Editing Main Page/Teaching Resources/Talking points
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 6: | Line 6: | ||
==== Stakeholders: library workers ==== | ==== Stakeholders: library workers ==== | ||
==== Dealing with common anti-privacy arguments ==== | ==== Dealing with common anti-privacy arguments ==== | ||
− | + | How to talk to people who have negative/hostile/ambivalent attitudes about privacy | |
Consider viewpoint/situation of person making the argument – they are not necessarily bad | Consider viewpoint/situation of person making the argument – they are not necessarily bad | ||
Maybe have not thought about topic before or are information poor | Maybe have not thought about topic before or are information poor | ||
Write all negative statements about privacy you can think of on post it notes | Write all negative statements about privacy you can think of on post it notes | ||
Entire group responds to each one | Entire group responds to each one | ||
− | + | “It’s safer” argument | |
Civil liberties/freedom argument | Civil liberties/freedom argument | ||
Redirect: Would you allow cameras in your workspace? Would you give me your credit card number? | Redirect: Would you allow cameras in your workspace? Would you give me your credit card number? | ||
Line 28: | Line 28: | ||
Ex. DHS using social media data against people at the border | Ex. DHS using social media data against people at the border | ||
Aim for common ground or seeing a different viewpoint – consider alternatives to safer communities other than the “arms race” | Aim for common ground or seeing a different viewpoint – consider alternatives to safer communities other than the “arms race” | ||
− | + | “Convenience” argument | |
Start with validation – it IS convenient – then how does vulnerability become inconvenient | Start with validation – it IS convenient – then how does vulnerability become inconvenient | ||
Ex: it’s convenient to not have to type in your bank password, it’s incredibly inconvenient to track down your data after your identity has been stolen | Ex: it’s convenient to not have to type in your bank password, it’s incredibly inconvenient to track down your data after your identity has been stolen | ||
Line 39: | Line 39: | ||
Maty’s “One Weird Trick” program | Maty’s “One Weird Trick” program | ||
Have you thought about how this could go wrong for you? | Have you thought about how this could go wrong for you? | ||
− | + | “Don’t Care/Why Bother/Doesn’t Impact Me” argument | |
We’re all part of this society and you should care about others | We’re all part of this society and you should care about others | ||
Imagine being in a position where it does impact you | Imagine being in a position where it does impact you | ||
Line 58: | Line 58: | ||
Ex: Serial podcast | Ex: Serial podcast | ||
“You are just a prosecuter’s attention away from chaos” | “You are just a prosecuter’s attention away from chaos” | ||
− | + | “That’s Great/Wow but I’m not going/It’s cool that you care but I don’t” argument (staff focused) | |
Institutional values – assumes that everyone is on board with library ethics 101 | Institutional values – assumes that everyone is on board with library ethics 101 | ||
How can we work within institutional decisions that maybe are not in line with values? | How can we work within institutional decisions that maybe are not in line with values? | ||
Line 66: | Line 66: | ||
We are the only ones who can offer privacy as a service | We are the only ones who can offer privacy as a service | ||
Develop training/print materials for staff and public training | Develop training/print materials for staff and public training | ||
− | + | “I don’t have time/it’s too complicated/it’s overwhelming” argument | |
“One Weird Trick” again | “One Weird Trick” again | ||
Yeah, it is overwhelming and it sucks! And here’s where you can start | Yeah, it is overwhelming and it sucks! And here’s where you can start | ||
Line 76: | Line 76: | ||
Something you will always work toward | Something you will always work toward | ||
Like going to the dentist or working out to maintain health | Like going to the dentist or working out to maintain health | ||
− | + | “Social Media/Self-Branding/Oversharing/Brand Loyalty/Popularity is Important” Argument | |
Your data is your brand | Your data is your brand | ||
Threat model – targeted ads | Threat model – targeted ads | ||
Line 94: | Line 94: | ||
Teens know so much more about privacy skills than you expect | Teens know so much more about privacy skills than you expect | ||
Engage students to share their knowledge | Engage students to share their knowledge | ||
− | + | “What About-ism” Argument | |
You will encounter this argument in any conversation about things you are passionate about | You will encounter this argument in any conversation about things you are passionate about | ||
Of course we care about other things, we’re just addressing this one right now | Of course we care about other things, we’re just addressing this one right now |