최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of knowledge content development & technology, v.4 no.1, 2014년, pp.53 - 78
Kim, Dong-Seok (Seogang Library of Mapo-Gu) , Noh, Younghee (Department of Library and Information Science, Konkuk University)
As instances of private information leak increase, taking steps to protect such information becomes a necessity. In this study of public library patrons, we strove for a comprehensive understanding of library usage records to suggest viable solutions for private information safety in public librarie...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Balas, J. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55.
From an information technology aspect, Balas (2001) argued that due to the advancement in technology, the privacy issues have become more complicated.
Bower, S. L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383.
Bower, S. L. (2008). Self-service holds: A violation of library patron's privacy. Public Libraries, 47(4), 54-57.
Breedingm M. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30.
Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439.
Caldwell-Stone, D. (2008). Privacy, libraries, and ALA American Libraries, September, 58.
Caldwell-Stone (2008) argued that protecting the patron's demand for information in a society where information is power is essential, and that it is the responsibility of the librarian to protect the privacy of library patrons.
Clarke, R. (1996). Privacy and dataveillance, and organisational strategy. Keynote address to the Conference of the I.S. Audit & Control Association. Perth, Western Australia.
DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of Internet cinnerce: Personhood and pragmatism, pop tarts and six packs. Texas Law Review, 87(11), 1013-1017.
Enright, K. P. (2001). Privacy audit checklist. Retrieved from http://cyber.law.harvard.edu/clinical/priva cyaudit.html
Enright (2001) argued that the laws, regulations, and guidelines regarding library private information policy must be clarified and revised, and suggested a clear checklist regarding this.
Falk, Howard. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284.
Johnston, S. D. (2000). Rethinking privacy in the public library. The International Information & Library Review, 32(3-4), 509-517.
Joung, Hyun-Tae. (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1), 243-264.
Kang Sun Hui. (2003). Saseo mit jeongbo service jikui yunli uisik-e gwanhan yeongu. Library with People, 4(4), 53-55.
Kang (2003) argued that even though most librarians understand that the patron's private data and loan records are information that should be protected, most institutes that have specific regulations or policies about this issue find that the same policies effect the rate of library use.
Kennedy, S. D. (2006). I've been violated. Information Today. 17. 20.
Kim, Gi-Mun. (2003). Miguk-ui aegukbeobgwa doseogwan iyoungjaui privacy. Library with People, 4(4), 60-71.
Kim, Hae-Kyoung, & Nam, Tae-Woo. (2004). A new model for codes of ethics for librarians of South Korea. Journal of the Korean Society for Information Management, 21(4), 329-352.
Kim, Hye-Sun. (1994). A Study on Ethics in Librarianship. M.A. thesis, Ewha Womans University.
Kim (1994) suggested that privacy invasion prevention should involve privacy protection, user education, and statutory regulation and processes.
Kim, Ki-Seong. (2006). A Study on the Privacy of University Libraries. M.A. thesis, Chungnam University.
Kim (2006) studied the factors of the private information protection policy that are needed in college libraries and determined changes that college libraries needed, through analyzing domestic and foreign library private information protection policies and cases of violation.
Kim, Song-soo. (2012). A study on library user privacy protection in the digital environment: Focused on record of checked out books. Hanyang University, Graduate School of Public Policy.
Kim (2012) said the record of borrowed books is information that can reveal the ideals and conscience of patrons, making it sensitive private information that is related to the patrons’ privacy.
Lee, Mi-Hwa. (2006). A study on user perceptions about privacy and library records. The Journal of the Korean Private University Library Association, 7, 225-240.
Lee, Myeong-Hee. (2004). Libraries' efforts to preserve intellectual freedom and banned book. Journal of the Korean Biblia Society for library and Information Science, 15(1), 193-216.
Lee (2004), in a study of library intellectual freedom, researched the declaration of intellectual freedom in advanced countries, the freedom of collection records, and the policies towards passwords of patrons.
Leiserson, A. B. (2002). A user's perspective on privacy and the web. Law Library Journal, 94(3), 539-546.
Levine, C. (2006). IM: Real-time problems: Traders increasingly are adopting public instant messaging services, but most of these applications open severe security goles. Wall Street & Technology.
Noh, Younghee. (2012b). A study of personalized user services and privay in the library. Journal of Korean Library and Information Science Society, 43(3), 357-398.
Noh (2012a) analyzed the possible privacy violations that could arise in libraries through the interference of other institutions (such as police or federal investigations), the process of providing library service, and the outsourcing of library tasks. In another study, Noh (2012b) argued that the accumulation of information for service personalization can also lead to privacy violations as well as other problems like filter bubbles.
Noh, Younghee. (2012c). A study of digital library service records and user privacy. Journal of the Korean Society for Information Management, 29(3), 187-214.
Noh (2012c), through the study of library private information protection policy, research on privacy violation cases, and analysis of laws and guidelines relating to domestic private information, suggested a suitable private information policy for the library as well as presented a case for the importance of establishing a policy for such protection.
Noh, Younghee. (2013). Digital Library User privacy: Changing Librarian View points through Education. in progress.
OECD. (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data [online] Retrieved 2013.08.23.
Park, Sang-Keun. (2010). A study on the plans for the reinforcement of the personal information protection policy in public libraries. Graduate School of Kyonggi University, Department of Library and Information Science.
Park (2010), in his study of patrons’ guaranteed rights and invasion of private information, fully described the real condition of public institutes and libraries.
Sturges, P. (2002). Remember the human: The first rule of netquette, librarians and the internet. Online Information Review, 26(3), 209-16.
The National Library of Korea. (2012). Guidelines for personal information protection. Seoul: The National Library of Korea.
Tripathi, Sneha, & Tripathi, Aditya. (2010). Privacy in libraries: The Perspective from India. Library Review, 59(8), 615-623.
Wallace, M. (1988). Ethics: Is it time for a code? In managing the law firm library 1988. 258 PIL/ PAT 329(Sept. 1, 1988).
Wareen, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review. 4, 193.
Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.
Zimerman (2009) argued that the development of information technology had lowered the level of privacy in society.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.