Bibliography

Bibliography

American Library Association (2005). ''Privacy tool kit. ''Retrieved from http://www.ala.org/advocacy/privacyconfidentiality/toolkitsprivacy/guidelinesprivacypolicy#data

American Library Association (2014). Safety and security. Retrieved from http://www.ala.org/tools/safety-and-security

Chmara, T. (2012). Privacy and e-books. Knowledge Quest,  40(3), 62-65.

Cyrus, J., & Baggett, M. (2012). Mobile technology: Implications for privacy and librarianship. Reference Librarian,  53(3), 284-296.

Ismail, R., & Zainab, A. (2011). Information systems security in special and public libraries: an assessment of status. Malaysian Journal Of Library & Information Science,  16(2), 45-62.

Kern, M., & Phetteplace, E. (2012). Hardening the Browser. Reference & User Services Quarterly,  51(3), 210-214.

Kuzma, J. (2010). European digital libraries: Web security vulnerabilities. Library Hi Tech, 28(3), 402-413.

Nakashima, E. (2012, January 13). Dhs monitoring of social media concerns civil liberties advocates. Washington Post. Retrieved from http://www.washingtonpost.com/world/national-security/dhs-monitoring-of-social-media-worries-civil-liberties-advocates/2012/01/13/gIQANPO7wP_story.html

Paul, I. (2012, February 22). Google's new privacy policy: How to stay off the grid. Retrieved from http://www.pcworld.com/article/250452

privacy: Mountain View, California. (2012).  Newsletter on Intellectual Freedom,  61<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">(2), 94-95.

<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">Texas State Library and Archives Commission (2011). A sample security policy. Retrieved from https://www.tsl.texas.gov/ld/pubs/compsecurity/ptthreesecpol.html

<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">Yi, M. (2011). Balanced security controls for 21st century libraries. Library & Archival Security, 24(1), 39-45.

<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">Zimmer, M. (2013). Assessing the treatment of patron privacy in library 2.0 literature. Information Technology & Libraries<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">,  32<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;line-height:normal;">(2), 29-41.