$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

A Study of Public Library Patrons' Understanding of Library Records and Data Privacy 원문보기 논문타임라인

International journal of knowledge content development & technology, v.4 no.1, 2014년, pp.53 - 78  

Kim, Dong-Seok (Seogang Library of Mapo-Gu) ,  Noh, Younghee (Department of Library and Information Science, Konkuk University)

Abstract AI-Helper 아이콘AI-Helper

As instances of private information leak increase, taking steps to protect such information becomes a necessity. In this study of public library patrons, we strove for a comprehensive understanding of library usage records to suggest viable solutions for private information safety in public librarie...

주제어

AI 본문요약
AI-Helper 아이콘 AI-Helper

* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.

문제 정의

  • In this study, we want to research the library patrons’ private information and gain a comprehensive understanding of library usage records to suggest a management plan for the private information used in public libraries.
  • This study researched the library patrons’ understanding of private information in order to form an effective personal information management policy.

가설 설정

  • We hypothesized that the frequency with which patrons used the library might have some effect on patrons’ level of understanding of library records, given more frequent exposure to the topic.
  • Research question 1: Is there a meaningful relationship between frequent visits to libraries and a greater awareness of library usage records?
  • ∙ Research question 2: Is there a meaningful relationship between a patron's interest in privacy and greater understanding of library usage records?
  • ∙ Research question 3: Is there a meaningful relationship between a patron's experience with damage caused by private information leaks and understanding of library usage record?
본문요약 정보가 도움이 되었나요?

참고문헌 (39)

  1. Balas, J. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55. 

    인용구절

    인용 구절

    From an information technology aspect, Balas (2001) argued that due to the advancement in technology, the privacy issues have become more complicated.

  2. Bower, S. L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383. 

  3. Bower, S. L. (2008). Self-service holds: A violation of library patron's privacy. Public Libraries, 47(4), 54-57. 

  4. Breedingm M. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30. 

  5. Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. 

    상세보기 crossref
    인용구절

    인용 구절

    However, in the digital knowledge information era, it is impossible to preserve it fully in a library due to the demand for a specific electronic identification, regulation, and statistics Butters (2007) mentioned the danger of using RFID in libraries.

  6. Caldwell-Stone, D. (2008). Privacy, libraries, and ALA American Libraries, September, 58. 

    인용구절

    인용 구절

    Caldwell-Stone (2008) argued that protecting the patron's demand for information in a society where information is power is essential, and that it is the responsibility of the librarian to protect the privacy of library patrons.

  7. Clarke, R. (1996). Privacy and dataveillance, and organisational strategy. Keynote address to the Conference of the I.S. Audit & Control Association. Perth, Western Australia. 

  8. DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of Internet cinnerce: Personhood and pragmatism, pop tarts and six packs. Texas Law Review, 87(11), 1013-1017. 

  9. Enright, K. P. (2001). Privacy audit checklist. Retrieved from http://cyber.law.harvard.edu/clinical/priva cyaudit.html 

    인용구절

    인용 구절

    Enright (2001) argued that the laws, regulations, and guidelines regarding library private information policy must be clarified and revised, and suggested a clear checklist regarding this.

  10. Falk, Howard. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. 

    상세보기 crossref
    인용구절

    인용 구절

    Falk (2004) revealed that many libraries have a codified privacy protection policy and that there are not enough regulations to protect patrons from the violations of private information in regard to the electronic technology used to provide services to the patrons.

  11. Fifarek, A. (2002). Technology and privacy in the academic library. Online Information Review, 26(6). 366-374. 

    상세보기 crossref
    인용구절

    인용 구절

    Fifarek (2002) argued that greater privacy problems were due to the introduction of new technology.

  12. Johnston, S. D. (2000). Rethinking privacy in the public library. The International Information & Library Review, 32(3-4), 509-517. 

  13. Joung, Hyun-Tae. (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1), 243-264. 

  14. Kang Sun Hui. (2003). Saseo mit jeongbo service jikui yunli uisik-e gwanhan yeongu. Library with People, 4(4), 53-55. 

    인용구절

    인용 구절

    Kang (2003) argued that even though most librarians understand that the patron's private data and loan records are information that should be protected, most institutes that have specific regulations or policies about this issue find that the same policies effect the rate of library use.

  15. Kennedy, S. D. (2006). I've been violated. Information Today. 17. 20. 

  16. Kim, Gi-Mun. (2003). Miguk-ui aegukbeobgwa doseogwan iyoungjaui privacy. Library with People, 4(4), 60-71. 

  17. Kim, Hae-Kyoung, & Nam, Tae-Woo. (2004). A new model for codes of ethics for librarians of South Korea. Journal of the Korean Society for Information Management, 21(4), 329-352. 

    원문보기 상세보기 crossref 타임라인에서 보기
    인용구절

    인용 구절

    Kim and Nam (2004) argued that the library must guarantee that its patrons can easily access and use information.

  18. Kim, Hye-Sun. (1994). A Study on Ethics in Librarianship. M.A. thesis, Ewha Womans University. 

    인용구절

    인용 구절

    Kim (1994) suggested that privacy invasion prevention should involve privacy protection, user education, and statutory regulation and processes.

  19. Kim, Ki-Seong. (2006). A Study on the Privacy of University Libraries. M.A. thesis, Chungnam University. 

    인용구절

    인용 구절

    Kim (2006) studied the factors of the private information protection policy that are needed in college libraries and determined changes that college libraries needed, through analyzing domestic and foreign library private information protection policies and cases of violation.

  20. Kim, Song-soo. (2012). A study on library user privacy protection in the digital environment: Focused on record of checked out books. Hanyang University, Graduate School of Public Policy. 

    인용구절

    인용 구절

    Kim (2012) said the record of borrowed books is information that can reveal the ideals and conscience of patrons, making it sensitive private information that is related to the patrons’ privacy.

  21. Klinefelter, A. (2007). Privacy and library public services: Or, I know what you read last summer. Legal Reference Serivces Quarterly, 26(1-2), 253-279. 

    상세보기 crossref
    인용구절

    인용 구절

    Klinefelter (2007) said that customizable user service was possible due to the development of technology.

  22. Lee, Mi-Hwa. (2006). A study on user perceptions about privacy and library records. The Journal of the Korean Private University Library Association, 7, 225-240. 

  23. Lee, Myeong-Hee. (2004). Libraries' efforts to preserve intellectual freedom and banned book. Journal of the Korean Biblia Society for library and Information Science, 15(1), 193-216. 

    인용구절

    인용 구절

    Lee (2004), in a study of library intellectual freedom, researched the declaration of intellectual freedom in advanced countries, the freedom of collection records, and the policies towards passwords of patrons.

  24. Leiserson, A. B. (2002). A user's perspective on privacy and the web. Law Library Journal, 94(3), 539-546. 

  25. Levine, C. (2006). IM: Real-time problems: Traders increasingly are adopting public instant messaging services, but most of these applications open severe security goles. Wall Street & Technology. 

  26. Noh, Younghee. (2012a). A Study on Developing and Proposing the Library Privay Policy. Journal of Korean Library and Information Science Society, 46(4), 207-242. 

  27. Noh, Younghee. (2012b). A study of personalized user services and privay in the library. Journal of Korean Library and Information Science Society, 43(3), 357-398. 

    인용구절

    인용 구절

    Noh (2012a) analyzed the possible privacy violations that could arise in libraries through the interference of other institutions (such as police or federal investigations), the process of providing library service, and the outsourcing of library tasks. In another study, Noh (2012b) argued that the accumulation of information for service personalization can also lead to privacy violations as well as other problems like filter bubbles.

  28. Noh, Younghee. (2012c). A study of digital library service records and user privacy. Journal of the Korean Society for Information Management, 29(3), 187-214. 

    원문보기 상세보기 crossref 타임라인에서 보기
    인용구절

    인용 구절

    Noh (2012c), through the study of library private information protection policy, research on privacy violation cases, and analysis of laws and guidelines relating to domestic private information, suggested a suitable private information policy for the library as well as presented a case for the importance of establishing a policy for such protection.

  29. Noh, Younghee. (2013). A study on librariands perception of library user privacy. Journal of Korean Library and Information Science Society, 47(3), 73-96. 

  30. Noh, Younghee. (2013). Digital Library User privacy: Changing Librarian View points through Education. in progress. 

  31. OECD. (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data [online] Retrieved 2013.08.23. 

  32. Park, Sang-Keun. (2010). A study on the plans for the reinforcement of the personal information protection policy in public libraries. Graduate School of Kyonggi University, Department of Library and Information Science. 

    인용구절

    인용 구절

    Park (2010), in his study of patrons’ guaranteed rights and invasion of private information, fully described the real condition of public institutes and libraries.

  33. Shuler, J. (2004). Privacy and academic libraries: Widening the frame of discussion. Journal of Academic Librarianship, 30(2), 157-159. 

    상세보기 crossref
    인용구절

    인용 구절

    Shuler (2004) argued that before the electronic era, privacy was not a serious problem.

  34. Sturges, P. (2002). Remember the human: The first rule of netquette, librarians and the internet. Online Information Review, 26(3), 209-16. 

    상세보기 crossref
    인용구절

    인용 구절

    Struges (2002) argued that librarians and others writing such policies must examine whether the privacy policy is ethical, legal, and realistic, if the public interest is being served, and if it represents the person directly concerned.

  35. The National Library of Korea. (2012). Guidelines for personal information protection. Seoul: The National Library of Korea. 

  36. Tripathi, Sneha, & Tripathi, Aditya. (2010). Privacy in libraries: The Perspective from India. Library Review, 59(8), 615-623. 

  37. Wallace, M. (1988). Ethics: Is it time for a code? In managing the law firm library 1988. 258 PIL/ PAT 329(Sept. 1, 1988). 

  38. Wareen, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review. 4, 193. 

  39. Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15. 

    인용구절

    인용 구절

    Zimerman (2009) argued that the development of information technology had lowered the level of privacy in society.

저자의 다른 논문 :

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로