References
- 국가인권위원회 (2005). 공공도서관 개인정보 보호실태 조사결과 보고서. 서울: 국가인권위원회.(National Human Rights Commission of Korea (2005). A survey report on personal information protection in public libraries (공공도서관 개인정보 보호실태 조사결과 보고서). Seoul: National Human Rights Commission of Korea.)
- 국립중앙도서관 (2005). 국립중앙도서관, 공공도서관의 개인정보보호지침 마련. Retrieved from http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020(The National Library of Korea (2005). Press release: The National Library of Korea set up guidelines for personal information protection in public libraries (보도자료: 국립중앙도서관, 공공도서관의 개인정보보호지침 마련). Retrieved from http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020)
- 국립중앙도서관 (2012). 개인정보보호지침. 서울: 국립중앙도서관.(The National Library of Korea (2012). Guidelines for personal information protection (개인정보보 호지침). Seoul: The National Library of Korea.)
- 김송수 (2012). 디지털 환경에서 도서관 이용자의 프라이버시 보호에 관한 연구: 도서 대출 기록을 중심으로. 석사학위논문, 한양대학교 공공정책대학원, 사법행정전공.(Kim, Song-soo (2012). A study on library user privacy protection in the digital environment: Focused on record of checked out books. Hanyang University, Graduate School of Public Policy.)
- 노영희 (2012). 도서관의 이용자맞춤형서비스와 프라이버시. 한국도서관․정보학회지, 43(3), 357-398.(Noh, Younghee (2012). A study of personalized user services and privacy in the library. Journal of Korean Library and Information Science Society, 43(3), 357-398.)
- 박상근 (2010). 공공도서관 개인정보보호 정책의 강화 방안 연구. 석사학위논문. 경기대학교 대학원, 문헌정보학과.(Park, Sang-Keun (2010). A study on the plans for the reinforcement of the personal information protection policy in public libraries. Unpublished master's thesis, Graduate School of Kyonggi University, Suwon, Korea.)
- 이명희 (2004). 도서관에서 지적자유 수호를 위한 노력과 금서에 관한 연구: 한국과 미국의 경우를 중심으로. 한국비블리아학회지, 15(1), 193-216.(Lee, Myeong-Hee (2004). Libraries' efforts to preserve intellectual freedom and banned books. Journal of the Korean Biblia Society for library and Information Science, 15(1), 193-216.)
- 정현태 (2000). 우리나라 공공도서관의 지적자유에 대한 사례연구. 한국문헌정보학회지, 34(1), 243-264.(Joung, Hyun-Tae (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1): 243-64.)
- 제성호 (2003). 미국의 반테러법과 우리에 대한 시사점. 중앙법학, 5(3), 129-162.(Je, Seong-Ho (2003). The U.S. Antiterrorism Act and its lessens for Korea. Chung-Ang Law Review, 5(3), 129-162.)
- 한국도서관협회 (1997). 도서관인윤리선언. Retrieved from http://www.kla.kr/jsp/information/library_info.jsp(The Korean Libary Association (1997). Code of ethics for librarians. Retrieved from http://www.kla.kr/jsp/information/library_info.jsp)
- AALL (1999). AALL Ethical Principles. Retrieved from http://www.aallnet.org/about/policy_ethics.asp
- Adams, H. R., Bocher, R. F., Gordon, C. A., & Barry-Kessler, E. (2005). Privacy in the 21st century: Issues for public, school, and academic libraries. Libraries Unlimited.
- Airoldi, J. (2005). Librarian's brush with FBI shapes her view of the USA Patriot Act. USA Today, May 17.
- American Library Association (1995). American Library Association Code of Ethics, art III. Retrieved from http://www.ala.org/ala/oif/statementspols/codeofethics/coehistory/codeofethics.pdf.
- American Library Association (2002). Privacy: An interpretation of the Library Bill of Rights. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy
- Anonymous (2002). Expended FBI powers threaten library privacy. American Libraries, 33(7), 19.
- Balas, J. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55.
- Bender, K. (2006). Library gala faces privacy protest. Oakland Tribune [Oakland, Calif] 11 Feb 2006, 1.
- Blitz, M. J. (2006). Constitutional safeguards for silent experiments in living: Libraries, the right to read, and a first amendment theory for an unaccompanied right to receive information. 74 UMKC L. Rev., 799.
- Boone, T., & Studwell, B. (2006). Smart barcodes: Planning for RFID and related privacy issues. 11 AALL Spectrum 18.
- Bowers, S. L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383. https://doi.org/10.1016/j.acalib.2006.03.005
- Bowers, S. L. (2008). Self-service holds: A violation of library patron's privacy. Public Libraries, 47(4), 54-57.
- Breeding, M. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30.
- Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. https://doi.org/10.1108/02640470710779844
- Caldwell-Stone, D. (2008). Privacy, libraries, and ALA. American Libraries, September, 58.
- Clarke, R. (1996). Privacy and dataveillance, and organisational strategy. Keynote address to the Conference of the I.S. Audit & Control Association, Perth, Western Australia.
- DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of Internet commerce: Personhood and pragmatism, pop-tarts and six-packs. Texas Law Review, 87(11), 1013-1017.
- Dettlaff, C. (2007). Protecting user privacy in the library. Community & Junior College Libraries, 13(4), 7-8. https://doi.org/10.1300/J107v13n04_03
- Enright, K. P. (2001). Privacy audit checklist. Retrieved from http://cyber.law.harvard.edu/clinical/privacyaudit.html
- Falk, H. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. https://doi.org/10.1108/02640470410541697
- Farkas, M. (2006). Libraries in social networking software. Retrieved from http://meredith.wolfwater.com/wordpress/index.php/2006/05/10/libraries-in-social-networking-software/
- Fifarek, A. (2002). Technology and privacy in the academic library. Online Information Review, 26(6), 366-374. https://doi.org/10.1108/14684520210452691
- Fillo, M. (1999, February 17). Privacy concern, printer control clash at library. Hartford Courant, B1.
- Intellectual Freedom Committee, American Library Association (2012). Questions and answers on privacy and confidentiality. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy
- Johnston, S. D. (2000). Rethinking privacy in the public library. The International Information & Library Review, 32(3-4), 509-517. https://doi.org/10.1006/iilr.2000.0150
- Kennedy, S. D. (2006). I've been violated. Information Today, 17, 20.
- Kinzie, S., & Noguchi, Y. (2006, September 7). In online social club, sharing is the point until it goes too far. The Washington Post, A01.
- Klinefelter, A. (2007). Privacy and library public services: Or, I know what you read last summer. Legal Reference Services Quarterly, 26(1-2), 253-279. https://doi.org/10.1300/J113v26n01_13
- Lamb, A., & Johnson, L. (2006). Want to be my "friend"? What you need to know about social technologies. Teacher Librarian, 34(1), 55.
- Leiserson, A. B. (2002). A user's perspective on privacy and the web. Law Library Journal, 94(3), 539-546.
- Levine, C. (2006, April 1). IM: Real-time problems; Traders increasingly are adopting public instant messaging services, but most of these applications open severe security holes. Wall Street & Technology.
- Madison Public Library (2012). USA Patriot Act and Madison Public Library records. Retrieved from http://www.madisonpubliclibrary.org/policies/usa-patriot-act-and-madison-public-library -records
- McMenemy, D., Poulter, A., & Burton, P. F. (2007). Handbook of ethical practice: A practical guide to dealing with ethical issues in information and library work. Oxford: Chandos Publishing.
- Medical Library Association (1994). Goals and principles for ethical conduct. Retrieved from http://www.mlanet.org/about/ethics.html
- Pariser, E. (2011). Beware online "filter bubbles". Retrieved from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
- Peralta, E. (2012). Google admits it did not delete data taken from Wi-Fi devices. Retrieved from http://www.npr.org/blogs/thetwo-way/2012/07/27/157494565/google-admits-it-did-notdelete-data-taken-from-wi-fi-devices
- Shils, E. (1966). Privacy: Its constitution and vicissitudes. Law and Contemporary Problems, 31(2), 281-306. https://doi.org/10.2307/1190672
- Shuler, J. (2004). Privacy and academic libraries: Widening the frame of discussion. Journal of Academic Librarianship, 30(2), 157-159. https://doi.org/10.1016/j.acalib.2004.01.008
- Silas, F. A. (1986). An open book? Library privacy guarded. ABA Journal, 72(3), 21.
- Spitz, M. (2012). Your phone company is watching. Retrieved from http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html
- Sturges, P. (2002). Remember the human: The first rule of netiquette, librarians and the internet. Online Information Review, 26(3), 209-16. https://doi.org/10.1108/14684520210432486
- Tripathi, S., & Tripathi, A. (2010). Privacy in libraries: The perspective from India. Library Review, 59(8), 615-623. https://doi.org/10.1108/00242531011073146
- Ventura County Library (n.d.). Retrieved from http://www.vencolibrary.org/
- Wallace, M. (1988). Ethics: Is it time for a code? In managing the law firm library 1988, 258 PIL/PAT 329 (Sept. 1, 1988).
- Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193. https://doi.org/10.2307/1321160
- Xiaozhao, D., & Jianhai, R. (2009). Users' privacy in the Second Life Library. ITIME '09: IEEE International Symposium on IT in Medicine & Education 2009, Volume 1, 337-340.
- Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.
Cited by
- A Study of Public Library Patrons' Understanding of Library Records and Data Privacy vol.4, pp.1, 2014, https://doi.org/10.5865/IJKCT.2014.4.1.053
- Digital library user privacy: changing librarian viewpoints through education vol.32, pp.2, 2014, https://doi.org/10.1108/LHT-08-2013-0103
- A Study on Librarians' Perception of Library User Privacy vol.47, pp.3, 2013, https://doi.org/10.4275/KSLIS.2013.47.3.073
- Investigating Change of Users' Perception of Privacy Pre- and Post-Education on Library User Privacy vol.32, pp.1, 2015, https://doi.org/10.3743/KOSIM.2015.32.1.063