Guest post by David Haynes, author of Metadata for Information Management and Retrieval, 2nd edition: Understanding metadata and its use
Use of metadata by the security services
“Metadata tells you everything about somebody’s life. If you have enough metadata you don’t really need content” (Schneier 2015, p.23)
If anyone wondered about the importance of metadata, this quote by Stuart Baker of the US National Security Agency should leave no-one in any doubt. The Snowden revelations about the routine gathering of metadata about international telephone calls to or from the United States continues to have repercussions today (Greenwald 2013). Indeed Privacy International (2017) has identified the following types of metadata that is gathered or could be gathered by security agencies:
- Device used
- Length of call
“Metadata in aggregate is content” as Jacob Appelbaum observed when the Wikileaks controversy first blew up (Democracy Now 2013). In other words when metadata from different sources is aggregated it can be used to reconstruct the information content of individual communications.
Invasion of privacy or personal benefit?
These concerns extend well beyond the use of metadata by Governments and the security services. The social media giants prosper by exploiting personal data and targeting digital advertising. Personal profiles of targeted individuals are based on metadata about online use and are the basis of online behavioural advertising. Cookies and other tracking technologies can monitor the online activity of an individual to predict future behaviour. Metadata about online sessions reveals a great deal about an individual and his or her life. This may extend to gathering information about friends, family, colleagues and other contacts.
The upside of this is that metadata is a powerful tool to facilitate use of online services, by remembering users’ preferences and delivering content that is more likely to be of interest or relevance to them. This has to be balanced against the risks associated with online disclosure of personal data.
Metadata describes an information object whether that be raw data or more descriptive information about an individual. This is important because the treatment of metadata has become a political issue. Personal data, especially data that reveals opinions, attitudes and beliefs is potentially very sensitive. Use of this personal data by service providers or by third parties can expose users to risks such as nuisance from unwanted ads, harassment from internet trolls or fraud through identity theft, if the data is not held or transmitted security. Many digital advertisers would say that because the data is aggregated it is not possible to identify individuals – i.e. the data is anonymised. However this is no protection against privacy breaches as has been demonstrated by Narayanan and Shmatikov (2009) and others.
Daniel Rosenberg (2013) makes a nice distinction between data, facts and evidence. Data if true may be a fact, but if false ceases to be a fact. Samuel Arbesman (2012) in his book ‘The Half Life of Facts’ introduced the idea that in a given period half the certainties that we had are shown to be false or are superceded by new understandings and that they cease to be ‘facts’. Data, whether it is true or not, continues to be data, but is only factual if true. Perhaps there is some way of recording the reliability of information or data so that it can be exploited appropriately. Many of the arguments and counter-arguments on climate change for instance centre on the quality and veracity of the evidence used by each side of the debate. This idea is not new, as medical researchers have for some time evaluated the quality of research used to make clinical decisions. This information about the quality and reliability of data is metadata.
Metadata is political
Metadata has become a political issue because of its use by security agencies and because of wider privacy issues in the commercial world. Anyone who had asked the question ‘What does metadata matter?’ prior to 2013 will realise just how important a bearing it has on current political issues. The Fourth Amendment to the U.S. Constitution protects ‘The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures’ (United States 1791). A lot hangs on the interpretation of privacy as Solove (2011) has so eloquently discussed in his book ‘Nothing to Hide’. ‘Fake news’ is not new, but the phenomenon has reared its head in recent elections and is unlikely to go away any time soon. Good governance also depends on a good understanding of metadata and accountability for past actions.
Metadata for information management and retrieval
In the new edition of Metadata for Information Management and Retrieval, published in January 2018 I consider the origins of metadata and look at the ways in which it is used for managing information resources. The ethical dimensions of metadata are explored and issues such as governance, privacy, security and human rights are considered. The book also discusses the digital divide and the potential that metadata has for making information accessible to wider audiences.
Metadata has an important role in politics and ethics. How then do we manage it to best effect?
Haynes, D (2018) Metadata for Information Management and Retrieval: understanding metadata and its use. ISBN 9781856048248. Facet Publishing. London, 2018, 267pp. http://www.facetpublishing.co.uk/title.php?id=048248
You can follow David on Twitter @JDavidHaynes
Arbesman, S., 2012. The half-life of facts : why everything we know has an expiration date,
Democracy Now, 2013. Court: Gov’t Can Secretly Obtain Email, Twitter Info from Ex-WikiLeaks Volunteer Jacob Appelbaum. Available at: https://www.democracynow.org/2013/2/5/court_govt_can_secretly_obtain_email [Accessed March 21, 2017].
Greenwald, G., 2013. NSA Collecting Phone Records of Millions of Verizon Customers Daily. The Guardian. Available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [Accessed July 7, 2014].
Narayanan, A. & Shmatikov, V., 2009. De-anonymizing Social Networks. In 2009 30th IEEE Symposium on Security and Privacy. IEEE, pp. 173–187.
Privacy International, 2017. Privacy 101. Metadata. Available at: https://www.privacyinternational.org/node/53 [Accessed March 23, 2017].
Rosenberg, D., 2013. Data before the Fact. In L. Gitelman, ed. “Raw Data” is an Oxymoron. Cambridge, MA: MIT Press, pp. 15–40.
Schneier, B., 2015. Data and Goliath: the hidden battles to collect your data and control your world, New York, NY: W.W.Norton.
Solove, D.J., 2011. Nothing to Hide: the false tradeoff between privacy and security, New Haven, CT: Yale University Press.
United States, 1791. U.S. Constitution Amendment IV, United States.
Join our mailing list
Sign up to our mailing list to hear more about new and forthcoming books.
In the fifth edition of Expert Internet Searching, author Phil Bradley targets the recent phenomena of fake news. Bradley explains why it occurs, how it can be identified and how information professionals can lead the charge in combating it.
First published in 1999 (as The Advanced Internet Searcher’s Handbook), Expert Internet Searching covers the basics of search before going into detail on how to run advanced and complex searches using a variety of different search engines. The new edition references over 300 search engines and associated search tools and has been updated to include current trends including social media search, visual search, and discussion of the authority and validity of search results.
We all still see the rather silly claim that ‘it’s all on Google, so why do we need libraries and librarians?’ but I firmly believe that information professionals are needed now more than ever. It’s part of our role to help stem the tide of fake news, to open people’s eyes to the rich abundance of information available in so many different formats, and to assist them in working out what they need to know and the best way of getting it. When I was a child and I told my careers officer that I wanted to be a librarian she said ‘is it because you like books?’ and I said ‘No, it’s because I want the power’.
Find out more about the fifth edition of Expert Internet Searching
Phil Bradley is a renowned information specialist, internet consultant and conference speaker specializing in search. He has worked with a number of search engine companies to help them improve their products, and has a popular blog on internet search. He teaches internet search and social media skills to librarians and information professionals both within the UK and abroad. Phil was the CILIP (the Chartered Institute of Library and Information Professionals) President for two years (2012–13). He also writes a column in the CILIP Update magazine and his previous titles with Facet Publishing include Social Media for Creative Libraries (2015).
Sign up to our mailing list to hear more about new and forthcoming books. Plus, receive an introductory 30% off a book of your choice – just fill in your details below and we’ll be in touch to help you redeem this special discount:*
*Offer not available to customers from USA, Canada, Australia, New Zealand, Asia-Pacific
In this ninth in a series of ten videos designed to complement each chapter his new book, Social Media for Creative Libraries, Phil Bradley shows you how you can use BigHugeLabs to create create promotional material for your library including trading cards, motivational posters, magazine covers and film posters for free in seconds.
In this eighth in a series of ten videos designed to complement each chapter his new book, Social Media for Creative Libraries, Phil Bradley provides some examples of libraries using social media for marketing. Examples include Orkney Library, Manchester Libraries, Essex Libraries, Dublin City Public Libraries, The British Library, Los Angeles Public Library and New York Public Library.
In this sixth in a series of ten videos designed to complement each chapter his new book, Social Media for Creative Libraries, Phil Bradley provides a guide to advanced Twitter use. The video covers advanced search, hashtags, Twitter lists, utilities and alternative clients.
In this fifth in a series of ten videos designed to complement each chapter his new book, Social Media for Creative Libraries, Phil Bradley provides a guide to creating great presentations without using PowerPoint. The tools discussed include Prezi, Knovio, Slidebean, Picpals, Animoto and Powtoon.
In this fourth in a series of ten videos designed to complement each chapter his new book, Social Media for Creative Libraries, Phil Bradley provides a guide to using Scoop.it and other tools for curating content.