DOI QR코드

DOI QR Code

A Study of Digital Library Service Records and User Privacy

디지털도서관서비스기록과 이용자프라이버시에 관한 연구

  • Received : 2012.08.14
  • Accepted : 2012.09.10
  • Published : 2012.09.30

Abstract

Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

도서관은 시민의 지적자유를 보장하기 위해 설립된 기관이며, 시민은 그들이 요구하고, 접근하고, 이용한 정보가 기밀로 유지될 권리를 갖는다. 그들의 프라이버시 보호는 언론의 자유, 사고의 자유, 집회의 자유를 실현하는데 핵심이 된다. 도서관과 사서가 이용자의 프라이버시 문제를 심각하게 생각해야 하는 이유는 도서관 이용자의 개인정보 보호는 사서가 가장 중요하게 생각해야 하는 임무중의 하나이며, 이용자가 지적자유를 진정으로 누릴 수 있도록 하기 위함이다. 본 연구에서는 도서관에서 발생할 수 있는 프라이버시 침해가능성에 대해서 포괄적으로 조사 분석하고자 하였다. 그 결과 국가나 법률관련기관이 업무를 집행하는 과정에서 발생했던 프라이버시 침해 사례, 대출반납서비스, 참고서비스, 온라인탐색서비스 등 일상적인 도서관서비스를 하는 과정에서 발생했던 프라이버시 침해가능성 및 사례, 그리고 도서관업무를 아웃소싱하는 과정에서 발생할 수 있는 침해 가능성 및 사례 등이 있는 것으로 조사되었다.

Keywords

References

  1. 국가인권위원회 (2005). 공공도서관 개인정보 보호실태 조사결과 보고서. 서울: 국가인권위원회.(National Human Rights Commission of Korea (2005). A survey report on personal information protection in public libraries (공공도서관 개인정보 보호실태 조사결과 보고서). Seoul: National Human Rights Commission of Korea.)
  2. 국립중앙도서관 (2005). 국립중앙도서관, 공공도서관의 개인정보보호지침 마련. Retrieved from http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020(The National Library of Korea (2005). Press release: The National Library of Korea set up guidelines for personal information protection in public libraries (보도자료: 국립중앙도서관, 공공도서관의 개인정보보호지침 마련). Retrieved from http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020)
  3. 국립중앙도서관 (2012). 개인정보보호지침. 서울: 국립중앙도서관.(The National Library of Korea (2012). Guidelines for personal information protection (개인정보보 호지침). Seoul: The National Library of Korea.)
  4. 김송수 (2012). 디지털 환경에서 도서관 이용자의 프라이버시 보호에 관한 연구: 도서 대출 기록을 중심으로. 석사학위논문, 한양대학교 공공정책대학원, 사법행정전공.(Kim, Song-soo (2012). A study on library user privacy protection in the digital environment: Focused on record of checked out books. Hanyang University, Graduate School of Public Policy.)
  5. 노영희 (2012). 도서관의 이용자맞춤형서비스와 프라이버시. 한국도서관․정보학회지, 43(3), 357-398.(Noh, Younghee (2012). A study of personalized user services and privacy in the library. Journal of Korean Library and Information Science Society, 43(3), 357-398.)
  6. 박상근 (2010). 공공도서관 개인정보보호 정책의 강화 방안 연구. 석사학위논문. 경기대학교 대학원, 문헌정보학과.(Park, Sang-Keun (2010). A study on the plans for the reinforcement of the personal information protection policy in public libraries. Unpublished master's thesis, Graduate School of Kyonggi University, Suwon, Korea.)
  7. 이명희 (2004). 도서관에서 지적자유 수호를 위한 노력과 금서에 관한 연구: 한국과 미국의 경우를 중심으로. 한국비블리아학회지, 15(1), 193-216.(Lee, Myeong-Hee (2004). Libraries' efforts to preserve intellectual freedom and banned books. Journal of the Korean Biblia Society for library and Information Science, 15(1), 193-216.)
  8. 정현태 (2000). 우리나라 공공도서관의 지적자유에 대한 사례연구. 한국문헌정보학회지, 34(1), 243-264.(Joung, Hyun-Tae (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1): 243-64.)
  9. 제성호 (2003). 미국의 반테러법과 우리에 대한 시사점. 중앙법학, 5(3), 129-162.(Je, Seong-Ho (2003). The U.S. Antiterrorism Act and its lessens for Korea. Chung-Ang Law Review, 5(3), 129-162.)
  10. 한국도서관협회 (1997). 도서관인윤리선언. Retrieved from http://www.kla.kr/jsp/information/library_info.jsp(The Korean Libary Association (1997). Code of ethics for librarians. Retrieved from http://www.kla.kr/jsp/information/library_info.jsp)
  11. AALL (1999). AALL Ethical Principles. Retrieved from http://www.aallnet.org/about/policy_ethics.asp
  12. Adams, H. R., Bocher, R. F., Gordon, C. A., & Barry-Kessler, E. (2005). Privacy in the 21st century: Issues for public, school, and academic libraries. Libraries Unlimited.
  13. Airoldi, J. (2005). Librarian's brush with FBI shapes her view of the USA Patriot Act. USA Today, May 17.
  14. American Library Association (1995). American Library Association Code of Ethics, art III. Retrieved from http://www.ala.org/ala/oif/statementspols/codeofethics/coehistory/codeofethics.pdf.
  15. American Library Association (2002). Privacy: An interpretation of the Library Bill of Rights. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy
  16. Anonymous (2002). Expended FBI powers threaten library privacy. American Libraries, 33(7), 19.
  17. Balas, J. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55.
  18. Bender, K. (2006). Library gala faces privacy protest. Oakland Tribune [Oakland, Calif] 11 Feb 2006, 1.
  19. Blitz, M. J. (2006). Constitutional safeguards for silent experiments in living: Libraries, the right to read, and a first amendment theory for an unaccompanied right to receive information. 74 UMKC L. Rev., 799.
  20. Boone, T., & Studwell, B. (2006). Smart barcodes: Planning for RFID and related privacy issues. 11 AALL Spectrum 18.
  21. Bowers, S. L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383. https://doi.org/10.1016/j.acalib.2006.03.005
  22. Bowers, S. L. (2008). Self-service holds: A violation of library patron's privacy. Public Libraries, 47(4), 54-57.
  23. Breeding, M. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30.
  24. Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. https://doi.org/10.1108/02640470710779844
  25. Caldwell-Stone, D. (2008). Privacy, libraries, and ALA. American Libraries, September, 58.
  26. Clarke, R. (1996). Privacy and dataveillance, and organisational strategy. Keynote address to the Conference of the I.S. Audit & Control Association, Perth, Western Australia.
  27. DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of Internet commerce: Personhood and pragmatism, pop-tarts and six-packs. Texas Law Review, 87(11), 1013-1017.
  28. Dettlaff, C. (2007). Protecting user privacy in the library. Community & Junior College Libraries, 13(4), 7-8. https://doi.org/10.1300/J107v13n04_03
  29. Enright, K. P. (2001). Privacy audit checklist. Retrieved from http://cyber.law.harvard.edu/clinical/privacyaudit.html
  30. Falk, H. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. https://doi.org/10.1108/02640470410541697
  31. Farkas, M. (2006). Libraries in social networking software. Retrieved from http://meredith.wolfwater.com/wordpress/index.php/2006/05/10/libraries-in-social-networking-software/
  32. Fifarek, A. (2002). Technology and privacy in the academic library. Online Information Review, 26(6), 366-374. https://doi.org/10.1108/14684520210452691
  33. Fillo, M. (1999, February 17). Privacy concern, printer control clash at library. Hartford Courant, B1.
  34. Intellectual Freedom Committee, American Library Association (2012). Questions and answers on privacy and confidentiality. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy
  35. Johnston, S. D. (2000). Rethinking privacy in the public library. The International Information & Library Review, 32(3-4), 509-517. https://doi.org/10.1006/iilr.2000.0150
  36. Kennedy, S. D. (2006). I've been violated. Information Today, 17, 20.
  37. Kinzie, S., & Noguchi, Y. (2006, September 7). In online social club, sharing is the point until it goes too far. The Washington Post, A01.
  38. Klinefelter, A. (2007). Privacy and library public services: Or, I know what you read last summer. Legal Reference Services Quarterly, 26(1-2), 253-279. https://doi.org/10.1300/J113v26n01_13
  39. Lamb, A., & Johnson, L. (2006). Want to be my "friend"? What you need to know about social technologies. Teacher Librarian, 34(1), 55.
  40. Leiserson, A. B. (2002). A user's perspective on privacy and the web. Law Library Journal, 94(3), 539-546.
  41. Levine, C. (2006, April 1). IM: Real-time problems; Traders increasingly are adopting public instant messaging services, but most of these applications open severe security holes. Wall Street & Technology.
  42. Madison Public Library (2012). USA Patriot Act and Madison Public Library records. Retrieved from http://www.madisonpubliclibrary.org/policies/usa-patriot-act-and-madison-public-library -records
  43. McMenemy, D., Poulter, A., & Burton, P. F. (2007). Handbook of ethical practice: A practical guide to dealing with ethical issues in information and library work. Oxford: Chandos Publishing.
  44. Medical Library Association (1994). Goals and principles for ethical conduct. Retrieved from http://www.mlanet.org/about/ethics.html
  45. Pariser, E. (2011). Beware online "filter bubbles". Retrieved from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
  46. Peralta, E. (2012). Google admits it did not delete data taken from Wi-Fi devices. Retrieved from http://www.npr.org/blogs/thetwo-way/2012/07/27/157494565/google-admits-it-did-notdelete-data-taken-from-wi-fi-devices
  47. Shils, E. (1966). Privacy: Its constitution and vicissitudes. Law and Contemporary Problems, 31(2), 281-306. https://doi.org/10.2307/1190672
  48. Shuler, J. (2004). Privacy and academic libraries: Widening the frame of discussion. Journal of Academic Librarianship, 30(2), 157-159. https://doi.org/10.1016/j.acalib.2004.01.008
  49. Silas, F. A. (1986). An open book? Library privacy guarded. ABA Journal, 72(3), 21.
  50. Spitz, M. (2012). Your phone company is watching. Retrieved from http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html
  51. Sturges, P. (2002). Remember the human: The first rule of netiquette, librarians and the internet. Online Information Review, 26(3), 209-16. https://doi.org/10.1108/14684520210432486
  52. Tripathi, S., & Tripathi, A. (2010). Privacy in libraries: The perspective from India. Library Review, 59(8), 615-623. https://doi.org/10.1108/00242531011073146
  53. Ventura County Library (n.d.). Retrieved from http://www.vencolibrary.org/
  54. Wallace, M. (1988). Ethics: Is it time for a code? In managing the law firm library 1988, 258 PIL/PAT 329 (Sept. 1, 1988).
  55. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193. https://doi.org/10.2307/1321160
  56. Xiaozhao, D., & Jianhai, R. (2009). Users' privacy in the Second Life Library. ITIME '09: IEEE International Symposium on IT in Medicine & Education 2009, Volume 1, 337-340.
  57. Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.

Cited by

  1. A Study of Public Library Patrons' Understanding of Library Records and Data Privacy vol.4, pp.1, 2014, https://doi.org/10.5865/IJKCT.2014.4.1.053
  2. Digital library user privacy: changing librarian viewpoints through education vol.32, pp.2, 2014, https://doi.org/10.1108/LHT-08-2013-0103
  3. A Study on Librarians' Perception of Library User Privacy vol.47, pp.3, 2013, https://doi.org/10.4275/KSLIS.2013.47.3.073
  4. Investigating Change of Users' Perception of Privacy Pre- and Post-Education on Library User Privacy vol.32, pp.1, 2015, https://doi.org/10.3743/KOSIM.2015.32.1.063