to by some as the “the homework gap.” While equity and equality may sound the same, they differ in that “equality is the idea that everyone is at the same level of opportunity, access and justice, whereas equity adds the idea of fairness to level the playing field.” Racial and social equity is essential within communities so that everyone is provided with the same opportunities to succeed — and libraries are instrumental in making this happen. As the Racial Equality Alliance notes, “public libraries aim to create welcome and inclusive spaces, to advocate for equitable access to information, to foster civic participation and economic opportunity, and to ensure literacy and lifelong learning. At the heart of these goals is a shared aspiration that every person might have all they need to succeed. This is what equity means.” Libraries can focus on promoting racial and social equity by learning from their communities and listening to their patrons, especially those who are from different racial and ethnic groups. Examples of libraries creating inclusive spaces include the following: Hennepin County (Minnesota) Library: Following the shooting of Philando Castile in Falcon Heights, the library remained open and invited the community to reserve space to meet and compiled a #BlackLivesMatter Reads for Teens reading list of books to support discussions about race, privilege and justice. Dallas Public Library: Following the July 7 police shooting, the library offered counseling services and offered a toll-free counseling hotline. The San Francisco Unified School District Library: In the wake of incidents in Missouri and New York, a group of teacher librarians developed a guide for teaching the #BlackLivesMatter movement. It includes lesson plans, readings, poetry and official case documents as well as background information. These are just a few of the creative ways that libraries are advancing their race and social equity work to better support their communities. Here are three specific actions that your organization can take: 1) Assess and respond to the needs of your community through meaningful conversation. Thrive Washington suggests the following approach to make a difference in advancing racial equity: Be curious about your community and work to understand your role in it. Slow down to create space for conversation. Ask powerful questions that generate curiosity and invite creativity. Think about who is not at the table and how to get them there … or how to be invited to their table. Consider different partners for your work. Reflect back what you’ve heard and communicate how you will respond. 2) Optimize funding opportunities to support your efforts — for example, make the most of E-rate discounts to support internet access. 3) Think outside the box to create effective solutions that are informed by those in need, such as offering Wi-Fi hotspots that library patrons can sign out. As libraries understand the needs of their communities, make the most of resources at their disposal and embrace a vision of what’s possible, they will continue to help bridge the gap across the digital divide. Sarah Chase Webber is a senior digital PR coordinator for 2U, Inc. Sarah Chase supports community outreach for 2U's education and library science programs. Additional Information Published: March 28, 2019 Category Digital Inclusion , Race and Social Equity Tags Race and Social Equity , Digital Inclusion Categories AI and Digital Citizenship Climate Change COVID-19 Digital Inclusion Education Entrepreneurship E-rate Healthy, Sustainable Communities Innovations Interviews Race and Social Equity STEM ULC Forum 2019 ULC General Updates Search Contact Us Email: info@urbanlibraries.org Phone: 202-750-8650 1333 H Street NW, Suite 1000 West, Washington, DC 20005 Subscribe to Newsletter Follow Us Facebook Twitter Instagram LinkedIn Privacy Policy ©2020 Urban Libraries Council www-pewresearch-org-2752 ---- FOR RELEASE NOV. 15, 2019 BY Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar and Erica Turner FOR MEDIA OR OTHER INQUIRIES: Lee Rainie, Director, Internet and Technology Research Monica Anderson, Associate Director Shawnee Cohn, Communications Manager 202.419.4372 www.pewresearch.org RECOMMENDED CITATION Pew Research Center, November 2019, “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” 1 PEW RESEARCH CENTER www.pewresearch.org About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. It conducts public opinion polling, demographic research, content analysis and other data-driven social science research. The Center studies U.S. politics and policy; journalism and media; internet, science and technology; religion and public life; Hispanic trends; global attitudes and trends; and U.S. social and demographic trends. All of the Center’s reports are available at www.pewresearch.org. Pew Research Center is a subsidiary of The Pew Charitable Trusts, its primary funder. © Pew Research Center, 2019 2 PEW RESEARCH CENTER www.pewresearch.org Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information A majority of Americans believe their online and offline activities are being tracked and monitored by companies and the government with some regularity. It is such a common condition of modern life that roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government. Data-driven products and services are often marketed with the potential to save users time and money or even lead to better health and well-being. Still, large shares of U.S. adults are not convinced they benefit from this system of widespread data gathering. Some 81% of the public say that the potential risks they face because of data collection by companies outweigh the benefits, and 66% say the same about government data collection. At the same time, a majority of Americans report being concerned about the way their data is being used by companies (79%) or the government (64%). Most also feel they have little or no control over how these entities use their personal information, according to a new survey of U.S. adults by Pew Research Center that explores how Americans feel about the state of privacy in the nation. Roughly six-in-ten Americans believe it is not possible to go through daily life without having their data collected % of U.S. adults who say … Note: Respondents were randomly assigned to answer a question about whether they think it is possible to go about daily life without having personal information collected from them by “companies” or “the government.” Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER https://www.techradar.com/news/are-fitness-trackers-the-future-of-healthcare 3 PEW RESEARCH CENTER www.pewresearch.org What personal data does government collect and access? Several of the queries of this survey focus on public perceptions of what “the government” does related to personal data. For instance, respondents were asked: “As far as you know, how much of what you do online or on your cellphone is being tracked by the government?” Related questions focused on people’s attitudes about the data the government collects about them. It is difficult to determine how much personal data the government collects and otherwise can access through private company records. Administrative government agencies like the IRS, Census Bureau, Postal Service and social welfare departments gather various personal details about people. That includes their tax- and employment-related information, physical attributes if they get a government ID, financial circumstances if they get benefits from social, housing and employment training programs, health information if they participate in government health-insurance programs, addresses, household composition, property ownership if they own houses or cars and educational details if they get student loan or grant, for example. This list is not exhaustive. Beyond that, national security organizations like the National Security Agency have authority to monitor phone traffic and people’s movements. With subpoenas or court orders and warrants, law enforcement organizations can typically access and monitor people’s phone and traffic records, health records (including genetic records), online and app browsing, search queries, texts and emails. Users’ social media activities and their tech-based social networks are at least at times examined in investigations, according to “transparency reports” released by the companies. It is important to note, that there are often limitations on the ways government agencies can share what they know with others, including those in other parts of the government. https://www.propublica.org/article/nsa-data-collection-faq https://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2016 https://www.washingtonpost.com/world/national-security/how-the-nsa-is-tracking-people-right-now/2013/12/04/45bf5d20-5d04-11e3-be07-006c776266ed_print.html https://www.americanbar.org/groups/criminal_justice/standards/law_enforcement_access/ https://www.americanbar.org/groups/criminal_justice/standards/law_enforcement_access/ https://www.nap.edu/read/11896/chapter/11#254 https://www.eff.org/issues/law-enforcement-access https://customercare.23andme.com/hc/en-us/articles/212271048-How-23andMe-responds-to-law-enforcement-requests-for-customer-information https://www.propublica.org/article/no-warrant-no-problem-how-the-government-can-still-get-your-digital-data https://www.nextadvisor.com/law-enforcement-social-media-and-your-privacy-how-your-data-is-used-to-solve-crimes/ https://govtrequests.facebook.com/ https://transparency.twitter.com/en.html https://fas.org/sgp/crs/misc/R45631.pdf https://iclg.com/practice-areas/data-protection-laws-and-regulations/usa https://iclg.com/practice-areas/data-protection-laws-and-regulations/usa 4 PEW RESEARCH CENTER www.pewresearch.org Americans’ concerns about digital privacy extend to those who collect, store and use their personal information. Additionally, majorities of the public are not confident that corporations are good stewards of the data they collect. For example, 79% of Americans say they are not too or not at all confident that companies will admit mistakes and take responsibility if they misuse or compromise personal information, and 69% report having this same lack of confidence that firms will use their personal information in ways they will be comfortable with. There is also a collective sentiment that data security is more elusive today than in the past. When asked whether they think their personal data is less secure, more secure or about the same as it was five years ago, 70% of adults say their personal data is less secure. Only 6% report that they believe their data is more secure today than it was in the past. CORRECTION: In the chart, “Majority of Americans feel as if they have little control over data collected about them by companies and the government,” the explanatory text for the findings related to “Risks outweigh benefits” was transcribed incorrectly. The correct text is, “Potential risks of ___ (companies or the government) collecting data about them outweigh the benefits.” Majority of Americans feel as if they have little control over data collected about them by companies and the government % of U.S. adults who say … Note: Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 5 PEW RESEARCH CENTER www.pewresearch.org But even as the public expresses worry about various aspects of their digital privacy, many Americans acknowledge that they are not always diligent about paying attention to the privacy policies and terms of service they regularly encounter. Fully 97% of Americans say they are ever asked to approve privacy policies, yet only about one-in-five adults overall say they always (9%) or often (13%) read a company’s privacy policy before agreeing to it. Some 38% of all adults maintain they sometimes read such policies, but 36% say they never read a company’s privacy policy before agreeing to it. About eight-in-ten Americans say they are asked to agree to a privacy policy at least monthly, including one-quarter who say this happens almost every day % of U.S. adults who say they are asked to agree to the terms and conditions of a company’s privacy policy … Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Moreover, the practice of reading privacy policies doesn’t necessarily guarantee thoroughness. Among adults who say they ever read privacy policies before agreeing to their terms and conditions, only a minority – 22% – say they read them all the way through before agreeing to their terms and conditions. There is also a general lack of understanding about data privacy laws among the general public: 63% of Americans say they understand very little or nothing at all about the laws and regulations that are currently in place to protect their data privacy. These findings point to an overall wariness about the state of privacy these days, but there are some circumstances where the public sees value in this type of data-driven environment. For example, pluralities of adults say it is acceptable for poorly performing schools to share data about their students with a nonprofit group seeking to help improve educational outcomes or for the 25 32 24 15 3 Almost daily About once a week About once a month Less frequently Never 6 PEW RESEARCH CENTER www.pewresearch.org government to collect data about all Americans to assess who might be a potential terrorist. These findings come from a survey of 4,272 U.S. adults conducted on Pew Research Center’s American Trends Panel between June 3-17, 2019. Here are some of the key takeaways: Prevalence of tracking: 72% of Americans report feeling that all, almost all or most of what they do online or while using their cellphone is being tracked by advertisers, technology firms or other companies. Another 19% think some of what they do is being tracked. Close to half (47%) of adults believe at least most of their online activities are being tracked by the government. When it comes to their offline behavior such as where they are or whom they talk with, 69% believe companies are tracking at least some of that activity. And 56% of Americans think the government is tracking at least some of their activities, like who they are talking to or their whereabouts. Not feeling in control of personal data: Roughly eight-in-ten or more U.S. adults say they have very little or no control over the data that government (84%) or companies (81%) collect about them. When it comes to different kinds of information, the picture varies by the specific type. While relatively few Americans feel as if they have a lot of control over who has access to everything from About half of Americans feel as if they have no control over who can access their online searches % who say they feel __ control over who can access the following types of their information * Based on social media users. ** Based on internet users. Note: Respondents were randomly assigned questions about how much control they feel they have over who can access different types of their information. Those who did not give an answer are not shown. Source: Survey of U.S. adults conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 18 16 13 12 10 9 54 50 49 43 44 39 28 35 37 45 41 48 A lot A little No Their physical location Private conversations online, text messaging Their posts, activities on social media* Websites they visit** Purchases made online, in person Search terms they use online** https://www.pewresearch.org/methods/u-s-survey-research/american-trends-panel/ 7 PEW RESEARCH CENTER www.pewresearch.org their physical location to their social media posts, there are experiences in which some Americans especially feel a lack of control. Roughly half of Americans (48%) say they feel as if they have no control over who can access the search terms they use, and 41% say the same about the websites they visit. By comparison, a smaller share of the public feels as if they do not have control over who can access their physical location. Risks vs. rewards of data collection and profiling: 81% of Americans think the potential risks of data collection by companies about them outweigh the benefits, and 66% say the same about government data collection about them. Relatedly, 72% of adults say they personally benefit very little or none from company data collection about them, and 76% say this about the benefits they might get from government data collection. One aim of the data collection done by companies is for the purpose of profiling customers and potentially targeting the sale of goods and services to them based on their traits and habits. This survey finds that 77% of Americans say they have heard or read at least a bit about how companies and other organizations use personal data to offer targeted advertisements or special deals, or to assess how risky people might be as customers. About 64% of all adults say they have seen ads or solicitations based on their personal data. And 61% of those who have seen ads based on their personal data say the ads accurately reflect their interests and characteristics at least somewhat well. (That amounts to 39% of all adults.) Data collection and sharing for specific purposes: Despite their broad concerns about data collection and use by companies and the government, pluralities of U.S. adults say it is acceptable for data to be used in some ways. For instance, by a 49%-27% margin, more Americans find it acceptable than unacceptable for poorly performing schools to share data about their students with a nonprofit group seeking to help improve educational outcomes. Similarly, 49% say it is acceptable for government to collect data about all Americans to assess who might be a potential terrorist threat. That compares with 31% who feel it is unacceptable to collect data from all Americans for that purpose. On the other hand, more find it unacceptable than acceptable for social media companies to monitor users’ posts for signs of depression so they can identify people who are at risk of self-harm and connect them to counseling services (45% vs. 27%). The same pattern arises when it comes to companies that make smart speakers sharing audio recordings of customers with law enforcement to help with criminal investigations: 49% say this it is unacceptable, while 25% find it acceptable. https://www.businessnewsdaily.com/10625-businesses-collecting-data.html 8 PEW RESEARCH CENTER www.pewresearch.org The public is more evenly divided when it comes to the acceptability of fitness tracking app makers sharing user data with medical researchers to better understand the link between exercise and heart disease. Americans are more accepting of using personal data to help improve schools or assess potential terrorist threats, but are more wary of some other data uses % of U.S. adults who say the following uses of data or personal information are … Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Concern about how data is used: 79% of adults assert they are very or somewhat concerned about how companies are using the data they collect about them, while 64% say they have the same level of concern about government data collection. Separately, Americans have mixed views about which groups concern them in getting access to their data: About four-in-ten are concerned a lot about the personal information social media sites (40%) or advertisers might know about them (39%). But only 9% of Americans worry a lot about the information family and friends might know and 19% have similar concerns about what their employers might know. 24 19 18 22 27 25 Not sure 27 31 33 35 45 49 49 49 48 41 27 25 AcceptableNot acceptable Poorly performing schools sharing student data with a nonprofit seeking to improve educational outcomes DNA testing companies sharing customers’ genetic data with law enforcement to help solve crimes Fitness tracking app makers sharing user data with medical researchers to better understand the link between exercise and heart disease Social media companies monitoring users' posts for signs of depression to identify users at risk for self- harm and connect them to counselors Smart speaker makers sharing users' audio recordings with law enforcement to help with criminal investigations The government collecting data about all Americans to assess potential terrorist threats 9 PEW RESEARCH CENTER www.pewresearch.org Still, the majority of Americans are not confident about the way companies will behave when it comes to using and protecting their personal data. Roughly seven-in-ten or more say they are not too or not at all confident that companies will admit mistakes and take responsibility when they misuse or compromise data (79%), will be held accountable by government if they misuse data (75%), or will use customers’ data in ways that people would feel comfortable with (69%). Most Americans are not confident that companies would publicly admit to misusing consumers’ data % of U.S. adults who say they are __ confident that companies will ... Note: Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER When it comes to data use for specific purposes, Americans have varying views depending on the purpose for the data use. For example, 57% of adults say they are very or somewhat comfortable with companies using their personal data to help companies improve their fraud prevention systems. But they are evenly split when the issue is their comfort with companies using their personal data in developing new products. About a third (36%) of adults say they are at least somewhat comfortable with companies sharing their personal data with outside groups doing research that might help them improve society, but a larger share (64%) say they would be uncomfortable with this practice. 46 43 47 41 32 32 22 24 Not too Not at all Publicly admit mistakes and take responsbility when they misuse users' data Be held accountable by govt if they misuse users' data Use users' personal information in ways they feel comfortable with Promptly notify users if their personal data has been misused or compromised 79 75 69 65 NET Not confident 10 PEW RESEARCH CENTER www.pewresearch.org Lack of understanding: 78% of U.S. adults say they understand very little or nothing about what the government does with the data it collects, and 59% say the same about the data companies collect. Only 6% of adults say they understand a great deal what companies do with the data collected, and a similar share (4%) say they know a great deal about what the government does with the data. Some Americans also admit they struggle to understand the privacy laws that govern use of their data. Roughly six-in-ten Americans (63%) say they have very little or no understanding of the laws and regulations that are currently in place to protect their privacy. Only 3% of adults say they understand these laws a great deal, and 33% say they have some understanding. How Americans handle privacy policies: Core parts of the current system of data collection and privacy protection are built on the idea that consumers are given notice about how firms collect and use data and ask for their consent to having their data used that way. Fully 97% say they are ever asked to approve privacy policies, yet only one-in-five of adults overall say they always (9%) or often (13%) read these policies. Some 38% of U.S. adults maintain they sometimes read such policies, and 36% say they never read a company’s privacy policy before agreeing to it. In all, about four-in-ten adults say they understand privacy policies great deal (8%) or some (33%). In addition to the concerns cited above about how companies handle personal data, a majority of Americans (57%) say they are not too confident (40%) or not at all confident (17%) companies follow what their privacy policies say they will do with users’ personal data. Several other key findings in the survey: ▪ Roughly three-in-ten Americans (28%) say they have suffered at least one of three kinds of major identity theft problems in the previous 12 months at the time of the survey: 21% have had someone put fraudulent charges on their credit or debit card; 8% have had someone take over their social media or email accounts without their permission; and 6% have had someone try to open a credit line or get a loan using their name. ▪ A majority of U.S. adults (57%) say they follow privacy news very closely (11%) or somewhat closely (46%). There are some differences by age on some privacy issues: People in different age groups have varying views on some key privacy and surveillance issues. Americans ages 65 and older are less likely than those ages 18 to 29 to feel they have control over who can access things like their physical location, purchases made both online and offline and their private conversations. At the same time, older Americans are less likely to think they benefit from data collection: Just 17% of http://cyberlawmonitor.com/2019/02/13/is-it-time-to-rethink-notice-and-choice-as-a-fair-information-privacy-practice/ 11 PEW RESEARCH CENTER www.pewresearch.org those 65 and older believing they benefit from the data government collects about them, and only 19% think the same about data collected by companies. There are also age differences on the issue of how data gets used once obtained. Americans ages 65 and older are more likely than younger adults to say it is acceptable for law enforcement to use customers’ genetic data to help solve crimes, approve data collection to assess terrorist threats, and have smart speaker makers share users’ audio recordings in investigations. By contrast, young adults ages 18 to 29 are more likely than older adults to find acceptable the idea that social media companies monitor users for signs of depression and to allow fitness tracking user data to be shared with medical researchers. In addition, two-thirds of adults ages 65 and older say they follow privacy news at least somewhat closely, compared with just 45% of those 18 to 29 who do the same. There are differences by race and ethnicity on some privacy issues: Black Americans are more likely than white Americans to say they believe the government is tracking all or most of what they do online or on their cellphone (60% vs. 43%). Similar gaps are present in views about offline activities: 47% of black adults think all or most of their offline activities are tracked by the government, compared with just 19% of white adults. In addition, black and Hispanic adults are more likely than white adults to say they are concerned to some degree about what law enforcement officials, employers and family and friends know about them. When it comes to identity-theft issues, black adults (20%) are roughly three times as likely as their Hispanic (7%) or white counterparts (6%) to say someone has taken over their social media or email account in the past year. Black Americans are also more likely than white and Hispanic adults to say someone attempted to open a line of credit or applied for a loan using their name in the past 12 months. At the same time, white adults also report feeling less control across several information types when compared with black and Hispanic adults. For example, 50% of white Americans feel they have control over who can access information about their on- and offline purchases, compared with 69% of black adults and 66% of Hispanic adults. 12 PEW RESEARCH CENTER www.pewresearch.org 1. How Americans think about privacy and the vulnerability of their personal data Americans have had a variety of ways of thinking about privacy over the centuries. Though the word “privacy” is not used in the Constitution, the idea that citizens are “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures” is enshrined in the Fourth Amendment. Before he was a Supreme Court justice, Louis Brandeis proclaimed in a 1890 Harvard Law Review article that Americans enjoyed a “right to privacy,” which he argued was the “right to be let alone.” In a landmark birth control case in 1965, the Supreme Court embraced the Brandeis view, ruling that the right to privacy can be inferred from the First, Third, Fourth, Fifth and 14th Amendments. More modern concepts have focused on Americans’ views that they ought to be able to control their identity and their personal information. This new survey asked Americans for their own definitions of the words “privacy” and “digital privacy.” Their written answers were coded into broad categories, and they reveal that across both questions, participants most often mention their concerns about the role other people and organizations can play in learning about them, their desire to shield their personal activities and possessions, and their interest in controlling who is given access to their personal information. By comparison, fewer participants mention third parties and the selling of their information, tracking or monitoring, crime and other threats of illicit activity, or interference from the government. In their words: What does privacy mean to you? % of U.S. adults who mention the following themes when asked “what does privacy mean to you?” Other people and organizations not being able to access their possessions or private life 28% Control over information, possessions, self; deciding what’s accessible to others 26 Themselves, their personal information and possessions, the desire to keep things to themselves 15 Having their information sold, third party involvement 4 General security references, i.e. “secure,” “guarded,” “protective” 3 Tracking, surveillance, monitoring, spying 2 Privacy is a myth/means nothing/doesn’t exist 2 Crime, hacking, fraud, any threats of illicit activity 2 Threat from the government regarding themselves, possessions or private life 2 Personal information is only accessible with the person’s knowledge or consent 1 Spam, unwanted calls or solicitations <1 Other 4 Did not answer 17 Note: Verbatim responses have been coded into categories. Results may add to more than 100% because each response could have up to three codes. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm https://legal-dictionary.thefreedictionary.com/privacy https://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/ 13 PEW RESEARCH CENTER www.pewresearch.org When asked what privacy means to them, 28% of respondents mention other people or organizations. These quotes are illustrative: “Keeping my personal information out of the hands of the big data companies.” – Man, 34 “My personal information is secure. No one knows my credit card numbers, address info, where I have been, my banking info, my health info, etc. People don’t know anything about me I do not intend to share.” – Woman, 51 Around one-quarter (26%) mention control or their ability to decide what aspects of their lives are accessible to others: “I have control of all my personal and financial information, no one else can access without my permission.” – Man, 50 “Personal privacy means everything about me personally is private unless I personally opt-in to allow it to be public. Opt-in means not by default or convoluted user agreement that circumvents the purpose of privacy laws.” – Man, 57 Another 15% of respondents focus on themselves and their personal possessions, without referring to outside organizations or people. “Privacy is being able to feel like your personal information is safe.” – Woman, 18 “That I am in complete control of my personal information.” – Woman, 29 When asked about “digital privacy,” respondents again focused on similar topics as when they were asked about “privacy:” control, the role of other people and organizations, and themselves and their personal possessions. Some 17% mention only themselves and the protection of their own personal information, making no reference to other people or organizations: “Personal information such as [Social Security numbers], banking information, medical records remain private and secure.” – Man, 59 “I should be able to surf the web and do it anonymously.” – Woman, 55 14 PEW RESEARCH CENTER www.pewresearch.org And 14% of respondents mention control and the desire to decide which aspects of their lives are accessible to others: “Digital privacy would mean that you could use digital technology without the fear of your information or messages being vulnerable to someone gaining access to it that was not your intended receiver.” – Woman, 72 “Having control and ownership of my online data. Have control and the ability to delete information I have not explicitly given the right to use or disseminate.” – Man, 60 Another 13% mention the role other people or organizations play in their digital privacy: “Security and lack of ability to easily find information put into the digital world like on the internet (passwords, ability to find social media posts), via phone/tablet, etc.” – Woman, 34 “Activity/data about me and from my interactions with websites and digital services being unavailable to other people.” – Man, 22 A smaller share of respondents (9%) believe that “digital privacy” is a myth and doesn’t actually exist: “Digital privacy does not exist, in my opinion. Once one puts something on a computer that is connected to the internet, privacy is compromised and no longer ‘private.’” – Woman, 75 In their words: What does digital privacy mean to you? % of U.S. adults who mention the following themes when asked “What does digital privacy mean to you?” Themselves, their personal information and possessions, the desire to keep things to themselves 17% Control over information, possessions, self; deciding what aspects of their lives are accessible to others 14 Other people and organizations not being able to access their possessions or private life 13 Privacy is a myth/means nothing/doesn’t exist 9 Having their information sold, third party involvement 6 Crime, hacking, fraud, any threats of illicit activity 5 General security references, i.e. “secure,” “guarded,” “protective” 4 Tracking, surveillance, monitoring, spying 3 Company measures, how websites/companies should secure data, terms of service, privacy settings 2 Personal information is only accessible with the person’s knowledge or consent 2 Threat from the government regarding themselves, possessions or private life 1 Other 4 Did not answer 31 Note: Verbatim responses have been coded into categories. Results may add to more than 100% because each response could have up to three codes. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 15 PEW RESEARCH CENTER www.pewresearch.org “Nothing.... No matter what type of security you think you have, any hacker that wants in will get in. Just a matter of time in my opinion.” – Man, 49 Many of respondents’ written answers about their definitions of “digital privacy” repeated thoughts that were in answers about “privacy.” At the same time, words like “social media,” “online,” “internet” and “data” were more common when respondents described “digital privacy.” Large data breaches have become a regular feature of modern life – affecting companies like Capital One, Facebook, Equifax and Uber. To that end, Pew Research Center surveyed Americans about how they feel about their own personal data. This survey finds that seven-in-ten Americans feel their personal information is less secure than it was five years ago, only 6% say their information is more secure, and about a quarter (24%) feel the situation has not changed. Seven-in-ten Americans say their personal information is less secure than it was five years ago % of U.S. adults who say they feel as if their personal information is __ than it was five years ago Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 6 24 70 About the same Less secure More secure https://www.wsj.com/articles/capital-one-reports-data-breach-11564443355 https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloud-server/ https://www.forbes.com/sites/leemathews/2017/09/07/equifax-data-breach-impacts-143-million-americans/#3b6fbef8356f https://www.nytimes.com/2017/11/21/technology/uber-hack.html 16 PEW RESEARCH CENTER www.pewresearch.org Majorities across demographic groups believe their personal data is less secure than it was in the past, but some groups are more likely to feel this than others. Those with higher levels of educational attainment are more likely to believe things are worse. Fully 78% of those with a bachelor’s or advanced degree say their personal information is less secure, compared with 64% of those with a high school education or less. Those over age 50 are also more likely to think their data is less secure, compared with those ages 18 to 49. Majorities of Americans think their personal information is less secure today than in the past % of U.S. adults who say they feel as if their personal information is less secure than it was five years ago Note: Whites and blacks include only non-Hispanics. Hispanics are of any race. Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 70 70 70 73 61 65 67 73 64 69 78 62 70 75 U.S. adults Men Women White Black Hispanic 18-49 50+ HS or less Some college College+ Less than $30,000 $30,000-$74,999 $75,000+ 17 PEW RESEARCH CENTER www.pewresearch.org In the midst of this concern, how much attention are Americans paying to privacy issues? Some 57% of Americans say they follow news about privacy very (11%) or somewhat (46%) closely, while 43% say they don’t follow it too closely, or at all. Two-thirds of adults ages 65 and older say they follow privacy news at least somewhat closely, compared with just 45% of those 18 to 29 who do the same. Those living in households earning $75,000 or more a year are also more likely to follow privacy news at the same rate – with 60% saying they do so – compared with 53% of those with a household income less than $30,000 saying the same. About six-in-ten Americans say they follow privacy news at least somewhat closely % of U.S. adults who say they follow privacy news __ closely Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Older adults are more likely than younger adults to say they pay attention to privacy-related news % of U.S. adults who say they follow privacy news very or somewhat closely Note: Whites and blacks include only non-Hispanics. Hispanics are of any race. Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 11 46 33 10 Very Somewhat Not too Not at all 57 60 54 58 55 53 45 53 63 66 53 57 60 53 56 60 U.S. adults Men Women White Black Hispanic 18-29 30-49 50-64 65+ HS or less Some college College+ Less than $30,000 $30,000-$74,000 $75,000+ 18 PEW RESEARCH CENTER www.pewresearch.org There is little difference, however, between those who follow news about privacy issues and those who do not when it comes to expressing concern about the way things are trending. Some 74% of those who follow privacy news at least somewhat closely believe their data is less secure than it was five years ago and 64% of those who do not follow privacy news too closely also feel the same way. When asked about three different types of data breaches or identity theft, 28% of Americans say they have experienced at least one of them in the past 12 months. About one-in-five adults (21%) say someone has put fraudulent charges on their debit or credit card in the past year, while smaller shares say someone has taken over their social media or email account without their permission, or attempted to open a line of credit or apply for a loan using their name. 21% of Americans have had fraudulent charges on their debit or credit cards in the past year % of U.S. adults who say that someone has done the following to them in the last 12 months Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 21 8 6 28 Put fraudulent charges on their debit/credit card Took over their social media or email accounts without their permission Attempted to open a line of credit or apply for a loan using their name Experienced any of the above in the past year 19 PEW RESEARCH CENTER www.pewresearch.org Black adults (20%) are roughly three times as likely as their Hispanic (7%) or white counterparts (6%) to say someone has taken over their social media or email account in the past year. Black Americans are also more likely to say someone attempted to open a line of credit or applied for a loan using their name in the past 12 months, compared with smaller shares of white and Hispanic adults who say the same. Black Americans are more likely to experience social media, email breaches % of U.S. adults, by race and ethnicity, who say that someone has done the following to them in the last 12 months Note: Whites and blacks include only non-Hispanics. Hispanics are of any race. Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Little Control Over Their Personal Information” PEW RESEARCH CENTER 7 7 20 12 6 4 0 5 10 15 20 25 Took over their social media or email account without their permission Attempted to open a line of credit or apply for a loan using their name White Hispanic Black 20 PEW RESEARCH CENTER www.pewresearch.org 2. Americans concerned, feel lack of control over personal data collected by both companies and the government Americans leave traces of their activities, preferences and personal information in many places, both online and off. And this personal data can be fodder for both companies and the government alike. This chapter explores the public’s own experiences and attitudes about their personal data and finds that large shares are worried about the amount of information that entities, like social media companies or advertisers, have about them. At the same time, Americans feel as if they have little to no control over what information is being gathered and are not sold on the benefits that this type of data collection brings to their life. Majority of Americans are concerned about how their personal data is being used by companies and the government % of U.S adults who say they are __ concerned about how data collected about them is used by … Note: Respondents were randomly assigned to answer a question about how concerned they are about how data collected about them is used by “companies” or “the government.” Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER More than eight-in-ten Americans are concerned about the amount of personal information social media sites and advertisers know about them % who say they are concerned a lot or a little about how much personal information __ might know about them * Based on social media users. ** Based on those who are employed. Note: Respondents were randomly assigned questions about how concerned they are about how much information different groups have about them. Those who did not give an answer or who gave other responses are not shown. Source: Survey of U.S. adults conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 40 39 30 26 19 9 46 44 50 36 39 34 A lot A little Advertisers The companies they buy things from Law enforcement Their employer** Their friends and family The social media sites they use* NET 85 84 80 61 58 43 36 25 43 39 17 26 4 10 Companies Government Very Somewhat Not too Not at all https://www.forbes.com/sites/nicolemartin1/2019/08/07/how-much-data-is-collected-every-minute-of-the-day/#2d008c893d66 21 PEW RESEARCH CENTER www.pewresearch.org There is widespread concern among the general public about how companies – and the government – are using their personal data. Fully 79% of adults say they are at least somewhat concerned about how companies are using the data it collects about them, including 36% who say they are very concerned about this issue. At the same time, 64% of Americans report they feel very or somewhat concerned about how the government is using the data it collects about them. But even as the public has general concerns about data collection, Americans are more wary of certain groups having access to their data than others. At least eight-in-ten adults say they are at least a little concerned about how much personal information social media sites (85%), advertisers (84%), or companies they buy things from (80%) might know about them. The level of concern is felt most acutely when asked about social media sites or advertisers: About four-in-ten Americans say they have a lot of concern about how much personal information these respective groups have about them. Smaller shares – though still a majority – of the public say they are concerned about how much information law enforcement (61%) or their employer (58%) know about them. And 43% of Americans feel this way about their friends and family. There are some worries that are prevalent among black Americans. For example, black adults are far more likely than their white counterparts to say they are at least a little concerned about the information that their friends or family (61% vs. 35%), employer (71% vs. 51%) or law enforcement (73% vs. 56%) know about them. Black and Hispanic Americans are more likely to be concerned about what law enforcement may know about them % of U.S. adults who say they are concerned a lot or a little about how much information the following groups may know about them Note: Whites and blacks include only non-Hispanics. Hispanics are of any race. Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 22 PEW RESEARCH CENTER www.pewresearch.org The broader conversation of data collection often centers around an individual’s ability to safeguard and manage who gets access to their personal information, as well as how certain groups use it. This survey – along with previous Center surveys – finds that relatively few Americans feel as if they are in control of the information that is gathered about them. Only 19% of adults say they have a great deal or some control over the data that companies collect about them. And 16% express similar sentiments when asked about the personal data that the government gathers. Put another way, eight-in-ten Americans say they have very little or no control over the data collected about them by the government (84%) or by companies (81%). Majority of Americans say they have little to no control over the data that companies or the government collect about them % of U.S. adults who say they have __ control over data collected about them by … Note: Respondents were randomly assigned to answer a question about how much control they feel they have over data collected about them by “companies” or “the government.” Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 3 4 15 12 51 41 30 43 Companies Government A great deal Some Very little No https://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/ 23 PEW RESEARCH CENTER www.pewresearch.org Only small shares of Americans feel as if they have a lot of control over who can access their personal information or data. Indeed, only about one- in-five or fewer believe they have a lot of control over any of the six forms of personal information measured in this survey. At the same time, there are some types of information over which notable shares feel as if they have no control. For example, roughly half of Americans (48%) say they feel they have no control over who can access their online search terms. About half of Americans feel as if they have no control over who can access their online search terms % who say they feel __ control over who can access the following types of their information * Based on social media users. ** Based on internet users. Note: Respondents were randomly assigned questions about how much control they feel they have over who can access different types of their information. Those who did not give an answer are not shown. Source: Survey of U.S. adults conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 18 16 13 12 10 9 54 50 49 43 44 39 28 35 37 45 41 48 A lot A little No Their physical location Private conversations online, text messaging Their posts, activities on social media* Websites they visit** Purchases made online, in person Search terms they use online** 24 PEW RESEARCH CENTER www.pewresearch.org Older Americans feel less control across all six information types when compared with younger groups. When considering how much control they have over who has access to the websites they visit, 37% of Americans ages 65 and older say they have a lot or a little control, compared with 67% of those 18 to 29. Adults 65 and older are also less likely than adults under 30 to say they have control over who knows their physical location or has access to their private online or text conversations, for example. White adults also report feeling less control across all information types when compared with black and Hispanic adults. For example, only 50% of white Americans feel control over who can access information about their on- and offline purchases, compared with 69% of black adults and 66% of Hispanic adults who agree. Older and younger adults differ on how much control they have over who can access their personal information % who say they have a lot or a little control over who can access the following types of information * Based on social media users. ** Based on internet users. Note: Respondents were randomly assigned questions about how much control they feel they have over who can access different types of their information. Those who did not give an answer or who gave other responses are not shown. Source: Survey of U.S. adults conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 37 60 37 52 44 56 67 83 59 73 64 74 0 20 40 60 80 100 Their physical location Private conversations online, text messaging Websites they visit** Search terms they use online** Their posts, activities on social media* 30 21 18 23 Youngest to oldest DIFF 20 Purchases made online, in person 22 65+ 50-64 30-49 18-29 25 PEW RESEARCH CENTER www.pewresearch.org A majority of Americans (72%) believe all or most of what they do online or on their cellphone is being tracked by companies, but far fewer (31%) think all or most of their offline activities, like where they go or who they talk to, are being tracked by the same entities. Americans are less likely to think the government is tracking them, both online and off: 47% believe all or most of their online and cellphone activities are being tracked, but only around a quarter (24%) of adults think the same of their offline activities. Roughly seven-in-ten Americans think all or most of what they do online is tracked by companies; about half say the same about government % of U.S. adults who say __ of what they do online or on their cellphone, or offline (like where they go and who they talk to), is being tracked by … Note: Respondents were randomly assigned to answer questions about how much of what they do online and on their cellphone, and offline (like where they go and who they talk to) is being tracked by “companies” or “the government.” Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 72 31 19 38 9 31 Online Offline All or most Some Very little or noneCompanies 47 24 30 33 22 43 Online Offline All or most Some Very little or noneGovernment 26 PEW RESEARCH CENTER www.pewresearch.org When it comes to Americans’ beliefs about whether the government is tracking them, there are differences by race and ethnicity, as well as by age. For example, black Americans are more likely than white Americans to say they believe the government is tracking all or most of what they do online or on their cellphone (60% vs. 43%). Similar gaps are present in views about offline activities: 47% of black adults think their offline activities are tracked by the government, compared with 19% of white adults. Younger adults are also more likely than older adults to believe they are being tracked, online and off, by the government. Around 60% of those 18 to 29 believe their online and cellphone activities are being tracked, compared with a smaller share (30%) of those 65 and older. A similar gap exists for offline activities: While 30% of those 18 to 29 think offline activities are being tracked by the government, only 16% of those 65 and older agree. These numbers increase significantly, but follow a similar pattern, when online and offline tracking by companies is considered. A majority of black and Hispanic adults believe the government is tracking their online and cellphone activity % of U.S. adults who say they believe the government is tracking all or most of their activities … Note: Whites and blacks include only non-Hispanics. Hispanics are of any race. Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Online/Cellphone Offline 47 59 53 44 30 43 60 56 47 50 47 48 51 43 U.S. adults <$30K $30K-<$75K $75K+ College+ White Black Hispanic 18-29 30-49 50-64 65+ Some college HS or less 24 30 26 23 16 19 47 28 27 27 19 26 28 17 27 PEW RESEARCH CENTER www.pewresearch.org Though many Americans feel their activities are being tracked, online and off, by both companies and the government, very few believe they understand what these entities are doing with the data being collected. Only 6% of adults say they understand a great deal what companies do with the data collected, and a similar share (4%) say they know a great deal about what the government does with the data. In contrast, 78% say they understand very little or nothing about what is being done with their data by the government, and 59% say this about the things companies do. There are moderate differences in understanding by educational attainment. Those with some college experience are more likely to say they understand what is being done with the data collected about them by both the government and companies. While 46% of those with some college education say they understand at least some about what is being done with the data collected about them by companies, just 38% of those with a college degree or higher and 37% of those with a high school education or less agree. A similar trend follows for understanding of data the government collects. Only a minority of the public say they understand what companies or the government do with the data collected about them % of U.S. adults who say they understand __ about what is being done with the data collected about them by … Note: Respondents were randomly assigned to answer a question about how much they understand about what is being done with the data collected about them by “companies” or “the government.” Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 6 4 34 17 48 53 11 25 Companies Government A great deal Some Very little Nothing 28 PEW RESEARCH CENTER www.pewresearch.org Significant shares of Americans are not convinced they benefit from this level of tracking and data collection. Roughly three-quarters of adults say they benefit very little or none from the data that companies (72%) or the government (76%) collect about them. On the other hand, about three-in-ten Americans (28%) say they get a great deal or some personal benefit from companies’ collecting data, and 23% say the same about the government’s efforts. When asked which of the following statements best described how they feel, 81% of of adults say that the “potential risks of companies collecting data about them outweigh the benefits,” and just 17% say the benefits they get from companies outweigh the risks. A similar pattern is seen when asked about the government. Two-thirds of Americans say the potential risks from data collection outweigh the benefits, while about one-third (31%) say the benefits outweigh the risks. White Americans are less likely to feel they benefit from the collection of data. Only 19% of white adults say they benefit from data collected by the government, and 23% say they benefit from company-collected data. Slightly larger shares of black and Hispanic Americans find more benefit in both: 32% of black adults and 29% of Hispanic adults find data collected by the government Relatively few Americans say they personally benefit a lot from the data companies or the government collect about them % of U.S. adults who say they benefit __ from the data collected about them by … … And a majority think the potential risks of data collection outweigh the benefits % of U.S. adults who say the __ when it comes to data collection by … Note: Respondents were randomly assigned to answer a question about how much they feel they benefit from the data collected about them by “companies” or “the government.” Respondents were also randomly assigned to answer a question about whether the potential risks outweigh the potential benefits of data collection, or vice versa, by “companies” or “the government.” Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 5 4 23 19 49 42 23 34 A great deal Some Very little None Companies Government 81 66 17 31 Companies Government Potential risks outweigh the potential benefits Potential benefits outweigh the potential risks 29 PEW RESEARCH CENTER www.pewresearch.org beneficial, and 38% of black adults and 39% of Hispanic adults find benefit in company- collected data. Older Americans also feel they benefit very little from government and corporate collection of data, with just 17% of those 65 and older believing they benefit from the data government collects about them and only 19% thinking the same about data collected by companies. Younger adults are more likely to say they benefit from the data collected about them % of U.S. adults who say they benefit a great deal or some from the data collected about them by … Note: Respondents were randomly assigned to answer a question about how much they feel they benefit from the data collected about them by “companies” or “the government.” Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Companies 23 32 24 20 17 U.S. adults 18-29 30-49 50-64 65+ 28 29 31 29 19 Government 30 PEW RESEARCH CENTER www.pewresearch.org A majority of adults (62%) say they do not think it is possible to go through daily life without having their data collected by companies, and 63% think the same about government data collection. Still, 38% of Americans think it is possible to go about daily life without having their data collected by companies, and 36% say the same about having their data collected by the government. There are some differences by age, with older adults being more skeptical than their younger counterparts about the possibility of anonymity. While 27% of adults ages 65 and older say it is possible to go about daily life and remain anonymous to companies, that share rises to around 40% among adults under the age of 65. When considering the idea of anonymity from the government, only 33% of adults in both older demographics (50 to 64 and 65 and older) believe it’s possible, compared with a larger share (41%) of those 30 to 49. Older Americans less likely to say they can go about life without having their data collected by companies % of U.S. adults who say it is possible to go about daily life being anonymous to companies Note: Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 38 42 40 38 27 U.S. adults 18-29 50-64 65+ 30-49 31 PEW RESEARCH CENTER www.pewresearch.org 3. Public knowledge and experiences with data-driven ads Today, it is possible for companies, advertisers and other organizations to take users’ personal data from a variety of sources to create detailed profiles based on someone’s likes, preferences and other characteristics. This survey finds the majority of Americans have heard or read about this concept, and those who have think all or most companies are using profiles to better understand their customers. Among those who are familiar with profiles, a majority reports seeing these ads on a somewhat regular basis. Overall, the public is familiar with the practice of companies and organizations using an individual’s experiences and personal data to create detailed user profiles. Most Americans – 77% in total – say they have heard at least a little about how companies and other organizations use personal data to offer things like targeted advertisements, special deals, or to assess how risky people might be as customers, including 27% who say they have heard A majority of Americans have heard about companies creating data profiles, and it’s common for those who have to see ads based on their personal data % of U.S. adults who say they have heard __about companies and other organizations using data profiles to offer targeted ads, special deals, or to assess how risky people might be as customers Note: Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER https://www.washingtonpost.com/news/the-intersect/wp/2016/08/19/98-personal-data-points-that-facebook-uses-to-target-ads-to-you/ 32 PEW RESEARCH CENTER www.pewresearch.org a lot about this concept. About one-in-five adults say they have heard nothing at all about this practice. Not only are most Americans aware of this concept, they routinely see them in practice. Roughly eight-in-ten adults who are familiar with these profiles say they occasionally (34%) or frequently (49%) see ads or solicitations that appear to be based on a profile made of them using personal data. Put another way, 64% of all U.S. adults report seeing these types of ads or solicitations. There is also a general belief that use of personal profiles is fairly common among companies. Among adults who have heard of these profiles, 75% believe that all or most companies use these profiles to help understand their customers. More than half of all adults (57%), regardless of their familiarity with the concept of profiles, say they think all or most companies use this tactic. Awareness of these data-driven profiles is relatively widespread across a range of demographic groups, but college graduates and more affluent adults are especially likely to be familiar with both the concept of profiling and the outcome – advertisements apparently targeted at them. Adults with a bachelor’s degree or higher are more likely than those with a high school education or less to About six-in-ten Americans who see ads based on their personal data say they reflect their interests Among the 83% of U.S. adults who say they frequently or on occasion see ads or solicitations that appear to be based off profiles made using their personal data, the % who say they understand __ about what data is being used to create these ads Among the 83% of U.S. adults who say they frequently or on occasion see ads or solicitations that appear to be based off profiles made using their personal data, the % who say these ads accurately reflect their actual interests and characteristics ... Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 7 54 33 5 Very well Somewhat well Not too well Not well at all 14 50 31 4 A great deal Somewhat Not too much Not at all Detailed data profiles: How Pew Research Center asked about targeted ads Survey respondents were shown the following prompt: “Today it is possible to take personal data about people from many different sources – such as their purchasing and credit histories, their online browsing or search behaviors, or their public voting records – and combine them together to create detailed profiles of people’s potential interests and characteristics. Companies and other organizations use these profiles to offer targeted advertisements or special deals, or to assess how risky people might be as customers.” 33 PEW RESEARCH CENTER www.pewresearch.org say they have heard about personal profiles (87% vs. 69%) or to say they see advertisements that appear to be based off their personal data (93% vs. 73%). Similar patterns are present by household income, with those living in higher-income households being more likely to say they are familiar with the term and that they see these types of ads than those living in lower-income households. A majority of Americans who see ads that appear to be based on their personal data say those ads mirror their interests, characteristics Respondents who say they have seen ads based on their personal data were asked a follow-up question about how much they understood about the data collection associated with such targeted advertising. Fully 64% of adults who have ever seen ads that appear to be based on their personal data say they at least somewhat understand what personal data is being used to create targeted advertisements, with 14% saying they understand a great deal. Still, some ad-seers are less sure about the concept: 35% say they understand not much or at all the type of personal data being used to create these ads. When all American adults are considered, 41% say they understand what data is used to create these ads. 34 PEW RESEARCH CENTER www.pewresearch.org Additionally, a majority of ad-seers think these types of ads accurately reflect who they are. Around six-in-ten adults who see these ads (61%) say they accurately reflect their interests and characteristics. Still, relatively few in this group – just 7% – say these ads accurately reflect who they are very well. (The share who say these ads reflect them at least somewhat well is 39% among all U.S. adults.) Personal data is used for a range of purposes by companies and the government. The findings reported in Chapter 2 show that Americans express general concern about the data collected but that the public finds some uses more acceptable than others. This diversity of thought is evident when adults consider some of the purposes of the data collection. When asked whether it was acceptable or not for a poorly performing school to share student data with a nonprofit group in an effort to improve educational outcomes, roughly half of Americans (49%) say they consider this to be an acceptable form of data sharing. The same share of the public also believes it’s acceptable for the government to collect Americans’ data to asses who might be a potential terrorist threat. Americans more supportive of certain types of data uses than others % of U.S. adults who say the following uses of data or personal information are acceptable Note: Those who did not give an answer or who gave other responses are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 49 49 48 41 27 25 The government collecting data about all Americans to assess potential terrorist threats Poorly performing schools sharing student data with a nonprofit seeking to improve educational outcomes DNA testing companies sharing customers’ genetic data with law enforcement to help solve crimes Fitness tracking app makers sharing user data with medical researchers to better understand the link between exercise and heart disease Social media companies monitoring users' posts for signs of depression to identify users at risk for self-harm and connect them to counselors Smart speaker makers sharing users' audio recordings with law enforcement to help with criminal investigations https://www.pewresearch.org/internet/2019/11/15/americans-concerned-feel-lack-of-control-over-personal-data-collected-by-both-companies-and-the-government/ 35 PEW RESEARCH CENTER www.pewresearch.org Additionally, a similar share of Americans (48%) think it’s acceptable for DNA testing companies, like AncestryDNA and 23andMe, to share their customers’ genetic data with law enforcement agencies in order to help solves crimes. Still, other forms of data collection are deemed less acceptable by the public. About four-in-ten adults (41%) find it acceptable for makers of fitness tracking apps to share user data with medical researchers to better understand the link between exercise and heart disease, compared with 35% who say this is unacceptable. And just 25% of Americans find it acceptable for the makers of smart speakers to share audio recordings of their customers with law enforcement to help with criminal investigations. A similar share (27%) finds it acceptable for a social media company to monitor users’ posts for signs of depression in order to identify individuals at risk of self-harm and connect them to counseling services. In these scenarios, 49% and 45% respectively say they are unacceptable forms of data use. But even as Americans’ assessments of these practices tend to differ by the type of data being collected and the purpose of its use, at least 20% of adults say they are unsure about their acceptability in each of these specific scenarios. For example, 27% of adults say they are unsure if social media companies checking users for signs of depression in order to get them help is acceptable or not, and 24% say the same about low-performing schools sharing student data with nonprofits. Older and younger Americans tend to differ over the appropriateness of certain corporate and government uses of people’s personal data The public’s views on whether certain types of data use are appropriate tend to differ by age. Adults ages 18 to 29 are more likely than those 65 and older to say it is acceptable for makers of fitness tracking apps to share data with medical researchers to better understand the link between exercise and heart disease (52% vs. 35%) or for social media companies to monitor user posts for signs of depression so they can identify people at risk of self-harm and connect them to counseling services (42% vs. 18%). 36 PEW RESEARCH CENTER www.pewresearch.org But there are other instances in which older groups are more supportive of data sharing. Roughly six-in-ten adults ages 65 and older (58%) say it’s acceptable for DNA testing companies to share customers’ genetic data with law enforcement to help solve crimes, compared with 39% of those ages 18 to 29. Older adults are also more likely than younger adults to believe that the government collecting Americans’ data to assess terrorist threats or makers of smart speakers sharing audio recordings with law enforcement to help with investigations is an acceptable form of data use. However, attitudes about schools sharing student data with a nonprofit are relatively similar, with 44% of those 65 and older finding this acceptable, compared with 47% of those 18 to 29 who say the same. Older and younger adults differ on the acceptability of certain data sharing practices by companies, the government % of U.S. adults, by age group, who say the following uses of data or personal information are acceptable Notes: Those who did not give an answer or who gave other answers are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 42 52 47 39 42 22 18 35 44 58 54 32 0 20 40 60 +24 -19 -10 +17 Youngest to oldest DIFF -12 +3 65+ 50-64 30-49 18-29 Social media companies monitoring users' posts for signs of depression to identify users at risk for self-harm and connect them to counselors Fitness tracking app makers sharing user data with medical researchers to better understand the link between exercise and heart disease Poorly performing schools sharing student data with a nonprofit seeking to improve educational outcomes DNA testing companies sharing customers’ genetic data with law enforcement to help solve crimes The government collecting data about all Americans to assess potential terrorist threats Smart speaker makers sharing users' audio recordings with law enforcement to help with criminal investigations 37 PEW RESEARCH CENTER www.pewresearch.org 4. Americans’ attitudes and experiences with privacy policies and laws Many Americans have little to no understanding of what companies are doing with the data that is collected about them. At the same time, nearly all Americans encounter companies’ privacy policies at some point. This survey explores whether they fully read them and how much they understand about these policies. Privacy policies have become a common feature of public life. One-quarter of adults say they are asked to agree to the terms and conditions of a company’s privacy policy on an almost daily basis, while 32% say this happens about once a week; another 24% say they are asked for this roughly once a month. In total, 97% of Americans say they have ever been asked to agree to the terms and conditions of a company’s privacy policy. While nearly all Americans are asked to agree to terms and conditions of a company’s privacy policy, relatively few report reading these policies on a regular basis. Just 9% of adults say they always read a company’s privacy policy before agreeing to the terms and conditions, while an additional 13% say they do this often. And additionally, 38% of Americans say they sometimes read these policies. There is also a segment of the population who forgo reading these policies altogether: More than a third of adults (36%) say they never read a privacy policy before agreeing to it. A majority of Americans are asked to agree to privacy policies at least monthly, including a quarter who say this happens daily % of U.S. adults who say they are asked to agree to the terms and conditions of a company’s privacy policy … Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 25 32 24 15 3 Almost daily About weekly About monthly Less often NeverNET Asked at least monthly to agree to privacy policies: 81% 38 PEW RESEARCH CENTER www.pewresearch.org There are some demographic differences in reading privacy policies. Fully 68% of adults living in households with an annual income of $30,000 or less say they ever read privacy policies, compared with 52% of those whose family income is $75,000 or more a year. Women are more likely than men to say they ever read a company’s privacy policy before agreeing to it (65% vs. 55%). And adults ages 50 and older are more likely than those under 50 to ever read privacy policies (65% vs. 56%). But the practice of reading privacy policies doesn’t necessarily guarantee thoroughness. Among adults who say they ever read privacy policies before agreeing to their terms and conditions, only a minority (22%) say they read them all the way through before agreeing to their terms and conditions. It’s more common for these readers to say they either glance over it without it reading closely (43%) or say they only read it part of the way through. Among all U.S. adults, 13% say they read privacy policies all the way through, 21% read part of the way through and 26% glance over them. There are few demographic differences among adults who read privacy policies in full. For example, those living in households with an annual income of $30,000 or less are twice as likely as About one-in-five Americans say they always or often read privacy policies before agreeing to them % of U.S. adults who say they __ read before agreeing to a company’s privacy policy when they are asked to Note: Those who did not give an answer or who have never been asked to agree to a privacy policy are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Only a minority of Americans who read privacy policies say they read them all the way through Among the 60% of U.S. adults who say they ever read privacy policies before agreeing to them, the % who say they typically … Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 9 13 38 36 Always Often Sometimes Never NET Always or often reads privacy policies: 22% 22 35 43 Read it all the way through Read a privacy policy part of the way through Glance over it without reading it closely 39 PEW RESEARCH CENTER www.pewresearch.org those in households with an annual income of $75,000 or more to say they read all the way through (30% vs. 15%). And while 26% of adults ages 65 and older say they read privacy policies all the way through, that share falls to 15% among those ages 18 to 29. A majority of adults who read privacy policies say they typically understand them Roughly two-thirds of adults who read privacy policies say they typically understand a great deal (13%) or some (55%) of the policies that they read. Still, about one- third of this group has a lesser grasp of the privacy policies they read, including 29% who say they understand very little and 3% who do not understand at all. Among all U.S. adults, 8% say they understand privacy policies a great deal, 33% understand some, 18% understand very little and 2% do not understand them at all. When asked how confident they are that companies will do certain things to protect them, relatively few Americans feel assured. In fact, clear majorities of adults show little to no confidence that companies will follow through with certain actions. Just 21% of adults say they are very (3%) or somewhat (18%) confident that companies will publicly admit mistakes and take responsibility when they misuse or compromise their users’ personal data, while 79% of adults are “not too confident” or “not confident at all” about this. A similar share (24%) are confident that a company will be held accountable by the government if they misuse or compromise their data, while 75% are not confident about this. About two-thirds of U.S. adults who read privacy policies say they understand at least some of them Among the 60% of U.S. adults who say they read privacy policies before agreeing to them, the % of who say they typically understand __ of them Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 13 55 29 3 A great deal Some Very little None 40 PEW RESEARCH CENTER www.pewresearch.org Even though majorities still have little confidence in companies, about one-third of adults or more are at least somewhat confident in companies to use personal information in ways they feel comfortable with (31%), promptly notify them if personal data has been misused or compromised (35%) or follow what their privacy policies say they will do with personal information (42%). As a whole, the public feels more comfortable with companies using their personal information for certain purposes than others. For example, 57% of adults say they are very or somewhat comfortable with companies using their personal data to help companies improve their fraud prevention systems. Americans’ views are split on companies using their personal data to help them develop new products: 50% are at least somewhat comfortable, and 49% are not too comfortable or not comfortable at all. Adults are less positive toward other ways that companies may use their data. About a third of adults (36%) say they are at least somewhat comfortable with companies sharing their personal data with outside groups doing research that might help them improve society, but a larger share (64%) say they would be uncomfortable with this practice. Younger adults are generally more comfortable with these uses of their private data, while older adults are less comfortable. Adults under 50 years old are more likely than those who are 50 and older to be at least somewhat comfortable with their personal data being shared with outside Most Americans are not confident that companies would publicly admit to misusing consumers’ data % of U.S. adults who say they are __ confident that companies will do the following things Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 3 4 4 5 5 18 21 27 30 37 46 43 47 41 40 32 32 22 24 17 Very Somewhat Not too Not at all Promptly notify users if their personal data has been misused or compromised Publicly admit mistakes and take responsibility if they misuse or compromise users' personal data Be held accountable by govt if they misuse users' personal data Use users' personal info in ways they feel comfortable with Follow what their privacy policies say they will do with users' personal data 41 PEW RESEARCH CENTER www.pewresearch.org groups doing research that might help improve society (42% vs. 29%). By comparison, adults ages 50 and older are more likely than those under 50 to not be comfortable with this (70% vs. 58%). There are partisan differences on some of these companies’ uses of personal data. Democrats, including independents who lean to the Democratic Party, are more likely than Republicans and Republican-leaning independents to be comfortable with companies sharing their personal data with outside groups doing research that might help improve society (42% vs. 28%) and using their data to help improve their fraud prevention systems (61% vs. 54%). Americans were asked how much they understand the laws and regulations that are currently in place to protect their data privacy. Some 37% say they understand the laws and regulations some (33%) or a great deal (3%). Nearly two-thirds (63%) of adults say they do not understand the laws and regulations that are currently in place to protect their data privacy. A majority of Americans say they have little to no understanding of existing data protection laws % of U.S. adults who say they feel they understand the laws and regulations that are currently in place to protect their data privacy ... Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER The public has varying levels of comfort when it comes to how companies’ use their personal data % of U.S. adults who say they are __comfortable with companies using their personal data in the following ways Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 10 8 6 47 42 30 29 31 37 13 18 27 To help improve their fraud prevention systems Sharing with outside research groups that might help improve society To help them develop new products Very Somewhat Not too Not at all 3 33 49 14 A great deal Some Very little Not at all 42 PEW RESEARCH CENTER www.pewresearch.org This includes 49% who say they understand the laws “very little” and 14% who do not understand them at all. Americans who are more knowledgeable about how their data is being used are more likely to say they understand privacy-related laws and protections. Among adults who have a great deal or some understanding of how companies use their data, 56% say they understand at least some about current data privacy protection laws and regulations; compared with 24% among those who understand very little or nothing about how their data is used by companies. A similar pattern exists when it comes to government use of data: 59% of those who understand a great deal or some about how their data is used by government say they understand at least some about the data privacy laws and regulations versus 30% among those who understand very little or none about how their data is used. Adults who believe they don’t benefit from how companies or the government uses their data are also more likely to have little understanding of these privacy laws. 43 PEW RESEARCH CENTER www.pewresearch.org Americans strongly favor more government regulation of consumer data When asked how much government regulation there should be around what companies can do with their customers’ personal information, 75% of adults say there should be more regulation than there is now. About one-in-ten (8%) feel companies should be regulated less than they are now, while 16% say there should be the about same amount of regulation. Although a majority of both Republicans and Democrats agree that companies use of personal data should be regulated more than they are now, Democrats (including independents who lean towards the Democratic party) are more likely than Republicans and Republican leaners to believe there should be more government regulation of what companies can do with their customers’ personal information (81% vs. 70%). There are also differences by the amount of attention people to privacy-related news. Adults who follow privacy news closely are also more likely than those who don’t to say there should be more government regulation (79% vs. 68%). But when given a choice of whether they favor better tools for consumers or Most Americans think there should be more government regulation of what companies can do with personal data % of U.S. adults who say they think there should be __of what companies can do with their customers’ personal information Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER Americans are somewhat more likely to favor better consumer tools than stronger laws to help safeguard personal data % of U.S. adults say they think __would be a more effective way to safeguard people’s personal information Note: Those who did not give an answer are not shown. Source: Survey conducted June 3-17, 2019. “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” PEW RESEARCH CENTER 55 44 Stronger laws governing what companies can and cannot do with people's personal information Better tools for allowing people to control their personal information themselves 44 PEW RESEARCH CENTER www.pewresearch.org stricter laws to safeguard people’s personal information, a somewhat higher share of the public favored better consumer tools. Fully 55% of adults say better tools for allowing people to control their personal information themselves would be a more effective way to safeguard people’s personal information. On the other hand, 44% of Americans say that stronger laws governing what companies can and cannot do with people’s personal information would be the more effective strategy. 45 PEW RESEARCH CENTER www.pewresearch.org Acknowledgments This report is a collaborative effort based on the input and analysis of the following individuals. Find related reports online at pewresearch.org/internet. Primary researchers Brooke Auxier, Research Associate Lee Rainie, Director, Internet and Technology Research Monica Anderson, Associate Director Andrew Perrin, Research Analyst Madhu Kumar, Research Assistant Erica Turner, Research Intern Research team Aaron Smith, Director, Data Labs Emily Vogels, Research Associate Skye Toor, Data Science Assistant Editorial and graphic design Margaret Porteus, Information Graphics Designer David Kent, Copy Editor Communications and web publishing Shawnee Cohn, Communications Manager Sara Atske, Associate Digital Producer http://www.pewresearch.org/internet 46 PEW RESEARCH CENTER www.pewresearch.org Methodology The American Trends Panel (ATP), created by Pew Research Center, is a nationally representative panel of randomly selected U.S. adults. Panelists participate via self-administered web surveys. Panelists who do not have internet access at home are provided with a tablet and wireless internet connection. The panel is being managed by Ipsos. Data in this report are drawn from the panel wave conducted June 3 to June 17, 2019. A total of 4,272 panelists responded out of 5,869 who were sampled, for a response rate of 73%. This does not include six panelists who were removed from the data due to extremely high rates of refusal or straightlining. The cumulative response rate accounting for nonresponse to the recruitment surveys and attrition is 5.1%. The break-off rate among panelists who logged onto the survey and completed at least one item is 1.7%. The margin of sampling error for the full sample of 4,272 respondents is plus or minus 1.9 percentage points. The subsample from the ATP was selected by grouping panelists into five strata so demographic groups that are underrepresented in the panel had a higher probability of selection than overrepresented groups: ▪ Stratum A consists of panelists who are non-internet users. They were sampled at a rate of 100%. ▪ Stratum B consists of panelists with a high school education or less. They were sampled at a rate of 98.9%. ▪ Stratum C consists of panelists that are Hispanic, unregistered to vote, or non-volunteers. They were sampled at a rate of 44.8%. American Trends Panel recruitment surveys Recruitment dates Mode Invited Joined Active panelists remaining Jan. 23 to March 16, 2014 Landline/ cell RDD 9,809 5,338 2,503 Aug. 27 to Oct. 4, 2015 Landline/ cell RDD 6,004 2,976 1,464 April 25 to June 4, 2017 Landline/ cell RDD 3,905 1,628 801 Aug. 8 to Oct. 31, 2018 ABS/web 9,396 8,778 8,691 Total 29,114 18,720 13,459 Note: Approximately once per year, panelists who have not participated in multiple consecutive waves or who did not complete an annual profiling survey are removed from the panel. Panelists also become inactive if they ask to be removed from the panel. PEW RESEARCH CENTER 47 PEW RESEARCH CENTER www.pewresearch.org ▪ Stratum D consists of panelists that are black or 18-34 years old. They were sampled at a rate of 18.2%. ▪ Stratum E consists of the remaining panelists. They were sampled at a rate of 13.5%. The ATP was created in 2014, with the first cohort of panelists invited to join the panel at the end of a large, national, landline and cellphone random-digit-dial survey that was conducted in both English and Spanish. Two additional recruitments were conducted using the same method in 2015 and 2017, respectively. Across these three surveys, a total of 19,718 adults were invited to join the ATP, of which 9,942 agreed to participate. In August 2018, the ATP switched from telephone to address-based recruitment. Invitations were sent to a random, address-based sample (ABS) of households selected from the U.S. Postal Service’s Delivery Sequence File. In each household, the adult with the next birthday was asked to go online to complete a survey, at the end of which they were invited to join the panel. For a random half-sample of invitations, households without internet access were instructed to return a postcard. These households were contacted by telephone and sent a tablet if they agreed to participate. A total of 9,396 were invited to join the panel, and 8,778 agreed to join the panel and completed an initial profile survey. Of the 18,720 individuals who have ever joined the ATP, 13,459 remained active panelists and continued to receive survey invitations at the time this survey was conducted. The U.S. Postal Service’s Delivery Sequence File has been estimated to cover as much as 98% of the population, although some studies suggest that the coverage could be in the low 90% range.1 1 AAPOR Task Force on Address-based Sampling. 2016. “AAPOR Report: Address-based Sampling.” https://www.aapor.org/Education-Resources/Reports/Address-based-Sampling.aspx 48 PEW RESEARCH CENTER www.pewresearch.org Weighting The ATP data were weighted in a multistep process that begins with a base weight incorporating the respondents’ original survey selection probability and the fact that in 2014 and 2017 some respondents were subsampled for invitation to the panel. The next step in the weighting uses an iterative technique that aligns the sample to population benchmarks on the dimensions listed in the accompanying table. Sampling errors and test of statistical-significance take into account the effect of weighting. Interviews are conducted in both English and Spanish, but the American Trends Panel’s Hispanic sample is predominantly U.S. born and English speaking. In addition to sampling error, one should bear in mind that question wording and practical difficulties in conducting surveys can introduce error or bias into the findings of opinion polls. The following table shows the unweighted sample sizes and the error attributable to sampling that would be expected at the 95% level of confidence for different groups in the survey: Group Unweighted sample size Plus or minus … Total sample 4,272 1.9 percentage points Form 1 2,140 2.6 percentage points Form 2 2,132 2.6 percentage points Men 1,875 2.9 percentage points Women 2,397 2.4 percentage points White, Non-Hispanic 2,887 2.2 percentage points Black, Non-Hispanic 445 5.8 percentage points Hispanic 611 5.5 percentage points Ages 18-29 671 4.8 percentage points 30-49 1,314 3.3 percentage points 50-64 1,308 3.4 percentage points 65+ 977 3.8 percentage points Weighting dimensions Variable Benchmark source Gender 2017 American Community Survey Age Education Race/Hispanic origin Hispanic nativity Home internet access Region x Metropolitan status 2018 CPS March Supplement Volunteerism 2017 CPS Volunteering and Civic Life Supplement Voter registration 2016 CPS Voting and Registration Supplement Party affiliation Average of the three most recent Pew Research Center telephone surveys. Note: Estimates from the ACS are based on non-institutionalized adults. Voter registration is calculated using procedures from Hur, Achen (2013) and rescaled to include the total US adult population. PEW RESEARCH CENTER 49 PEW RESEARCH CENTER www.pewresearch.org HS or less 1,483 3.3 percentage points Some college 1,182 3.4 percentage points College+ 1,600 2.9 percentage points Less than $30,000 1,107 3.8 percentage points $30,000-$74,999 1,469 3.2 percentage points $75,000+ 1,496 3.0 percentage points Rep/Lean Rep 1,823 2.8 percentage points Dem/Lean Dem 2,296 2.6 percentage points Sample sizes and sampling errors for other subgroups are available upon request. © Pew Research Center, 2019 50 PEW RESEARCH CENTER www.pewresearch.org Topline questionnaire 2019 PEW RESEARCH CENTER’S AMERICAN TRENDS PANEL WAVE 49 JUNE 2019 FINAL TOPLINE JUNE 3-17, 2019 TOTAL N=4,272 THE QUESTIONS PRESENTED BELOW ARE PART OF A LARGER SURVEY CONDUCTED ON THE AMERICAN TRENDS PANEL. OTHER QUESTIONS ON THIS SURVEY HAVE EITHER BEEN PREVIOUSLY RELEASED OR HELD FOR FUTURE RELEASE. ASK ALL: SECUR1 Compared with five years ago, do you feel your personal information is… [REVERSE ORDER OF OPTIONS 1 AND 2 FOR HALF OF RESPONDENTS] June 3-17, 2019 6 More secure 70 Less secure 24 About the same * No Answer ASK FORM 1 [N=2,140]: PRIVACYOPENa In your own words, what does “privacy” mean to you? June 3-17, 2019 28 Other people and organizations not being able to access their possessions or private life 26 Control over information, possessions, self; deciding what’s accessible to others 15 Themselves, their personal information and possessions, the desire to keep things to themselves 4 Having their information sold, third party involvement 3 General security references, i.e. “secure,” “guarded,” “protective” 2 Tracking, surveillance, monitoring, spying 2 Privacy is a myth/means nothing/doesn’t exist 2 Crime, hacking, fraud, any threats of illicit activity 2 Threat from the government regarding themselves, possessions or private life 1 Personal information is only accessible with the person’s knowledge or consent * Spam, unwanted calls or solicitations 4 Other 17 Did not answer ASK FORM 2 [N=2,132]: PRIVACYOPENb In your own words, what does “digital privacy” mean to you? June 3-17, 2019 51 PEW RESEARCH CENTER www.pewresearch.org 17 Themselves, their personal information and possessions, the desire to keep things to themselves 14 Control over information, possessions, self; deciding what’s accessible to others 13 Other people and organizations not being able to access their possessions or private life 9 Privacy is a myth/means nothing/doesn’t exist 6 Having their information sold, third party involvement 5 Crime, hacking, fraud, any threats of illicit activity 4 General security references, i.e. “secure,” “guarded,” “protective” 3 Tracking, surveillance, monitoring, spying 2 Company measures, how websites/companies should secure data, terms of service, privacy settings 2 Personal information is only accessible with the person’s knowledge or consent 1 Threat from the government regarding themselves, possessions or private life 4 Other 31 Did not answer Threat from the government regarding themselves, possessions or private life ASK ALL: PRIVACYNEWS1 How closely, if at all, do you follow news about privacy issues? June 3-17, 2019 11 Very closely 46 Somewhat closely 33 Not too closely 10 Not at all closely * No Answer ASK FORM 1 [N=2,140]: [RANDOMIZE ORDER OF TRACKCO1a AND TRACKCO1b] TRACKCO1a As far as you know, how much of what you do ONLINE or on your cellphone is being tracked by advertisers, technology firms or other companies? [RANDOMIZE] June 3-17, 2019 41 All or almost all of it 31 Most of it 19 Some of it 4 Very little of it 4 None of it 1 No Answer ASK FORM 1 [N=2,140]: TRACKCO1b As far as you know, how much of what you do OFFLINE – like where you are or who you are talking to – is being tracked by advertisers, technology firms or other companies? [RANDOMIZE] 52 PEW RESEARCH CENTER www.pewresearch.org June 3-17, 2019 12 All or almost all of it 19 Most of it 38 Some of it 20 Very little of it 11 None of it * No Answer ASK FORM 1 [N=2,140]: [RANDOMIZE ORDER OF CONCERNCO AND BENEFITCO] CONCERNCO How concerned are you, if at all, about how companies are using the data they collect about you? June 3-17, 2019 36 Very concerned 43 Somewhat concerned 17 Not too concerned 4 Not at all concerned * No Answer ASK FORM 1 [N=2,140]: BENEFITCO How much do you feel you personally benefit from the data that companies collect about you? June 3-17, 2019 5 A great deal 23 Some 49 Very little 23 None * No Answer ASK FORM 1 [N=2,140]: CONTROLCO How much control do you think you have over the data that companies collect about you? June 3-17, 2019 3 A great deal of control 15 Some control 51 Very little control 30 No control * No Answer ASK FORM 1 [N=2,140]: UNDERSTANDCO How much do you feel you understand what companies are doing with the data they collect about you? 53 PEW RESEARCH CENTER www.pewresearch.org June 3-17, 2019 6 A great deal 34 Some 48 Very little 11 Nothing 1 No Answer ASK FORM 1 [N=2,140]: POSNEGCO On balance, which would you say most accurately describes how you feel? [RANDOMIZE] June 3-17, 2019 17 The benefits I get from companies collecting data about me outweigh the potential risks 81 The potential risks of companies collecting data about me outweigh the benefits I get 2 No Answer ASK FORM 1 [N=2,140]: ANONYMOUS1CO Do you think it is possible to go about daily life today without having companies collect data about you? June 3-17, 2019 38 Yes, it is possible 62 No, it is not possible * No Answer 54 PEW RESEARCH CENTER www.pewresearch.org ASK FORM 2 [N=2,132]: [RANDOMIZE ORDER OF TRACKGOV1a AND TRACKGOV1b] TRACKGOV1a As far as you know, how much of what you do ONLINE or on your cellphone is being tracked by the government? June 3-17, 2019 24 All or almost all of it 23 Most of it 30 Some of it 14 Very little of it 9 None of it * No answer ASK FORM 2 [N=2,132]: TRACKGOV1b As far as you know, how much of what you do OFFLINE – like where you are or who you are talking to – is being tracked by the government? June 3-17, 2019 11 All or almost all of it 13 Most of it 33 Some of it 27 Very little of it 16 None of it * No answer ASK FORM 2 [N=2,132]: [RANDOMIZE ORDER OF CONCERNGOV AND BENEFITGOV] CONCERNGOV How concerned are you, if at all, about how the government is using the data it collects about you? June 3-17, 2019 25 Very concerned 39 Somewhat concerned 26 Not too concerned 10 Not at all concerned * No Answer ASK FORM 2 [N=2,132]: BENEFITGOV How much do you feel you personally benefit from the data the government collects about you? June 3-17, 2019 4 A great deal 19 Some 42 Very little 34 None 1 No Answer 55 PEW RESEARCH CENTER www.pewresearch.org ASK FORM 2 [N=2,132]: CONTROLGOV How much control do you think you have over the data the government collects about you? June 3-17, 2019 4 A great deal of control 12 Some control 41 Very little control 43 No control * No Answer ASK FORM 2 [N=2,132]: UNDERSTANDGOV How much do you feel you understand what the government is doing with the data they collect about you? June 3-17, 2019 4 A great deal 17 Some 53 Very little 25 Nothing * No Answer ASK FORM 2 [N=2,132]: POSNEGGOV On balance, which would you say most accurately describes how you feel? [RANDOMIZE] June 3-17, 2019 31 The benefits the government can provide by collecting data about me and others outweigh the potential risks 66 The potential risks of the government collecting data about me and others outweigh the benefits it can provide 4 No Answer ASK FORM 2 [N=2,132]: ANONYMOUS1GOV Do you think it is possible to go about daily life today without having the government collect data about you? June 3-17, 2019 36 Yes, it is possible 63 No, it is not possible 1 No Answer 56 PEW RESEARCH CENTER www.pewresearch.org ASK ALL: [RANDOMIZE ORDER OF QUESTIONS A-F] CONCERNGRP Now thinking about specific people or groups who might have access to your personal information… How concerned are you, if at all, about how much personal information the following people or groups might know about you? Concerned a lot Concerned a little Not concerned No Answer a. [FORM 1 [N=2,140]] Law enforcement agencies June 3-17, 2019 26 36 39 * b. [FORM 1 [N=2,140]] Advertisers June 3-17, 2019 39 44 16 * c. [FORM 1 AND EMPLOYED [N=1,313]] Your employer June 3-17, 2019 19 39 42 1 d. [FORM 2 [N=2,132]] The companies you buy things from June 3-17, 2019 30 50 20 * e. [FORM 2 [N=2,132]] Your friends and family June 3-17, 2019 9 34 57 * f. [FORM 2 AND SOCIAL MEDIA USER [N=1,778]] The social media sites you use June 3-17, 2019 40 46 14 * ASK ALL: [RANDOMIZE ORDER OF QUESTIONS A-F] CONTROLGRP Now thinking about specific types of information that different entities might want to know about you… How much control, if any, do you think you have over who can access the following types of information about you? A lot of control A little control No control No Answer a. [FORM 1 AND SOCIAL MEDIA USER [N=1,800]] Your posts and activities on social media June 3-17, 2019 16 50 35 * b. [FORM 1[N=2,140]] The search terms you use online June 3-17, 2019 9 39 48 * c. [FORM 1 [N=2,140]] The purchases you’ve made, either online or in person June 3-17, 2019 12 43 45 * 57 PEW RESEARCH CENTER www.pewresearch.org d. [FORM 2 [N=2,132]] Your physical location June 3-17, 2019 18 54 28 1 e. [FORM 2 [N=2,132]] The websites you visit June 3-17, 2019 10 44 41 * f. [FORM 2 [N=2,132]] The private conversations you’ve had online or using text messaging June 3-17, 2019 13 49 37 * ASK ALL: PP1 How often are you asked to agree to the terms and conditions of a company’s privacy policy? June 3-17, 2019 25 Almost daily 32 About once a week 24 About once a month 15 Less frequently 3 Never * No answer ASK IF EVER ASKED TO AGREE TO PRIVACY POLICY (PP1=1-4) [N=4,170]: PP2 When you are asked to agree to a company’s privacy policy, how often do you read it before agreeing to it? June 3-17, 2019 9 Always 14 Often 39 Sometimes 37 Never 1 No answer ASK IF READ PRIVACY POLICIES BEFORE AGREEING (PP2=1,2,3) [N=2,571]: PP3 When you read a privacy policy, what do you typically do? [REVERSE ORDER OF RESPONSE OPTIONS FOR ½ OF RESPONDENTS] June 3-17, 2019 22 Read it all the way through 35 Read it part of the way through 43 Glance over it without reading it closely * No answer ASK IF EVER READS PRIVACY POLICIES (PP2=1,2,3) [N=2,571]: PP4 How much do you typically understand the privacy policies you read? 58 PEW RESEARCH CENTER www.pewresearch.org June 3-17, 2019 13 A great deal 55 Some 29 Very little 3 Not at all * No Answer ASK ALL: [RANDOMIZE ORDER OF QUESTION A-E] PP5 How confident are you, if at all, that companies will do the following things? Very confident Somewhat confident Not too confident Not confident at all No Answer a. Follow what their privacy policies say they will do with your personal information June 3-17, 2019 5 37 40 17 1 b. Promptly notify you if your personal data has been misused or compromised June 3-17, 2019 5 30 41 24 1 c. Publicly admit mistakes and take responsibility when they misuse or compromise their users’ personal data June 3-17, 2019 3 18 46 32 * d. Use your personal information in ways you will feel comfortable with June 3-17, 2019 4 27 47 22 1 e. Be held accountable by the government if they misuse or compromise your data June 3-17, 2019 4 21 43 32 * ASK ALL: [RANDOMIZE ORDER OF QUESTIONS A-C] PP6 How comfortable are you, if at all, with companies using your personal data in the following ways? Very comfortable Somewhat comfortable Not too comfortable Not comfortable at all No Answer 59 PEW RESEARCH CENTER www.pewresearch.org a. To help improve their fraud prevention systems June 3-17, 2019 10 47 29 13 1 b. Sharing it with outside groups doing research that might help improve society June 3-17, 2019 6 30 37 27 * c. To help them develop new products June 3-17, 2019 8 42 31 18 * ASK ALL: PRIVACYREG How much do you feel you understand the laws and regulations that are currently in place to protect your data privacy? June 3-17, 2019 3 A great deal 33 Some 49 Very little 14 Not at all * No Answer ASK FORM 1 [N=2,140]: GOVREGV1 How much government regulation of what companies can do with their customers’ personal information do you think there should be? [RANDOMIZE] June 3-17, 2019 75 More regulation 8 Less regulation 16 About the same amount 1 No Answer ASK FORM 2 [N=2,132]: GOVREGV2 Which of the following do you think would be a more effective way to safeguard people’s personal information? [RANDOMIZE] June 3-17, 2019 55 Better tools for allowing people to control their personal information themselves 44 Stronger laws governing what companies can and cannot do with people’s personal information 1 No Answer 60 PEW RESEARCH CENTER www.pewresearch.org ASK ALL: PROFILE1 Today it is possible to take personal data about people from many different sources – such as their purchasing and credit histories, their online browsing or search behaviors, or their public voting records – and combine them together to create detailed profiles of people’s potential interests and characteristics. Companies and other organizations use these profiles to offer targeted advertisements or special deals, or to assess how risky people might be as customers. Prior to today, how much had you heard or read about this concept? June 3-17, 2019 27 A lot 50 A little 22 Nothing at all 1 No Answer ASK IF HAVE HEARD OF DATA PROFILES (PROFILE1=1-2) [N=3,361]: PROFILE2 How many companies do you think use these types of profiles to help understand their customers? June 3-17, 2019 17 All of them 57 Most of them 18 Some of them 2 Only a few of them 4 Not sure * No Answer ASK IF HAVE HEARD OF DATA PROFILES (PROFILE1=1-2) [N=3,361]: PROFILE3 Do you ever see advertisements or solicitations that appear to be based on a profile that has been made of you using your personal data? June 3-17, 2019 49 Yes, frequently 34 Yes, on occasion 9 No 7 Not sure * No Answer ASK IF EVER SEE ADS BASED ON PERSONAL DATA (PROFILE3=1,2) [N=2,816]: PROFILE4 How much, if at all, do you understand what data about you is being used to create these advertisements? June 3-17, 2019 14 A great deal 50 Somewhat 31 Not too much 4 Not at all * No Answer 61 PEW RESEARCH CENTER www.pewresearch.org ASK IF EVER SEE ADS BASED ON PERSONAL DATA (PROFILE3=1,2) [N=2,816]: PROFILE5 In general, how well do these advertisements accurately reflect your actual interests and characteristics? June 3-17, 2019 7 Very well 54 Somewhat well 33 Not too well 5 Not well at all * No Answer ASK ALL: [RANDOMIZE ORDER OF QUESTIONS A-F] DATAUSE Now thinking about other ways that private companies and government agencies might use data or information they collect about people… In your opinion, do you think the following uses of data or information are acceptable or unacceptable? Acceptable Unacceptable Not sure No Answer a. [FORM 1 [N=2,140] The government collecting data about all Americans to assess who might be a potential terrorist threat June 3-17, 2019 49 31 19 * b. [FORM 1 [N=2,140]] Poorly performing schools sharing data about their students with a nonprofit group seeking to help improve educational outcomes June 3-17, 2019 49 27 24 * c. [FORM 1 [N=2,140]] DNA testing companies sharing their customers’ genetic data with law enforcement agencies in order to help solve crimes June 3-17, 2019 48 33 18 1 d. [FORM 2 [N=2,132]] Makers of a fitness tracking app sharing their users’ data with medical researchers seeking to better understand the link between exercise and heart disease June 3-17, 2019 41 35 22 1 62 PEW RESEARCH CENTER www.pewresearch.org e. [FORM 2 [N=2,132]] A social media company monitoring its users’ posts for signs of depression, so they can identify people who are at risk of self-harm and connect them to counseling services June 3-17, 2019 27 45 27 1 f. [FORM 2 [N=2,132]] Makers of smart speakers sharing audio recordings of their customers with law enforcement to help with criminal investigations June 3-17, 2019 25 49 25 1 ASK ALL: [RANDOMIZE ORDER OF QUESTIONS A-C] DB1 In the last 12 months, have you had someone… [RANDOMIZE] Yes No No Answer a. Put fraudulent charges on your debit or credit card June 3-17, 2019 21 78 1 b. Take over your social media or email account without your permission June 3-17, 2019 8 91 1 c. Attempt to open a line of credit or apply for a loan using your name June 3-17, 2019 6 93 1 www-webology-org-4616 ---- Content Analysis of Indonesian Academic Libraries’ Use of Instagram 27 http://www.webology.org/2018/v15n2/a170.pdf Webology, Volume 15, Number 2, December, 2018 Home Table of Contents Titles & Subject Index Authors Index Content Analysis of Indonesian Academic Libraries’ Use of Instagram Yeni Budi Rachman Corresponding Author, Lecturer, Department of Library and Information Science, Faculty of Humanities, Universitas Indonesia, Indonesia. ORCID. E-mail: yeni.budi@ui.ac.id Hana Mutiarani Undergraduate Student, Library Science, Department of Library and Information Science, Faculty of Humanities, Universitas Indonesia, Indonesia. E-mail: hanamutiarani@gmail.com Dinda Ayunindia Putri Undergraduate Student, Library Science, Department of Library and Information Science, Faculty of Humanities, Universitas Indonesia, Indonesia. E-mail: dinda.ayunindia@ui.ac.id Received June 29, 2018; Accepted December 25, 2018 Abstract This study aims to analyze academic libraries' Instagram content which focused on Instagram posts. A total of five (5) selected academic library Instagram accounts in Indonesia were examined in this study. The analysis is divided into four group explanation which comprises analysis on profile pictures, posting schedule, type of information posted on Instagram, and interaction with users. The results show that libraries mostly used Instagram as online marketing tool to inform their users about library-related things and events. The findings also revealed that only two of five libraries which seem to respond comments and questions from users, while 4 of five libraries updated their contents regularly. This study recommends that library should take the opportunity of engaging users by communicating actively on social media, in this study, Instagram. Keywords Instagram; Content analysis; Social media; Academic library; Indonesia http://www.webology.org/index.html http://www.webology.org/2018/v15n2/toc.html http://www.webology.org/titleindex.html http://www.webology.org/authorindex.html https://orcid.org/0000-0002-6644-1955 28 http://www.webology.org/2018/v15n2/a170.pdf Introduction Instagram is a popular social media platform among young adults which used primarily for sharing visual contents (Hild, 2014). Instagram launched their application in October 2010. In Indonesia, Instagram is currently one of the most popular social network used by Internet user. It has been used widely as promotion tool as well as communication instrument to clients. According to the JakartaGlobe in 2017, Instagram claimed to have 45 million active users every month in Indonesia. This made Indonesia as the largest Instagram communicty in Asia Pacific. Indonesian Internet Service Provider Association (APJIII) in 2017 recorded there were 143 million Internet users in Indonesia, with young adults (19-34 years old) active users. It is also found that 87.12 percent of Internet users used social media platforms. These facts afforded library the opportunity to use Instagram as effective platform to engage with their users, as well as promotion tool. Garofalo (2013) explained that academic libraries (university, faculty, and college libraries) can use social media networking to notify their communities about news, events, library resources, and library services. Steiner (2012, p. 2-3) listed some examples of social media: social networking platforms, social news sites, location-based social networking services, website and group creation software, wikis, video and photosharing sites, social bookmarking tools, blogging and vlogging sites, microblogging sites, book sharing sites, community question and answers sites, and virtual world. Based on the above explanation, Instagram is an example of video and photosharing sites. Instagram is considered as effective social media platform to get engage with users by sharing pictures and video of what happening in the library. Regarding to King (2015, p. 12), libraries might taking photo and short video, also providing captions or comments to each images posted. In addition, the pictures might be more findable by adding keywords based hashtags to each photo or video. Libraries can share photos or videos of whats happening at the library, and you can use Instagram to give your library a human touch—to share the human side of the library (King, 2015, p. 12). However, social media is not merely a tool to promote the library. Social media also act as a useful platform to connect with users. As Crawford (2013) stated, the effective use of social networks and online publishing can put the library in closer touch with the community and make the library become more effective. As Steiner (2012, p. 1) explained, that the aim of social media is to form a large, internally communicative collective that works together to create meaning and content. Nowadays, academic libraries in Indonesia have been used Instagram for online marketing and reaching their users across the distance. The libraries share photos, events, posters, and any important information related to the library. Therefore, since academic libraries are taking the advantage of Instagram to engage with the patrons and promote their services and collection, it is necessary to explore how the Instagram is used and what kind of information communicate by the library. This preliminary study aims to analyze selected Indonesian academic libraries’ 29 http://www.webology.org/2018/v15n2/a170.pdf Instagram posts and classify information posted into categories. This study also expected to give suggestion for the library to maximize the application of Instagram as useful tool for marketing and engaging the users. Literature Review Mon (2015) stated that establishing a social media presence extends the library’s physical manifestation into virtual space and increases the library’s visibility, reach, and impact. Further, Mon (2015) also explained that libraries have used their social media sites for multiple purposes encompassing: evaluation of the library from the patrons’ view, outreach new people for library services, marketing library resources, program and services, advocacy to gain community support, enhancing library activities (reference service, collection development) as well as supporting learning agent. However, the library also needs to maintain their social accounts in order to get engage with their users continuously. The utilization of social media in the academic libraries has been increased year by year. The development of information technology made social media easy to be used and accessed. People can share any news and information instantly without being limited by time and distance. However, academic libraries need to aware what kind of information do they share to reach the users. The literature of the application of social media by libraries is available broad ranging. Research on particular topic has been conducted by many experts in the field of library and information science. Number amount of the literature also available open access on the Internet. Below is a broad review according to the topics on the content analysis of social media posts by the library. Al-Daihani and AlAwadhi (2015) carried out a research on "Exploring academic libraries’ use of Twitter: a content analysis". The aim of their study was to analyze academic libraries' twitter content. There were 17 academic library accounts examined on their study. The finding revealed that academic libraries used twitter as multifaceted tool. De Sarkar (2017) investigated how libraries integrating photo-sharing applications into the library activities. A total of 160 selected library websites from four continents were examined in this study. The result also found that libraries are taking the chance of photo-sharing application to encourage digital inclusion and participation. Kahn and Bhatti (2012) conducted a research entitled "Application of social media in marketing of library and information services: A case study from Pakistan". They elaborated various application of social media for marketing use in the library. The result also revealed some problems faced by libraries, which comprises the lack of knowledge in managing social media accounts, inadequate training chances of using social media, also bad electricity power and Internet connections. 30 http://www.webology.org/2018/v15n2/a170.pdf Hild (2014) provided successfull strategies experienced by Indiana University’s Herman B. Wells Library. The finding claims that Instagram offers opportunities for the library to connect with users. The experience of Herman B. Wells Library in using Instagram has been very positive. Similiar experiences also shared by Salomon (2013). Salomon (2013) shared UCLA Powell Library experiences in using Instagram. The result shows that the library more success connecting with the students and engaging in teaching and learning on Instagram than any other social network (Salomon, 2013). Instagram makes sense for the library because it reaches a young, urban, and diverse demographic (Salomon, 2013). Buarki and Alkhateeb (2018) conducted research on the use of hashtags to retrive information on the web, including Instagram. The research shows how hashtags allowed people to utter their interest to affirm common concern and networks them through social media tools. Materials and Methods This work presents a descriptive analysis of Instagram use by five selected academic libraries in Indonesia based on content analysis. The academic libraries’ posts were observed and examined during April 1st – May 7th, 2018. Those libraries were selected based on the following criterias: 1. The library belongs to the top 15 list of universities in Indonesia (according to the 2017 list of the country’s 100 top universities by Directorate General of Higher Education, Ministry of Research, Technology and Higher Education of the Republic of Indonesia). 2. The library is a major academic library. 3. The account is actively used by the library, on weekly or monthly basis. This study elaborated academic libraries’ use of Instagram which focused on instagram posts. The data was collected in response to the following questions: 1. What profile picture do libraries use on Instagram? 2. How do libraries keeping update their posts on Instagram? 3. What type of information do the libraries post on Instagram? What style of language do they use? 4. How do libraries communicate and interact with their users on Instagram? Results A. Profile Pictures At the first step, researchers identified the total followers of each selected account during April 1st – May 7th, 2018. The findings show that 2 libraries have between 2000-2600 followers, while another 2 has less than 1000 followers. Only 1 library which has more than 4000 followers. In using social media, numbers of followers who following our account is important. By having more followers, library has better opportunity to keep user update and see what library posts. 31 http://www.webology.org/2018/v15n2/a170.pdf In respect to the 1st research questions, “What profile picture do libraries use on Instagram?” it is recognized that 3 of 5 libraries use “library building photograph”, “library building silhouette” and “library logo” for their profile picture. Two others use poster of “World Book Day” and “I Love Library” as their profile pictures. By using a profile photo depicting the library, it conveys the message that social media account is owned by the library. All libraries also display a clear profile description regarding their accounts and give the URL link to the library website. Conner (2017) stated the profile description of social media accounts tell visitors about who we are, what we are about and what the followers can expect to see if they follow our account. Researchers then checked the other social media platforms used by all respondent libraries. Based on the findings, it is found that 3 of five libraries use different kind of profile pictures for another social media platforms. It is assumed that libraries use two type of profile pictures: constantly and temporarily profile pictures. Profile picture is a form of non verbal communication which tells public about who we are. Mon (2015) stated that social media profiles typically include a mixture of personal pictures and biographical text, which raises questions of “impression management” in terms of how a library should ideally be representing its “self ” in social sites. Afterall, Mon (2015) also explained that practices in managing library social site profiles are constantly changing. Many libraries then changing their social profile banner images to commemorate events. Each social media accounts (in different platform) owned by the library should be consistently used the same profile photo or logo. B. Posting schedule The second research question was “How do libraries keeping update their posts on Instagram?, what style of language do they use?” The result shows that 4 of 5 libraries updated regularly their accounts, with average post 1-4 times a week. Type of content mostly a poster or infographic and short video. Optimizing the libraries’ social media accounts will succed the marketing goals. Garofalo (2013) recommends that academic library social media should post updates at least twice a week. Libraries can add as well as update photos or videos as events happen. Therefore, the libraries need to keep their accounts frequently and consistently updated. King (2015) stated that lack of posting consistency is another major reason why many library social media channels struggle to gain followers and engagement. Further, King (2015, p. 17) also suggested that the easiest way to fix posting inconsistency is to simply schedule the task of posting: if the library’s goal is to post once a day just schedule that task in the calendar. C. Type of information posted on Instagram Regarding to the third research question, “What type of information do the libraries post on Instagram?” Researchers then observed Instagram posts of the libraries during observation time (April 1st – May 7th, 2018). There were 86 instagram posts identified. Majority posts were 32 http://www.webology.org/2018/v15n2/a170.pdf images and posters (71 posts), while total video posted on their accounts are 15 posts. Table 1. Total posts identified Instagram Account Total posts Types Library “A” 6 posts All images and posters Library “B” 28 posts Videos, images and posters Library “C” 38 posts Videos, images and posters Library “D” 3 posts All posters Library “E” 11 posts Videos, images and posters The results then categorized into 11 type of information posted on Instagram by the libraries. The categories were adapted from Al-Daihani and AlAwadhi (2015). The categories are comprises: commemorate days; greeting the users; fundraising; library closing information; library new collections; library policies and procedures; library visit; recreation service, online database and e-resources training; today’s events and upcoming library events. Table 2 below is detailed description of total identified posts. Table 2. Information posted on Instagram Type of Information Total posts Commemorate days 14 Greeting the users 11 Fundraising 1 Library closing information 1 Library new collections 1 Library policies and procedures 3 Library visit 13 Recreation service 2 Online database and e-resources training 13 Documentation of today’s events 22 Upcoming library events 5 Total posts identified 86 Based on the table above, researchers then made percentage of each type information posted on Instagram. The percentage is presentedd on Figure 1. 33 http://www.webology.org/2018/v15n2/a170.pdf Diagram 1. Percentage of Information Posted on Instagram 16% 13% 1% 1% 1% 4% 15% 2% 15% 26% 6% Commemorate days Greeting the users Fundraising Library closing information Library new collections Library policies and procedures Library visit Recreation service Online database and e-resources training Documentation of today's events Upcoming library events Figure 1. Percentage of information posted on Instagram Figure 1 shows that libraries have mainly posted to share everything library-related with total percentage 38 percent, which consist of library closing information (1%), library new collections (1%), library policies and procedures (4%), library visit (15%), recreation service (2%), online database and e-resources training (15%). On the second sequence, it is identified that libraries posted about upcoming (6%) and documentation of today’s events (26%) with total percentage 32 percent. On the third and fourth sequence, libraries posted regarding commemorate days (16%) and to build community by greeting the users (13%). The last sequence, only 1 post which related to the fundraising (1%). This finding seems in line with Garofalo’s study which conducted survey towards 157 academic librarians. Garofalo (2013) presented result that the most popular use of social media in an academic library is to share anything library-related (90.4%), while the second and third popular use include advertising services (80.3%) and marketing library events (79%). However, only 43 percent of respondents had used social media to build a community, while 23.6 percent used social media to encourage registration in library courses (Garofalo, 2013). Social media like Instagrams allow users to always get engaged with the library without having to come physically 34 http://www.webology.org/2018/v15n2/a170.pdf to the library. Promotion through social media can save the library budget and deliver information widely without being limited by time and distance. According to the style of language use by the libraries, 3 of 5 libraries use formal language for every posts on Instagram. The other 2 libraries use formal and informal language for their posts and response to users. The libraries sometimes use english in their posts. Total posts identified in Indonesian language were 64 posts and English were 12 posts. The posts usually completed by hashtags (#) relating to the contents. For example, #bookfair (upcoming library events) and #harikartini (commemorate days). Total hashtags identified for 86 posts were 319 hashtags, with average hashtags for each post is 4 (four) hashtags. The most hashtag used were ‘library’, ‘academic library names’, and ‘university names’. Indonesian language (Bahasa Indonesia) and English were also used for hashtags. The use of hashtags of libraries is considered effective and beneficial to expose the library to the targeted users. However, further research on hashtags use by the academic libraries need to be conducted to identify how the libraries apply hashtags in their posts. Findings that libraries try to build community by posting pictures and videos for greeting the users is identified as a good signal. Xie and Stevenson (2014) defined that social media is a means of communication through the Internet that enables social interaction. Social interaction happens with two way communications. By greeting the users through social media, it is expected that libraries could build community in social media. Garofalo (2013, pp. 30-31) explained, “Community-building on social media involves connections. These connections can include conversations where ideas and thoughts are exchanged.” (Garofalo, 2013, p. 30) “ A commitment to sustain social media networking conversations requires resources. These resources include, for example, staff time to develop the postings for the conversations and time to interact and cultivate the connections that can lead to a community presence.” (Garofalo, 2013, p. 30) “Sometimes asking a question is a way to start a conversation. You can practice this in any social media context – blogs, Facebook, etc. When someone posts on social media, ask them for more details, or why they feel that way. You will have the opportunity to start to build a relationship as you learn more about the topic as well as about that person. This concept can then be brought into the library’s social media efforts. The library should be open to receiving comments and always responding to what is shared.” 35 http://www.webology.org/2018/v15n2/a170.pdf (Garofalo, 2013, p. 31) At this point, it is not just enough for libraries to posts only for greeting users, but also should respond to their users in social media. D. Interaction with user Regarding to the pattern and interaction between libraries and users on Instagram, it is identified that interaction between libraries and users is considered limited. Only two of five libraries which seems to respond comments and questions from users. The libraries responded to user regarding questions about service hours and specific collections. Table 3. Comments on Instagram Accounts Instagram Account Total Comments Responds to Users Library “A” 2 comments - Library “B” 5 comments - Library “C” 6 comments 2 responses Library “D” - - Library “E” 57 comments 4 responses Unfortunatelly, researchers were not able to identify interaction built through personal message sent by users to the library. Conner (2017) revealed spending time commenting on posts within the community and on target clients is important. By responding to user comments and complaints, then the user will feel appreciated and understood. Therefore, social media encourages and expects two-way communication, not just 'tell something' in the absence of interaction. In addition, 4 of 5 libraries also using emoticons and emoji while posting or interacting with users. The use of emoticons and emoji “smile” while responding or interacting with users convey the impression of enthusiastic and happy. Stark and Crawford (2015) explained that the emoji are popular digital pictograph that can appear in text messages, emails, and on social media platforms. These characters are generally understood as a lighthearted, almost comedic form of communication, but they have a rich and complex socioeconomic history that precedes the range of mobile devices where they commonly appear (Stark & Crawford, 2015). Emoji and emoticons helps the librarian to connect emotionally and maintaining social ties with users in the digital environment. Conclussion The analysis revealed that libraries mostly used Instagram as online marketing tool to inform their users about library-related things and events. However, as explained before, optimizing the libraries’ social media accounts will succed the marketing goals. This study suggests the libraries 36 http://www.webology.org/2018/v15n2/a170.pdf need to update their posts regularly. This study recommends libraries should consider carefully when choosing the profile picture that represents their image and brand. The libraries’ strategy to pick representative profile picture such as library logo or building photographs is considered as good strategy to reflect library’s brand. It is also important to keep the design of profile pictures as consistent as possible. This study also suggests library to keep the same profile picture accross platforms. The findings also reveal that all libraries provide a brief and accurate description regarding their accounts as well as displaying the URL link to the library website. Brief description of library’s profile should be informative and easy to read. Along with that, accurate URL link to the library website allows users to explore more about the resources, programs and services provided by the library. However, libraries need to develop and maintain interactive communication with users in online environment. According to Garofalo (2013), social media conversations provide opportunities for interactions with community members at the point in time when they have an interest or a question, rather than whenever they happen to call, visit, or email the library. Hence, it is good for the library to take the opportunity of engaging users. Acknowledgement This work is supported by Hibah PITTA 2018 funded by DRPM Universitas Indonesia No. 2016/UN2.R3.1/HKP.05.00/2018 References Al-Daihani, S. M., & AlAwadhi, Suha A. (2015). Exploring academic libraries’ use of Twitter: A content analysis. The Electronic Library, 33 (6), 1002-1015. Asosiasi Penyelenggara Jasa Internet Indonesia (Indonesian Internet Service Providers Association). (2017). Infografis penetrasi dan perilaku pengguna Internet Indonesia [Infographic of Internet Users in Indonesia]. Retrieved July 20, 2018, from https://apjii.or.id/content/read/39/342/Hasil- Survei-Penetrasi-dan-Perilaku-Pengguna-Internet-Indonesia-2017 Buarki, H. & Alkhateeb, Bashaer. (2018). Use of hashtags to retrieve information on the web. The Electronic Library, 36 (2), 286-304. Conner, C. (2017, February 16). How to build your brand on instagram: 8 steps to double your following. Forbes. Retrieved July 20, 2018, from https://www.forbes.com/sites/cherylsnappconner/2017/02/16/use-these-8-steps-for-branding- with-instagram-like-a-star/ Crawford, W. (2013). Introduction. In Harmon, C. & Messina, M. (Eds). Using social media in libraries: best practices (ix-xii). United Kingdom: Scarecrow Press, Inc. De Sarkar, T. (2017). Adopting a photo-sharing site as a library tool: A web-based survey. Information and Learning Science, 118(3/4), 185-209. Directorate General of Higher Education, Ministry of Research, Technology and Higher Education of 37 http://www.webology.org/2018/v15n2/a170.pdf the Republic of Indonesia. (2017). 100 besar perguruan tinggi non politeknik dan 25 besar perguruan tinggi politeknik di Indonesia tahun 2017 [Top 100 list of Indonesian Universities and Top 25 of Indonesian Polytechnics, year 2017]. Retrieved July 20, 2018, from https://www.ristekdikti.go.id/100-besar-perguruan-tinggi-non-politeknik-dan25-besar- perguruan-tinggi-politeknik-di-indonesia-tahun-2017/ Ganesha, A (2017, July 27). Instagram has 45 million users in indonesia, the largest in Asia Pacific. JakartaGlobe. Retrieved July 20, 2018, from http://jakartaglobe.id/news/instagram-45-million- users-indonesia-largest-asia-pacific/ Garofalo, D. (2013). Building communities: Social networking for academic libraries. UK: Chandos Publishing Social Media. Hild, K. L. (2014). Outreach and engagement through Instagram: Experiences with the Herman B Wells Library account. Indiana Libraries, 33(2), 30-32. King, D. L. (2015). Managing your library's social media channels. Library Technology Reports, 51(1), 5-35. Khan, S. A., & Bhatti, R. (2012). Application of social media in marketing of library and information services: A case study from Pakistan. Webology, 9(1), Article 93. Retrieved July 20, 2018, from http://www.webology.org/2012/v9n1/a93.html Mon, L. (2015). Social media and library services. A publication in the Morgan & Claypool publishers series. Synthesis Lectures on Information Concepts, Retrieval, and Services #40. Morgan & Claypool Publishers. DOI 10.2200/S00634ED1V01Y201503ICR040 Salomon, D. (2013). Moving on from Facebook: Using Instagram to connect with undergraduates and engage in teaching and learning. College & Research Libraries News. Association of College & Research Libraries, 74(8), 408-412. Stark, L. & Crawford, K. (2015). The conservatism of emoji: Work, affect, and communication. Social Media + Society, 1(2). Steiner, S. K. (2012). Strategic panning for social media in libraries. UK: Facet Publishing. Xie, I. & Stevenson, J. (2014). Social media application in digital libraries. Online Information Review, 38(4), 502-523. Bibliographic information of this paper for citing: Rachman, Yeni Budi, Mutiarani, Hana, & Ayunindia Putri, Dinda (2018). "Content analysis of Indonesian academic libraries’ use of Instagram." Webology, 15(2), Article 170. Available at: http://www.webology.org/2018/v15n2/a170.pdf Copyright © 2018, Yeni Budi Rachman, Hana Mutiarani and Dinda Ayunindia Putri. https://scholar.google.com/citations?user=ZAm8FoMAAAAJ www-wired-com-2730 ---- The Privacy Battle to Save Google From Itself | WIRED Skip to main content Open Navigation Menu To revist this article, visit My Profile, then View saved stories. Close Alert The Privacy Battle to Save Google From Itself Backchannel Business Culture Gear Ideas Science Security More To revist this article, visit My Profile, then View saved stories. Close Alert Sign In Search Backchannel Business Culture Gear Ideas Science Security Lily Hay Newman Security 11.01.2018 10:11 AM The Privacy Battle to Save Google From Itself Interviews with over a dozen current and former Google employees highlight a commitment to privacy—and the inherent tensions that creates. To revist this article, visit My Profile, then View saved stories. FISK To revist this article, visit My Profile, then View saved stories. Over two days during the summer of 2009, experts from inside and outside Google met to forge a roadmap for how the company would approach user privacy. At the time, Google was under fire for its data collection practices and user tracking. The summit was designed to codify ways that users could feel more in control. Engineer Amanda Walker, then in her third year at Google and now the company’s software engineering manager of privacy infrastructure, jotted down notes on a paper worksheet during one of the summit’s sessions. “HMW: Mitigate Impact of bad Gov’t + 3rd party requests,” she wrote, using shorthand for “how might we.” A few suggestions followed: “Discourage abusive requests. Make privacy measurable/surface rising threats. Industry wide.” It was the seed of what would eventually become Google’s suite of transparency reports that, among other things, disclose government requests for data. It also was just one of several features the group brainstormed that summer that became a reality. An idea called “persona management” became Chrome and Android profiles. “Universal preferences” became My Account and My Activity. And “private search” turned into controls to be able to see, pause, and delete search queries and other activity. Longtime Google employees remember the 2009 privacy summit as a turning point. “A lot of these were a lot more work than we anticipated at the time, but it’s reassuring to me that I think we got the big things right,” Walker says. And yet, nearly a decade later, privacy controversies continue to plague Google. Just in recent months, the Associated Press revealed that Google continued to store user location data on Android and iOS even when they paused collection in a privacy setting called Location History. At the end of September, Chrome had to walk back a change to user logins meant to improve privacy on shared devices after the revision prompted a different set of concerns. Google then shuttered Google+ in October, after The Wall Street Journal reported on a previously undisclosed data exposure that left personal information from more than 500,000 of the social network’s users out in the open. And Google is once again building censored services for China. In this seemingly unshakeable cycle of improvements and gaffes, it's nearly impossible to make a full accounting of Google's user privacy impacts and protections. But it's critical to understand how the people on the front lines of that fight think about their jobs, and how it fits in with the fundamental truth of how Google makes money. Google’s privacy apparatus—which spans the globe and includes dedicated stand-alone teams, groups within other teams, and an extensive leadership structure—comprises thousands of employees and billions of dollars in cumulative investment. More than a dozen Google employees who work on privacy at all levels talked with WIRED in recent weeks about the massive scale and scope of these efforts. Every employee—from research scientists to engineers, program managers, and executives—described a single shared goal: to respect Google users and help them understand and control their data as they generate it in real time on Google’s services. But Google is not a consumer software company, or even a search company. It’s an ad company. It collects exhaustive data about its users in the service of brokering ad sales around the web. To do so, Google requires an extensive understanding of the backgrounds, browsing habits, preferences, purchases, and lives of as many web users as possible, gleaned through massive data aggregation and analysis. In third-quarter earnings announced last week, Google’s parent company, Alphabet, reported $33.7 billion in revenue. About 86 percent of that came from Google’s ad business. Advertisement “Google does a good job of protecting your data from hackers, protecting you from phishing, making it easier to zero out your search history or go incognito,” says Douglas Schmidt, a computer science researcher at Vanderbilt University who has studied Google's user data collection and retention policies. “But their business model is to collect as much data about you as possible and cross-correlate it so they can try to link your online persona with your offline persona. This tracking is just absolutely essential to their business. 'Surveillance capitalism' is a perfect phrase for it.” "We saw and had to tackle these challenges years and years before most other people." Lea Kissner, Google And yet Google has also played a major role in creating the superstructure of what corporate user data protections and transparency mechanisms look like today. Transparency reports have become a staple among tech giants, as have other user security and privacy features Google offered early, like tailored settings walk-throughs. And while Apple only recently introduced an option to download data—prompted by Europe’s GDPR omnibus privacy law—Google launched its first such tool, known as Takeout, in 2011. The company also continues to improve and refine its options for user privacy controls. One recent move involves surfacing information about user data flow and settings options directly in the main screens of search results, so users are actively prompted to consider these issues all the time. “We saw and had to tackle these challenges years and years before most other people,” says Lea Kissner, Google’s global lead of privacy technology, who has been at the company for more than 11 years and oversees the NightWatch privacy audit program. “When I look back at where we were and how much we know now and how much we’ve built, I’m really proud of what we did. But you’re never going to be done.” Google’s privacy-focused employees say they see no conflict between their work and the cash-generating side of the business, and that they don’t feel pressure to pull punches. “We do a pretty good job of firewalling the ads business from the products we build,” says Ben Smith, a Google fellow and vice president of engineering. “But ads do fund a whole lot of free services. When we talk about building for everyone, we want to build for the people who can’t afford an expensive phone and can’t afford a $20 per month subscription. And I think that democratization of access to data is a good thing for society and the world.” Google can afford to develop top-quality consumer products—complete with expansive user security and abuse protections—and offer them at no monetary cost to anyone who wants to use them worldwide. Not many companies can. Google also funds efforts to improve web performance, stability, and security that raise the bar for the internet at large. But whether all of this is “free” is subject to debate. Google users pay for the services, in a very real sense, with their personal data. “I think the big problem is that we give much more data to Google than it needs,” says Guillaume Chaslot, a former Google engineer who worked on YouTube’s recommendations algorithm and now runs the watchdog group AlgoTransparency. “When something is free, we behave irrationally, and that’s how users behave with Google. It makes no sense that Google keeps our data forever.” Google says it does delete select information automatically after a certain period of time, like browser width and height. But from a business perspective, keeping much of it indefinitely makes plenty of sense. “When you depend on insight from data, well, you need the data,” says Lukasz Olejnik, a security and privacy researcher and member of the W3C Technical Architecture Group. Both current and former Google privacy employees insist that there is no internal pressure to water down privacy protections. “One of the things that was really persistent at Google, and which was really hard to explain to outsiders, was just how committed everyone was to privacy,” says Yonatan Zunger, a former senior privacy engineer at Google who left in mid-2017 to work on privacy engineering and data protection at the workplace behavior startup Humu. “I pretty much never had to convince anyone of its importance.” Advertisement Google has also increasingly prioritized building in privacy protections for new services and features early in the development process. Led by Kissner, the effort has helped avoid tensions that arise when developers try to add protections when a deadline looms. Just how soon those privacy considerations kick in, though, is unclear. At a congressional hearing in September about a potential censored search engine for China, known as Project Dragonfly, Keith Enright, Google’s chief privacy officer, testified that his team was not yet involved in the project. "It makes no sense that Google keeps our data forever." Guillaume Chaslot, Former Google Engineer Meanwhile, Google has also devoted significant resources to developing its Security and Privacy Checkup tools, which walk users through a sort of explanatory checklist of how Google’s data controls work and what options are available. The project has a special emphasis on developing privacy language that is actually understandable, providing its privacy policy in 60 languages and Google account pages in 150 languages, so nothing is lost in translation. “Users are not the experts in privacy and security, it’s actually Google,” says Guemmy Kim, product management lead for Google account security. “Google should be telling users what’s wrong, we should point out the anomalies, and guide users through their settings.” And Google is often on the front lines of rigorous artificial intelligence, computer science, and digital privacy research, thanks to a deep bullpen of former academics who continue to publish under Google’s auspices. Privacy research coming from inside Google potentially poses conflicts of interest—you wouldn’t hire a lion to research antelope safety. But academics, including those who have investigated privacy behaviors in Google services, say its research is well regarded. “I think their academic work on privacy is solid,” says Gunes Acar, a postdoctoral researcher at Princeton, who studies digital data flow and overreach. “Privacy-related papers from Google researchers and engineers are published at top venues and are of top quality.” In the past few years, for instance, Google researchers have helped develop machine-learning techniques that can build models off of disparate data sets, so there never needs to be one centralized repository of information. The mechanism, known as federated learning, allows Google (or anyone) to develop predictive algorithms locally on your device or any user devices without needing to remove it. This means that the models can train and mature on a collective data set contributed by millions of devices without sending the information to an entity’s servers somewhere else. The technique dovetails in many ways with the concept of differential privacy, the statistical process of analyzing data from a population without learning about individuals in it. Both are next-generation techniques that reduce the amount of personal user data an entity like Google holds, which has the added benefit of improving privacy defenses against criminal hackers, intelligence agencies, or other government intrusions. “I was hired in the big buildup of security at Google about nine years ago with the explicit mandate of looking at new things that push the envelope,” says Úlfar Erlingsson, a senior staff research scientist who heads work on improving machine-learning algorithm protections. “Having worked in security and privacy for 25 years, I know that there’s usually not a good solution—usually there’s a bad solution and then we struggle a lot to make it work. But with machine learning we can train these machines in such a way that they truly don’t capture any details about people.” Google has also led on and expanded its work to produce transparency reports. The project has grown from an annual report on government requests launched in 2010 into an array of analyses and data sets for users to track over time on a range of issues like content removals due to copyright, YouTube community guidelines enforcement, search entry removals under European privacy law, and even a report about political advertising on Google. Michee Smith, the lead project manager for transparency reports, oversees a team of 10 to 15 engineers, product people, policy experts, and lawyers who work together to keep the reports coming and collaborate with various teams around Google to get the right data. The group prioritizes making its reports as easy as possible for people to understand and dig through. Advertisement “As a company we’re getting big, but we’re not trying to get evil just because we’re getting big,” she says. “With these really important topics, we’re putting data out there, so if you see a trend or you notice something you can hold us accountable. The average user is not aware of all the laws and policies that can impact the flow of information online, but we are. So my ultimate goal is for users to feel like we have your back.” And yet Google regularly stumbles. Some of the company’s issues fit in with broader revelations over the past couple of years that massive user platforms like Facebook have underestimated, or failed to consider, the fundamental impact their services—and business priorities—could have on societies. “Google is strong on having people with remarkable security and privacy expertise, but reconciling privacy guarantees with business needs is a challenging topic anywhere,” independent researcher Olejnik says. “A potential issue is underestimating the possible misuse of high-impact technologies like Google’s Real-Time Bidding ads platform. I would argue that the risks could have been foreseen.” Over the past few years, Google has been criticized, and even boycotted, for allowing inappropriate or problematic content on its ad networks. In spite of more than a decade of industry-leading work on privacy from Google, some see the carousel of errors as proof of a sort of Google privacy Groundhog Day. But the company in many cases also created the technology that solves those same problems, not just for itself but for the whole industry. Many of Google’s critics also note that they believe it is possible—at least from a technological perspective—to develop user services that are funded by ads, but still silo and control data enough to balance user privacy with business interests. “It’s entirely possible for a company like Google to make good, usable products that strike a balance between privacy and profit,” Johns Hopkins cryptographer Matthew Green wrote at the beginning of October after publicly railing against a problematic change to Chrome. “It’s just that without some countervailing pressure forcing Google to hold up their end of the bargain, it’s going to be increasingly hard for Google executives to justify it.” "They have the ability to change the trajectory here, but they don’t allow for any idea that things could be a bit different." Jason Kint, Digital Content Next Nearly everyone WIRED spoke to at Google for this story attributed the company’s privacy mistakes and failures to Google’s unique position at the forefront of encountering and dealing with unprecedented data flow challenges. “Google, by virtue of what we do and the velocity that we do it at, we are necessarily the petri dish that privacy engineering is being cultivated in,” says Google's Enright. “Most of our fumbles and missteps in my experience can be tracked to us leaning so far into our own optimism that we failed to benefit from the wisdom of others.” The other option, though, would simply be to move a bit more slowly. Google’s critics say the company could do a better job of considering privacy and developing safeguards before its business innovations create problems. “There’s no doubt that there are some of the smartest minds in privacy, data protection, law, and engineering inside these companies—Google especially,” says Jason Kint, CEO of the digital publishing trade organization Digital Content Next. (WIRED parent company Condé Nast is a member.) “They pride themselves on moonshots, and they’ve got just immense amounts of wealth and profitable business margin and growth. But they say, ‘Well, this is our business model, and if we don’t have this business model then we’re going to have to charge for access.’ It’s a very binary view. They have the ability to change the trajectory here, but they don’t allow for any idea that things could be a bit different.” Zunger, the former Google privacy engineer, points out that a big challenge for the company is that research and surveys consistently show that many people don’t really understand their own privacy-related concerns, beyond vague awareness that some kind of danger exists. As a result, he says, people level criticisms against and requests of Google that aren’t necessarily constructive or actionable in themselves. Advertisement But Zunger notes an even more subtle reason that people working at Google may not see the same contradictions embedded in the company that some outsiders view as inherent. “There's one aspect which is always going to be hard to address at a company like Google, which is when people have concerns that the mere existence of a single large pile of data is itself dangerous,” Zunger says. “People who feel this way generally aren't going to come work at Google, and so this kind of concern is generally not represented very well. When Googlers address it, they do so by asking the more concrete question of ‘OK, what risks could the existence of this data create?’ They don’t try to ask the meta-question of ‘well, what if the data didn't exist at all?’” In thinking about Google’s extensive efforts to safeguard user privacy and the struggles it has faced in trying to do so, this question articulates a radical alternate paradigm—one that Google seems unlikely to convene a summit over. What if the data didn’t exist at all? More Great WIRED Stories Step inside the Air Force's sound-swallowing chamber A stupid simple wonderful way to make Google Docs How McLaren learned to treat its pit crew like athletes In Texas, techies are trying to turn the red state blue PHOTOS: A Blade Runner-esque vision of Tokyo Hungry for even more deep dives on your next favorite topic? Sign up for the Backchannel newsletter Lily Hay Newman is a senior writer at WIRED focused on information security, digital privacy, and hacking. She previously worked as a technology reporter at Slate magazine and was the staff writer for Future Tense, a publication and project of Slate, the New America Foundation, and Arizona State University. Additionally... Read more Senior Writer Featured Video How to Make Your Browsing Data More Private than a Thousand Incognito Windows Thanks to an assist from Congress, your cable company has the legal right to sell your web-browsing data without your consent. This is how to protect your data from preying eyes. Topicsprivacydata privacydatagoogle WIRED is where tomorrow is realized. It is the essential source of information and ideas that make sense of a world in constant transformation. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. More From WIRED Subscribe Newsletters FAQ Wired Staff Press Center Contact Advertise Contact Us Customer Care Send a tip securely to WIRED Jobs RSS Site Map Accessibility Help Condé Nast Store Condé Nast Spotlight Do Not Sell My Personal Info © 2020 Condé Nast. All rights reserved. Use of this site constitutes acceptance of our User Agreement (updated 1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Your California Privacy Rights. Wired may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices www-wired-com-5974 ---- Google Holds Out Against 'Do Not Track' Flag | WIRED Skip to main content Open Navigation Menu To revist this article, visit My Profile, then View saved stories. Close Alert Google Holds Out Against 'Do Not Track' Flag Backchannel Business Culture Gear Ideas Science Security More To revist this article, visit My Profile, then View saved stories. Close Alert Sign In Search Backchannel Business Culture Gear Ideas Science Security Ryan Singel Business 04.15.2011 06:57 PM Google Holds Out Against 'Do Not Track' Flag And then there was Chrome. Apple made it clear this week that the next version of its Safari browser — which will ship with the upcoming version of Mac OS — will include the ability for users to tell websites not to track them, by using what’s known as the ‘Do Not Track’ header, according […] To revist this article, visit My Profile, then View saved stories. To revist this article, visit My Profile, then View saved stories. And then there was Chrome. Apple made it clear this week that the next version of its Safari browser -- which will ship with the upcoming version of Mac OS -- will include the ability for users to tell websites not to track them, by using what's known as the 'Do Not Track' header, according to The Wall Street Journal. It's a technically simple change that Mozilla (the maker of Firefox) and Microsoft (the maker of IE) have already included in their newest browsers. Those companies included the change despite the fact that no one has actually defined what tracking is. So far only two ad networks, Blue Kai and Chitika, have pledged to obey the flag. That leaves Chrome, the browser created by the online-advertising giant Google, alone in not supporting the nascent feature. And according to Google, it has no plans to do so anytime soon. 'The idea of Do Not Track is interesting, but there doesn’t seem to be wide consensus on what tracking really means.'"The idea of ‘Do Not Track’ is interesting, but there doesn’t seem to be wide consensus on what 'tracking' really means, nor on how new proposals could be implemented in a way that respects people’s current privacy controls," a Google spokeswoman told Wired.com by e-mail. "We’re encouraged that standards bodies are working on these issues, and we will continue to be involved closely." Instead of "Do Not Track," Google says it offers a plug-in for Chrome called "Keep My Opt-Outs," which prevents users from deleting opt-out cookies from advertising networks when they delete their cookies. Third-party ad networks, including Google's Display Ad network, use cookies on the sites they advertise on to watch what users do across the net, in order to make guesses about their interests. They then can sell ad space at a premium to advertisers, offering them the opportunity to show ads for trucks only to young men interested in sports, for instance. Currently, none of those networks pays any heed to users who choose to turn on the "Do Not Track" flag, but do pledge to respect opt-out cookies that can be set in bulk on the Network Advertising Initiative opt-out page. Google says it will have a version of the cookie-retaining plug-in for IE and Firefox soon. The plug-in Google built mimics the functionality of one built by Indiana University security researcher Christopher Soghoian in 2009, drawing on Google's own open source code. Ironically, Soghoian was also the first to suggest the idea of a DNT header, rather than a centralized list, and helped build the first prototype last summer. Soghoian says Google's current lack of support from its ad side is "pretty shocking," given that the company just got slapped by the FTC over privacy. "Even more shocking is the lack of support from the Chrome team," Soghoian says, pointing out that Google Chrome routinely supports tech specs that haven't been standardized by the Internet Engineering Task Force or IETF. Still, Google has a point about the ambiguity of "Do Not Track." Continue reading ... In fact, Apple has many of the same concerns. In a new paper about online privacy (.pdf) submitted to the W3C standards-setting body, Apple questioned what "tracking" means online. It argued that sending a "Do Not Track" signal to a website would only work for sites that decide to obey it, calling it "akin to hanging a 'privacy, please' door hanger on an unlocked door –- most will respect it, but the persistent will simply walk in." There is, therefore, an urgent need to document what, fairly exactly, it means. What stops working? If nothing stops working, from the user’s point of view, there is a risk that it will be turned on all the time. Can I login? Buy something? What constitutes ‘track’? If someone buys something, I can obviously record the purchase, and pretty clearly the affect [sic] on my inventory. Am I allowed to record statistical data (e.g. the type of goods bought at different times of day)? At what point does this ‘personally derived data’ turn into ‘tracking’? Advertisement Even though the FTC and the Commerce Department are behind the new technology, both companies are correct that it's not clear what counts as tracking. For instance, if you are signed into your Facebook or Google account, can those sites catalog what you do, even if you have the flag on? What about companies that provide analysis of what users do in bulk on a website -- such as telling you how many people visited a given page and how many pages on average a visitor looks at? And what about so-called "A/B" testing tools that let sites experiment by showing one logo to one set of visitors and another to a different set of users, to see which logo is more likely to convince people to sign up for the service? But Soghoian argues that both Google's ad program and its analytics program already let users opt out, so why not simply adopt the "Do Not Track" flag as another signal to opt out. Answering his own question, he says it's about money that Google stands to lose if users of its browser get an easy way to opt out of its advertising tracking. "The opt-out cookies and their plug-in are not aimed at consumers," Soghoian says. "They are aimed at policy makers. Their purpose is to give them something to talk about when they get called in front of Congress. No one is using this plug-in and they don't expect anyone to use it." Of all the major browser makers, Google would have the most to lose if many people starting setting the flag and companies were forced, by public opinion or law, to obey it. While Google's largest source of ad money -- search ads related to search terms -- doesn't rely on behavioral tracking, its growing business of display advertising (on other websites and in YouTube) does. Ironically, the DNT header is likely not to affect Facebook, the net's single largest display advertiser and the one company Google seems to fear. Although the social networking site knows every page you visit that has a "Like" button or Facebook widget (at least while you are signed into Facebook), the company says it doesn't keep that data for long and doesn't use it to create a profile. Instead, it targets the ads inside Facebook relying on the data its users put in its profile -- which is not likely to count as "tracking" if a spec is finalized. In that process, Google's concerns are being ironed out, according to Soghoian. A first pass by a Mozilla engineer and two Stanford researchers at defining the problem for the IETF suggests that sites that get opt-in consent from users can ignore the flag. So, for example, if Facebook asked users if they would mind having Facebook know what sites they visit around the web with "Like" buttons, Facebook can make use of that data, even if a user has the "Do Not Track" setting. Tracking users around your own site would be fine, as would be analytics software, including those run by third parties, so long as the data isn't shared with other companies. Even if Google adopts it, right now the tool is in some ways toothless. In absence of legislation, the "Do Not Track" header doesn't mean anything legally -- unless a company promises to obey it, but then doesn't. That's a situation the FTC or state attorneys general could look into under current law. But otherwise, an ad network can simply ignore it, with no legal consequences. Privacy legislation introduced this week by Sens. John Kerry (D-Massachusetts) and John McCain (R-Arizona) tightens information-sharing rules, and could include a mandate requiring U.S. companies to follow the DNT flag. Advertisement And finally, Apple and Microsoft's decision to include the "Do Not Track" header in their browsers (and Google's not to) brings up the question of how such a rule would apply on mobile devices and whether there should be a "Do Not Track" flag for mobile apps. Right now, there's no way to get a "Do Not Track" –capable browser on the iPhone, and Android users need to switch to Firefox Mobile to get the flag. Mobile apps have come under scrutiny from the press and even the Justice Department for allegedly mining users' data in secret. But to have a "Do Not Track" setting for apps would require the app platform makers -- Google, Apple, RIM and Microsoft -- to bake it into their OSes, which is a trickier situation businesswise, because the two dominant platform makers, Google and Apple, are battling over supremacy in the growing market for in-app ads. Which is a long way of saying that the "Do Not Track" header is a simple technical change that is likely to have profound effects on the online world and the politics that surround it. Chrome didn't have to be last to the antitracking party, which shows no sign of ending soon, because Google was in on the first call when the idea was proposed, according to Soghoian. "Google could have been first, but instead they will be last," Soghoian said. See Also:- Legislation Would Let You Opt Out of Online Web Tracking In Big Endorsement, AP Embraces Mozilla’s ‘Do Not Track’ Header Add-On Gives Power and Nuance to ‘Do Not Track’ FTC Backs ‘Do Not Track’ Browser Setting Privacy Groups Ask for Online 'Do Not Track' List Analysis: Google’s Ad Targeting Turns Algorithms on You Targeted Ads Will Let You Spy on Them for a Change Internet Ad Industry Begs for Regulation Privacy Groups Urge Curbs on Online Targeting Ryan, a former writer for Wired's Epicenter blog, is the editor of the Threat Level blog. Staff Writer TopicsAdvertisingChromedo not trackFirefox WIRED is where tomorrow is realized. It is the essential source of information and ideas that make sense of a world in constant transformation. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. More From WIRED Subscribe Newsletters FAQ Wired Staff Press Center Contact Advertise Contact Us Customer Care Send a tip securely to WIRED Jobs RSS Site Map Accessibility Help Condé Nast Store Condé Nast Spotlight Do Not Sell My Personal Info © 2020 Condé Nast. All rights reserved. Use of this site constitutes acceptance of our User Agreement (updated 1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Your California Privacy Rights. Wired may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices