The Resource Data Protection on the Move : Current Developments in ICT and Privacy/Data Protection

Data Protection on the Move : Current Developments in ICT and Privacy/Data Protection

Label
Data Protection on the Move : Current Developments in ICT and Privacy/Data Protection
Title
Data Protection on the Move
Title remainder
Current Developments in ICT and Privacy/Data Protection
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Gutwirth, Serge
Dewey number
005.8
LC call number
KJ-KKZ4999QA76.9.C66
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Leenes, Ronald
  • Hert, Paul de
Series statement
Law, Governance and Technology Ser.
Series volume
v.24
http://library.link/vocab/subjectName
Philosophy
Label
Data Protection on the Move : Current Developments in ICT and Privacy/Data Protection
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=4332318
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data
  • 3.7 Verification of Metering Data -- 3.8 Dispute Resolution -- 4 Evaluation -- 4.1 Evaluation Environment -- 4.2 Evaluation Results -- 5 Discussion -- 5.1 Malicious Customer -- 5.2 Tracking and Localization Attacks -- 6 Related Work -- 7 Conclusion -- Bibliography -- Development Towards a Learning Health System-Experiences with the Privacy Protection Model of the TRANSFoRm Project -- Abstract -- 1 Introduction -- 1.1 Learning Health System -- 1.2 The TRANSFoRm Project: On the Way to an European Learning Health System -- 1.3 Diverse Data Sources and Diverse Legal Requirements for Privacy Protection in the Care and Research Domain -- 2 Methods -- 3 Results -- 3.1 Common Privacy Principles and Privacy Requirements of the LHS -- 3.2 The Idea of Privacy Zones Was Born -- 3.3 The Graphic Representation of Privacy Frameworks for Compliant Data Flow -- 3.4 Application of the Graphic Model to Two Research Use Cases -- 3.4.1 Use Case Linkage of Databases -- Link Between Databases in the Care Zone with Non-care Zone -- Link Between Databases in the Non-care Zone -- 3.4.2 Application Example -- 4 Discussion -- Bibliography -- Could the CE Marking Be Relevant to Enforce Privacy by Design in the Internet of Things? -- Abstract -- 1 Introduction -- 2 Why CE Marking Could Be a Relevant Option for DPbD Enforcement? -- 2.1 The Twofold Nature of the IoT -- 2.2 Challenges for the Regulation of the IoT -- 2.3 Possible Contributions of the CE Marking -- 2.4 Innovative Division of Regulation Work -- 2.5 Co-regulation -- 2.6 Accountability -- 2.7 Risk Based Approach -- 2.8 Widespread European Standards -- 3 Shortcomings of This Solution -- 3.1 Limits of a Seal Policy for the IoT -- 3.2 Misleading -- 3.3 Unreliable -- 3.4 No Legal Status -- 3.5 Limited Scope -- 3.6 Redundant Enforcement Tool -- 4 CE Marking as an Overarching Certification Mark for Products
  • 4.1 Updating the Existing Process -- 4.2 Certificate Without Seal -- 4.3 National DPAs as Market Monitoring Authorities -- 4.4 Algorithmic Regulation -- 5 Conclusion -- Bibliography -- Visions of Technology -- Abstract -- 1 Why Understanding the Technology Visions of Policy Makers? -- 2 Data Economy and the Big Data Value Chain -- 3 Digital Agenda for Europe (2010-2012): Overview of Major Relevant Actions -- 4 Towards a Thriving Data-Driven Economy (2014): Four Regulatory Issues -- 5 A Digital Single Market Strategy for Europe (2015): Three Pillars of Reform -- 6 The Intellectual Property Rights Framework (Framework 1): Adequate for Big Data? -- 6.1 The Application of Copyright on Datasets Is not Straightforward -- 6.2 Striking Differences with the US Copyright Framework -- 7 Protection of Personal Data (Framework 2) -- 7.1 A Comparison Between the EU and US Legal Regime -- 7.2 Impact of Data Protection on Big Data Economics -- 8 Public Sector Information and Open Data (Framework 3) -- 9 Conclusions: Adapting Legal Frameworks to a Data Economy Remains Unfinished Business -- Bibliography -- Privacy and Innovation: From Disruption to Opportunities -- Abstract -- 1 Introduction -- 2 The Concept of Privacy -- 3 Privacy and Innovation-A Conceptual Framework -- 3.1 Market Imperfections -- 3.2 Systems Imperfections -- 4 Privacy and Innovation: It Takes Two to Tango? -- 5 Action Plan Privacy-The Dutch Situation -- 6 Conclusions -- Bibliography -- Behavioural Advertising and the New 'EU Cookie Law' as a Victim of Business Resistance and a Lack of Official Determination -- Abstract -- 1 Introduction -- 2 Cookies and Behavioural Advertising -- 3 Cookie Regulation Topical -- 4 The Law on Cookies Before and After 2009 -- 5 Business Implementations -- 6 Searching for the Reasons Behind the 'Cookie Law' Failure -- 7 Irreversible? -- 8 Conclusion -- Bibliography
  • Forget About Being Forgotten -- Abstract -- 1 Introduction -- 2 Secondary Disclosures as a Source of Personal Information -- 2.1 Roles in the Disclosure Process -- 3 Related Work -- 4 Description of a Right-of-Reply Based Solution -- 4.1 Architecture and Protocols -- 4.2 Implementation Details -- 5 Potential Business Exploitation Models -- 6 Critical Discussion -- 7 Conclusions -- Bibliography -- Do-It-Yourself Data Protection-Empowerment or Burden? -- Abstract -- 1 Introduction -- 2 DIY-Data Protection-Can We Do It? -- 2.1 The Individual Faced with the (Im)possibility of DIY Data Protection -- 2.2 Competing Needs: Privacy and Data Protection Versus Social Gratifications -- 2.3 DIY Data Protection Advocates and Their Socio-Political Entanglements -- 3 DIY-Data Protection-Should We Have to Do It? -- 3.1 Responsibilization -- 3.2 Data Protection as Choice -- 3.3 Data Protection as Commodity -- 3.4 Data Protection, Social Equality, and Victim Blaming -- 3.5 Responsibilization, Surveillance, and Politics -- 4 Conclusion -- Bibliography -- Privacy Failures as Systems Failures: A Privacy-Specific Formal System Model -- Abstract -- 1 Introduction -- 2 The PST Framework -- 3 Soft Systems Methodology -- 3.1 Hard and Soft Systems Thinking-Conceptual Differences -- 3.2 The Importance of Weltanschauungen in Systems Thinking -- 3.3 Root Definitions and CATWOE -- 4 The Systems Failures Approach -- 4.1 The Need for a Systems Failures Approach -- 4.2 The Formal System Model (FSM) -- 5 The Privacy-Specific Formal System Model (PSFSM) -- 6 Applying the PSFSM to Google Buzz -- 6.1 Background -- 6.2 Rich Picture of Google Buzz Situation (Stage 1) -- 6.3 Identification of Significant Failure(s) and System Selection (Stages 2 and 3) -- 6.4 System Modelling and Comparison with the PSFSM (Stages 4 and 5) -- 6.5 Lessons Learned, Remedies and Agenda for Change (Stage 7)
  • 7 Conclusions and Further Work -- Bibliography -- A Precautionary Approach to Big Data Privacy -- Abstract -- 1 Introduction -- 2 Ill-Founded Promises of Privacy: The Failures of Ad Hoc De-identification -- 2.1 Privacy-Violating Inferences Go Beyond Stereotypical Re-identification -- 2.2 Re-identification Attacks May Be Broad or Targeted -- 2.2.1 Broad Attacks: Examples and Lessons -- 2.2.2 Targeted Attacks: Examples and Lessons -- 3 Quantifiable Risks and Provable Privacy -- 3.1 Ad Hoc De-identification Leads to Unknowable Risks -- 3.2 The Promise of Provable Privacy -- 4 Practical Steps Towards Improved Data Privacy -- 4.1 Defining a Precautionary Approach -- 4.2 Researching and Implementing Provable Privacy -- 4.3 Flexible Options for Narrower Releases of Data -- 4.4 Enabling Transparency of Re-identification Risks -- 5 Specific Advice for Six Common Cases -- Bibliography -- The Impact of Domestic Robots on Privacy and Data Protection, and the Troubles with Legal Regulation by Design -- Abstract -- 1 Introduction -- 2 A New Kid in Town -- 2.1 When Robots Act -- 2.2 A Twofold HRI -- 2.3 On Legal Responsibility -- 2.4 The Invasion of the Sacred Precincts of Private Life? -- 3 The Closet and the House-Tops -- 3.1 A New Expectation of Privacy -- 3.2 Robot Data Processors and Human Data Controllers -- 3.3 The Troubles with Legal Regulation by Design -- 4 Conclusions -- Bibliography -- Is the Human Rights Framework Still Fit for the Big Data Era? A Discussion of the ECtHR's Case Law on Privacy Violations Arising from Surveillance Activities -- Abstract -- 1 Introduction -- 2 The Right to Privacy (Article 8 ECHR) -- 3 Reasonable Likelihood (Hypothetical Harm) -- 4 Chilling Effect (Future Harm) -- 5 In Abstracto Claims (No Individual Harm) -- 6 Analysis -- Bibliography
  • Metadata, Traffic Data, Communications Data, Service Use Information... What Is the Difference? Does the Difference Matter? An Interdisciplinary View from the UK
Dimensions
unknown
Extent
1 online resource (492 pages)
Form of item
online
Isbn
9789401773768
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC4332318
  • (Au-PeEL)EBL4332318
  • (CaPaEBR)ebr11139797
  • (CaONFJC)MIL887250
  • (OCoLC)934770737
Label
Data Protection on the Move : Current Developments in ICT and Privacy/Data Protection
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=4332318
Publication
Copyright
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data
  • 3.7 Verification of Metering Data -- 3.8 Dispute Resolution -- 4 Evaluation -- 4.1 Evaluation Environment -- 4.2 Evaluation Results -- 5 Discussion -- 5.1 Malicious Customer -- 5.2 Tracking and Localization Attacks -- 6 Related Work -- 7 Conclusion -- Bibliography -- Development Towards a Learning Health System-Experiences with the Privacy Protection Model of the TRANSFoRm Project -- Abstract -- 1 Introduction -- 1.1 Learning Health System -- 1.2 The TRANSFoRm Project: On the Way to an European Learning Health System -- 1.3 Diverse Data Sources and Diverse Legal Requirements for Privacy Protection in the Care and Research Domain -- 2 Methods -- 3 Results -- 3.1 Common Privacy Principles and Privacy Requirements of the LHS -- 3.2 The Idea of Privacy Zones Was Born -- 3.3 The Graphic Representation of Privacy Frameworks for Compliant Data Flow -- 3.4 Application of the Graphic Model to Two Research Use Cases -- 3.4.1 Use Case Linkage of Databases -- Link Between Databases in the Care Zone with Non-care Zone -- Link Between Databases in the Non-care Zone -- 3.4.2 Application Example -- 4 Discussion -- Bibliography -- Could the CE Marking Be Relevant to Enforce Privacy by Design in the Internet of Things? -- Abstract -- 1 Introduction -- 2 Why CE Marking Could Be a Relevant Option for DPbD Enforcement? -- 2.1 The Twofold Nature of the IoT -- 2.2 Challenges for the Regulation of the IoT -- 2.3 Possible Contributions of the CE Marking -- 2.4 Innovative Division of Regulation Work -- 2.5 Co-regulation -- 2.6 Accountability -- 2.7 Risk Based Approach -- 2.8 Widespread European Standards -- 3 Shortcomings of This Solution -- 3.1 Limits of a Seal Policy for the IoT -- 3.2 Misleading -- 3.3 Unreliable -- 3.4 No Legal Status -- 3.5 Limited Scope -- 3.6 Redundant Enforcement Tool -- 4 CE Marking as an Overarching Certification Mark for Products
  • 4.1 Updating the Existing Process -- 4.2 Certificate Without Seal -- 4.3 National DPAs as Market Monitoring Authorities -- 4.4 Algorithmic Regulation -- 5 Conclusion -- Bibliography -- Visions of Technology -- Abstract -- 1 Why Understanding the Technology Visions of Policy Makers? -- 2 Data Economy and the Big Data Value Chain -- 3 Digital Agenda for Europe (2010-2012): Overview of Major Relevant Actions -- 4 Towards a Thriving Data-Driven Economy (2014): Four Regulatory Issues -- 5 A Digital Single Market Strategy for Europe (2015): Three Pillars of Reform -- 6 The Intellectual Property Rights Framework (Framework 1): Adequate for Big Data? -- 6.1 The Application of Copyright on Datasets Is not Straightforward -- 6.2 Striking Differences with the US Copyright Framework -- 7 Protection of Personal Data (Framework 2) -- 7.1 A Comparison Between the EU and US Legal Regime -- 7.2 Impact of Data Protection on Big Data Economics -- 8 Public Sector Information and Open Data (Framework 3) -- 9 Conclusions: Adapting Legal Frameworks to a Data Economy Remains Unfinished Business -- Bibliography -- Privacy and Innovation: From Disruption to Opportunities -- Abstract -- 1 Introduction -- 2 The Concept of Privacy -- 3 Privacy and Innovation-A Conceptual Framework -- 3.1 Market Imperfections -- 3.2 Systems Imperfections -- 4 Privacy and Innovation: It Takes Two to Tango? -- 5 Action Plan Privacy-The Dutch Situation -- 6 Conclusions -- Bibliography -- Behavioural Advertising and the New 'EU Cookie Law' as a Victim of Business Resistance and a Lack of Official Determination -- Abstract -- 1 Introduction -- 2 Cookies and Behavioural Advertising -- 3 Cookie Regulation Topical -- 4 The Law on Cookies Before and After 2009 -- 5 Business Implementations -- 6 Searching for the Reasons Behind the 'Cookie Law' Failure -- 7 Irreversible? -- 8 Conclusion -- Bibliography
  • Forget About Being Forgotten -- Abstract -- 1 Introduction -- 2 Secondary Disclosures as a Source of Personal Information -- 2.1 Roles in the Disclosure Process -- 3 Related Work -- 4 Description of a Right-of-Reply Based Solution -- 4.1 Architecture and Protocols -- 4.2 Implementation Details -- 5 Potential Business Exploitation Models -- 6 Critical Discussion -- 7 Conclusions -- Bibliography -- Do-It-Yourself Data Protection-Empowerment or Burden? -- Abstract -- 1 Introduction -- 2 DIY-Data Protection-Can We Do It? -- 2.1 The Individual Faced with the (Im)possibility of DIY Data Protection -- 2.2 Competing Needs: Privacy and Data Protection Versus Social Gratifications -- 2.3 DIY Data Protection Advocates and Their Socio-Political Entanglements -- 3 DIY-Data Protection-Should We Have to Do It? -- 3.1 Responsibilization -- 3.2 Data Protection as Choice -- 3.3 Data Protection as Commodity -- 3.4 Data Protection, Social Equality, and Victim Blaming -- 3.5 Responsibilization, Surveillance, and Politics -- 4 Conclusion -- Bibliography -- Privacy Failures as Systems Failures: A Privacy-Specific Formal System Model -- Abstract -- 1 Introduction -- 2 The PST Framework -- 3 Soft Systems Methodology -- 3.1 Hard and Soft Systems Thinking-Conceptual Differences -- 3.2 The Importance of Weltanschauungen in Systems Thinking -- 3.3 Root Definitions and CATWOE -- 4 The Systems Failures Approach -- 4.1 The Need for a Systems Failures Approach -- 4.2 The Formal System Model (FSM) -- 5 The Privacy-Specific Formal System Model (PSFSM) -- 6 Applying the PSFSM to Google Buzz -- 6.1 Background -- 6.2 Rich Picture of Google Buzz Situation (Stage 1) -- 6.3 Identification of Significant Failure(s) and System Selection (Stages 2 and 3) -- 6.4 System Modelling and Comparison with the PSFSM (Stages 4 and 5) -- 6.5 Lessons Learned, Remedies and Agenda for Change (Stage 7)
  • 7 Conclusions and Further Work -- Bibliography -- A Precautionary Approach to Big Data Privacy -- Abstract -- 1 Introduction -- 2 Ill-Founded Promises of Privacy: The Failures of Ad Hoc De-identification -- 2.1 Privacy-Violating Inferences Go Beyond Stereotypical Re-identification -- 2.2 Re-identification Attacks May Be Broad or Targeted -- 2.2.1 Broad Attacks: Examples and Lessons -- 2.2.2 Targeted Attacks: Examples and Lessons -- 3 Quantifiable Risks and Provable Privacy -- 3.1 Ad Hoc De-identification Leads to Unknowable Risks -- 3.2 The Promise of Provable Privacy -- 4 Practical Steps Towards Improved Data Privacy -- 4.1 Defining a Precautionary Approach -- 4.2 Researching and Implementing Provable Privacy -- 4.3 Flexible Options for Narrower Releases of Data -- 4.4 Enabling Transparency of Re-identification Risks -- 5 Specific Advice for Six Common Cases -- Bibliography -- The Impact of Domestic Robots on Privacy and Data Protection, and the Troubles with Legal Regulation by Design -- Abstract -- 1 Introduction -- 2 A New Kid in Town -- 2.1 When Robots Act -- 2.2 A Twofold HRI -- 2.3 On Legal Responsibility -- 2.4 The Invasion of the Sacred Precincts of Private Life? -- 3 The Closet and the House-Tops -- 3.1 A New Expectation of Privacy -- 3.2 Robot Data Processors and Human Data Controllers -- 3.3 The Troubles with Legal Regulation by Design -- 4 Conclusions -- Bibliography -- Is the Human Rights Framework Still Fit for the Big Data Era? A Discussion of the ECtHR's Case Law on Privacy Violations Arising from Surveillance Activities -- Abstract -- 1 Introduction -- 2 The Right to Privacy (Article 8 ECHR) -- 3 Reasonable Likelihood (Hypothetical Harm) -- 4 Chilling Effect (Future Harm) -- 5 In Abstracto Claims (No Individual Harm) -- 6 Analysis -- Bibliography
  • Metadata, Traffic Data, Communications Data, Service Use Information... What Is the Difference? Does the Difference Matter? An Interdisciplinary View from the UK
Dimensions
unknown
Extent
1 online resource (492 pages)
Form of item
online
Isbn
9789401773768
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC4332318
  • (Au-PeEL)EBL4332318
  • (CaPaEBR)ebr11139797
  • (CaONFJC)MIL887250
  • (OCoLC)934770737

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...