Sam Kome
Director of Strategic Initiatives & Information Technology
Claremont Colleges
With the combination of Wireless, Proxy, and ILS data, libraries today have a 360 degree, highly granular view of researcher activity. These data are valuable for operational decisions, however they have immense privacy implications. We will examine these data, their beneficial uses, and the necessary steps needed to protect researchers.
This presentation will be most relevant for libraries with: centralized wireless; centralized authentication; e.g. CAS, LDAP, Shibboleth; EZProxy or other web proxy to electronic resources, and designated patron type (faculty, undergraduate, etc.) information either in the ILS or in the CAS/LDAP/Shibboleth.