pkb contents > pim | just under 3893 words | updated 12/29/2017

1. Personal information

Per Wikipedia (n.d. a), 'personal' information is owned by, about, directed toward, created by, experienced by or relevant to 'me'; and Detlor (2010) differentiates personal information management from organizational information management and library sciences.

1.1. Information literacy

1.1.1. History

Fister (2017, p. 68): "Not long ago, I was nonplussed when I came across a planning document from the early 1990s in which I had spelled out where I thought our instruction efforts needed to go. It was eerily identical to our current Things to Do list. It was dispiriting." Applying autoethnography to her years of work as a college librarian, she identifies three eras of IL (each shaped by major social trends):

See also:

1.1.2. Definitions

1.1.2.1. Big 6 model

1.1.3. Skills

1.1.3.1. Staying informed

Booth (2011) lists ways to stay informed:

1.1.3.2. Inquiry

From Fister (2017, p. 70): "What mattered more [than understanding the technical details of using a library catalog], I quickly realised, was understanding how to gain enough familiarity with a new topic to frame a meaningful question, how to learn enough of the coded language that scholars used to crack open a search, and how to unlearn the idea that research was simply a matter of finding other people’s answers."

1.1.3.3. Evaluating sources and fake news

1.2. Information fluency

1.3. Personal information management

Per Wikipedia (n.d. a):

1.4. Personal knowledge management

Per Wikipedia (n.d. d):

1.4.1. Personal knowledge mastery & sense-seek-share framework

http://jarche.com/2014/02/the-seek-sense-share-framework/

2. PIM tools

2.1. Content management

2.1.1. Record-keeping

2.1.1.1. What is a personal knowledge base?

Per Wikipedia (n.d. c):

2.1.1.2. What is a wiki?

https://en.wikipedia.org/wiki/History_of_wikis: “a website with pages and links that can be easily edited via the browser, with a reliable version history for each page … Wiki software has some conceptual origins in the version control and hypertext systems used for documentation and software in the 1980s … The emphasis is on a dynamically documented ‘agreement in the context of maximum possible disagreement’ … ”

2.2. Time & task management

2.3. Communication

2.4. Content discovery

3. Browser performance

- How to make a browser fast again: - Disable plugins, disable extensions, clear browsing data, scan for malware, limit tabs - Manage running tabs: Tabs Outliner, OneTab, Snap Tabs, Tab Memory Saver, Tab Snooze - Pull up Task Manager to kill tasks: SEARCH+ESC for Chrome, about:performance for Firefox - Clear history: CTRL+SHIFT+BACKSPACE for Chrome, browser button for Firefox

4. Personal privacy & security

http://www.pcmag.com/reviews/security-software

4.1. What are different degrees of privacy?

Metadata; content; anonymity.

4.2. Threat modeling

Planning a security system is complex. Security is interdependent, so the weakest link matters. Asking and answering these questions is the foundation of effective security:

Some basic facts and definitions:

4.3. Account security

4.3.1. Research the platforms and companies you use

Do they provide the government direct access to user data? Do they notify users when such data has been furnished in compliance with a court order? Do they have a track record of defending their user data in court? Do they sell your data to other companies? Are they data-greedy or do they collect only when needed? Do they have strong enterprise security practices?

4.3.2. Protect login information

Check if login data has been released in a breach.

Enable two-factor authentication when possible , using a phone or Yubikey (buy two!): Google Authenticator, SMS, Authy, Toopher, Duo, Transakt, Grid.

Consider using a password manager (although this does create a juicy central target for hackers): LastPass, Blur (can mask emails), Keeper/Keeper Web App, Saferpass, Passpy, Gumshoe, My Login Vault, Keepass, 1password . Password managers make it easy to take basic account security steps, like generating strong passwords; never re-using a password; never re-using a login; setting passsword expiration dates; and resetting passwords when specifics sites are compromised. Cloud-based password managers make passwords accessible from all devices but introduce vulnerabilities. If not using a password manager, you can write down passwords and store them away from the computer; or you can store them in an encrypted document on your computer.

4.3.3. Limit 3p access

Review third party access you've granted to accounts like Facebook and Google Drive; remove inactive ones.

4.4. Personal computer

4.5. Email & messaging

4.5.1. Risky emails

Set your email so that images don't display automatically, which reduces tracking. Be extremely cautious about downloading files; use Gmail's file previewer or a file scanner, and set risky filetypes ( .js, .jse, .wsp, .wsh ) to open in a text editor by default. Don't open links directly from an email; instead, navigate directly to sites you're familiar with, or copy the link URL and run it through a search engine in quotes: "http://somefakebankname.com/scam-attempt.php" .

4.5.2. Email encryption

Use Mailvelope for end-to-end encryption that integrates with existing email providers.

4.5.3. Instant messaging

Try CryptoCat or Pidgin .

4.6. Browsing

4.6.1. Tor and/or VPN for privacy

The Tor browser enables anonymous browsing (activities not associated with particular IP), but it's difficult to set up. One workaround is the TAILS operating system, which comes bundled with Tor.

For extra security, Tor can be run from a VPN, or a VPN can be run through another VPN: Tunnel Bear , Private Internet Access, TorGuard, WiTopia, Privacy10 . With VPN, it's important to:

4.6.2. Searching

Try DuckDuckGo , although its search algorithms aren't as good as Google's.

4.6.3. Purchasing online

Favor credit cards over PayPal or debit cards. Don't store payment information on websites.

4.6.4. Apps for ads, malicious scripts, trackers, etc.

4.7. Mobile phone

4.7.1. Discourage unauthorized access

Swipe and PIN codes are not robust protection; use a pass phrase to prevent people from opening the phone, and make sure your mobile account itself is secured with a different pass phrase. Sophisticated hackers don't need to log in to your phone, though, so protect your data with encryption (most phones provide this option in "Settings"; you just need to activate it). Install Lookout or Prey to lock/locate/wipe your phone in case of theft or loss. Swich off wi-fi, GPS, and Bluetooth when not in use.

4.7.2. Keep text messages, calls, and browsing private

4.7.3. Phones as audio recorders and locators

Know that phones can be used to locate you via GPS and cell phone towers. If this is a concern, leave your phone behind. Phones can also be activated remotely and used to record you, even if they are turned off ; if this is a concern, place the phone in a refrigerator to muffle sounds, or remove its battery. A "burner phone" is not really a good option.

4.7.4. Phone scams and phishing

If you recieve a call from someone who requests your personal information, be very wary:

4.8. Harrassment

4.8.1. Doxing

Preventatively stalk yourself to see what information comes up. Delete old accounts ; opt-out of data broker listings ( 1 , 2 ); change your cell number; make sure your personal information isn't published on Whois.net as part of your domain registration.

4.8.2. Social

In case of harrassment, know who your allies are: some lawyers with an interest in civil rights, and civil rights organizations; some journalists; some politicians; others in your personal network with the capacity to advocate for you, who wil be seen as credible by a mainstream audience.

5. Sources

5.1. Cited

American Association of School Librarians (AASL) & Association for Educational Communications and Technology. (1998). Information literacy standards for student learning. Retrieved from http://www.ala.org/ala//mgrps/divs/aasl/aaslarchive/pubsarchive/informationpower/InformationLiteracyStandards_final.pdf

American Library Association (ALA). (1989). Presidential Committee on Information Literacy: Final report. Retrieved from http://www.lita.org/ala/mgrps/divs/acrl/publications/whitepapers/presidential.cfm

Booth, C. (2011). Reflective Teaching, Effective Learning: Instructional Literacy for Library Educators. Chicago, IL: American Library Association Editions.

Detlor, B. (2010). Information management. International Journal of Information Management. https://doi.org/10.1016/j.ijinfomgt.2009.12.001

Fister, B. 2017. The warp and weft of information literacy: Changing contexts, enduring challenges. Journal of Information Literacy, 11(1), pp.68-79. http://dx.doi.org/10.11645/11.1.2183

Shapiro J.J. & Hughes S.K. (1996). Information literacy as a liberal art. Educom Review 31(2).

Wikipedia. (n.d. a). Personal information management. Retrieved from https://en.wikipedia.org/wiki/Personal_information_management

Wikipedia. (n.d. b). Personal information manager. Retrieved from https://en.wikipedia.org/wiki/Personal_information_manager

Wikipedia. (n.d. c). Personal knowledge base. Retrieved from https://en.wikipedia.org/wiki/Personal_knowledge_base

Wikipedia. (n.d. d). Personal knowledge management. Retrieved from https://en.wikipedia.org/wiki/Personal_knowledge_management

Weiner, J. (2011). Is there a difference between critical thinking and information literacy? A systematic review 2000-2009. Journal of information literacy, 5(2). pp. 81-92. http://dx.doi.org/10.11645/5.2.1600

5.2. References

5.3. Read

5.4. Unread