DOI QR코드

DOI QR Code

A Critical Literature Analysis of Library and User Privacy

  • Noh, Younghee (Department of Library and Information Science, Konkuk University)
  • Received : 2016.10.26
  • Accepted : 2017.05.10
  • Published : 2017.06.30

Abstract

This research aims at identifying through literature analysis the extent of past research related to the protection of personal information and privacy of library users. This study was conducted in 3 stages of literature analysis suggested by other researchers, including Powell (2005). First, I found and collected literature related to personal information and library user privacy. Second, I reviewed the collected literature and identified detailed subjects and core concepts. Third, I analyzed the core subjects, main discussion points, and related examples shown in those papers divided into 7 subgroups. I examine library privacy from various angles through literature analysis, and the results of this paper would be useful for establishing library privacy policies and developing guidelines for librarians.

Keywords

References

  1. AALL. (1999). AALL Ethical Principles. Retrieved from http://www.aallnet.org/about/policy_ethics.asp
  2. Adams, H. R. (2002). Privacy & Confidentiality: Now More Than Ever Youngsters Need to Keep Their Library Use Under Wraps. American Libraries, 33(10), 44-48.
  3. Ahn, J., & Kim, H. (2008). Design of Access control module of Similar user Information on web site Providing Personal Service. Proceeding of the Fall Conference of the Korea Multimedia Society, 535-538.
  4. ALA. (2014). Privacy: An Interpretation of the Library Bill of Rights. Retrieved from http://www.ala.org
  5. ALA. (2014). Privacy Resources for Librarians, Library Users, and Families. Retrieved form http://www.ala.org/offices/oif/ifissues/issuesrelatedlinks/privacyresources
  6. Allen, C., Kania, D., & Yaeckel, B. (1998). Internet World Guide to One-to-One Marketing. New York: Wiley Computer Publishing.
  7. Angwin, J., & Mcginty, T. (2010). Sites Feed Personal Details To New Tracking Industry. Retrieved from http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html
  8. Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical Evaluation of information transparency and the Willingness to be profiled online for Personalization. MIS Quarterly, 30(1), 13-28. https://doi.org/10.2307/25148715
  9. Balas, J. (2001). How Should Privacy Be Protected in the Electronic Library. Computers in Libraries, 21(6), 53-55.
  10. Bates, M. J., & Maack, M. N. (2009). Encyclopedia of Library and Information Sciences, Third Edition. London: CRC Press.
  11. Blitz, M. J. (2006). Constitutional Safeguards for Silent Experiments in Living: Libraries, The Right to Read, and a First Amendment Theory for an Unaccompanied Right to Receive Information. 74(4), 799-882.
  12. Bowers, S. L. (2006). Privacy and Library Records. Journal of Academic Librarianship, 32(4), 377-383. https://doi.org/10.1016/j.acalib.2006.03.005
  13. Bowers, S. L. (2008). Self-Service Holds: a Violation of Library Patron's Privacy. Public Libraries, 47(4), 54-57.
  14. Brunk, B. (2001). Exoinformation & Interface Design. Bulletin of the American Society for Information Science and Technology, 27(6), Retrieved from http://www.asis.org/Bulletin/Aug-01/brunk.html
  15. Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. https://doi.org/10.1108/02640470710779844
  16. Caldwell-Stone, D. (2008). Privacy, Libraries, and ALA. American Libraries, 39(8), 58-58.
  17. Chen, A. (2010). GCreep: Google Engineer Stalked Teens, Spied on Chats. Retrieved form http://gawker.com/5637234
  18. Chong, J. (2008). Constitutional law. Seoul: PAKTOUNGSA.
  19. Clarke, R. (1996). Privacy and Dataveillance, and Organisational Strategy. Keynote address to the Conference of the I.S. Audit & Control Association, Perth, Western Australia.
  20. Coombs, K. A. (2005). Protecting User Privacy in the Age of Digital Libraries. Computers in Libraries, 25(6), 16-20.
  21. Coombs, K. A. (2004). Walking a Tightrope: Academic Libraries and Privacy. Journal of Academic Librarianship, 30(6), 493-498. https://doi.org/10.1016/j.acalib.2004.08.003
  22. Dettlaff, C. (2007). Protecting User Privacy in the Library. Community & Junior College Libraries, 13(4), 7-8. https://doi.org/10.1300/J107v13n04_03
  23. Falk, H. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. https://doi.org/10.1108/02640470410541697
  24. Fifarek, A. (2002). Technology and Privacy in the Academic Library. Online Information Review, 26(6), 366-374. https://doi.org/10.1108/14684520210452691
  25. Garoogian, R. (1991). Librarian/Patron Confidentiality: An Ethical Challenge. Library Trends, 40(20), 216-33.
  26. Gavison, R. (1980). Privacy and the limits of law. Yale Law Journal, 89(3), 421-471. https://doi.org/10.2307/795891
  27. Green, H. (2011). Breaking Out of Your Internet Filter Bubble. Retrieved from http://www.forbes.com/sites/work-in-progress/2011/08/29/breaking-out-of-your-internet-filterbubble
  28. Han, S. (2002). The human rights on constitution. HeonbeobNonchong, 13, 623-678.
  29. Hopkins, C. (2010). Google's 2nd Transparency Report: U.S. Info Requests Increase. Retrieved from http://www.readwriteweb.com/archives/googles_second_transparency_report_us_info_request.php
  30. Huh, S. (2009). Internet Search and the Right to Informational Self-Determination. Public Law Journal, 10(2), 157-186.
  31. Intellectual Freedom Committee, American Library Association. (2002). Questions and Answers on Privacy and Confidentiality. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy
  32. Johnston, S. D. (2000). Rethinking Privacy in the Public Library. The International Information & Library Review, 32(3-4), 509-517. https://doi.org/10.1006/iilr.2000.0150
  33. Jones, B. M. (2010). Libraries, Technology, and the Culture of Privacy: Global Perspective. Library Technology Report, November(01), 8-12.
  34. Joung, H. (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1), 243-264.
  35. Jung, K., & Park, S. (2011). Personalization Privacy Protection Technique for Massive User in Location Based Service. Proc. of the KIISE Korea Computer Congress 2011, 38(2), 1-4.
  36. Kang, S. (2003). A study on ethic of librarians and information servies job. Library with People, 4(4), 20-59.
  37. Kim, B., & Hong, E. (2008). Extending Role-based Access Control for Privacy Preservation in Academic Affairs System. Journal of The Korea Institute of Information Security and Cryptology, 14(2), 171-179.
  38. Kim, D. M., Chun, J., Young, N., Geon, T., & Jeong, I. R. (2009). Secure Searchable Encryption with User-Revocability in Multi-User Settings. Journal of The Korea Institute of Information Security and Cryptology, 21(1), 3-14.
  39. Kim, H., & Nam, T. (2004). A new model for codes of ethics for librarians of South Korea. Journal of the Korean Society for Information Management, 21(4), 329-352. https://doi.org/10.3743/KOSIM.2004.21.4.329
  40. Kim, H. (1994). A Study on Ethics in Librarianship. M.A. thesis, EwhaWomans University.
  41. Kim, K. (2006). Study on the Privacy of University Libraries. M.A. thesis, Chungnam University.
  42. Kim, S. (2011). A study on library user privacy protection in the digital environment: focused on record of checked out books. M.A. thesis, Hanyang University, Graduate School of Public Policy.
  43. Klinefelter, A. (2007). Privacy and Library Public Services: Or, I Know What You Read Last Summer. Legal Reference Services Quarterly, 26(1-2), 253-279. https://doi.org/10.1300/J113v26n01_13
  44. Korea Information Security Agency. (2009). MinganGieobGaeinJeongboBoho Manual. Seoul: Korea Information Security Agency.
  45. Korean Library Association. (1997). Code of Ethics for Librarians. Retrieved from http://www.kla.kr/jsp/information/library_info.do
  46. Korean Library Association. (1997). 'Code of Ethics for Librarians' was enacted. KLA Journal, 38(6), 37-39.
  47. Kwon, G. (2005). Privacy and control of self-information. Seoul: KyeonginMunhwasa.
  48. Lee, G. (2005). A Study on the Information Security of Public Libraries. M.A. thesis, Hannam University.
  49. Lee, J. (2012). The Concept of the Context-Aware Computing and Its Application to the Library Information Services. Journal of the Korean BIBLIA Society for library and Information Science, 23(1), 79-194.
  50. Lee, M. (2006). A study on user perceptions about privacy and library records. Journal of Korean Association of Private University Libraries, 7, 225-240.
  51. Lee, Y., & Kwon, O. (2009). Model Based Approach to Estimating Privacy Concerns for Context-Aware Services. Journal of Intelligent Information Systems, 15(2), 97-111.
  52. Lee, Z., Choi, H., & Choi, S. (2007). Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance. The Journal of Society for e-Business Studies, 12(4), 37-51.
  53. Lim, L., Byun, N., Choi, J., and Im, S. (2010). An Analysis of the Relationship between Visual Privacy and Preference of Seats of University Library. Journal of The Architectural Institute of Korea Planning & Design, 26(5), 139-147.
  54. McMenemy, D., Poulter, A., & Burton, P. F. (2007). Handbook of Ethical Practice: A Practical Guide to Dealing with Ethical Issues in Information and Library Work. Oxford: Chandos Publishing.
  55. Medical Library Association. (2014). Goals and Principles for Ethical Conduct. Retrieved from http://www.mlanet.org/about/ethics.html
  56. Noh, G. T., Chun, J. Y., Jeong, I. R., & Lee, D. H. (2009). Privacy Preserving Keyword Search with Access Control. Journal of The Korea Institute of Information Security and Cryptology, 19(5), 35-43.
  57. Noh, Y. (2012). A study of personalized user services and privacy in the library. Journal of Korean Library and Information Science Society, 43(3), 353-384. https://doi.org/10.16981/kliss.43.3.201209.353
  58. OECD. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Retrieved from http://www.oecd.org/internet/interneteconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
  59. Pariser, E. (2011). 10 Ways to Pop Your Filter Bubble. Retrieved from http://www.thefilterbubble.com/10-things-you-can-do
  60. Pariser, Eli. (2011). Beware online filter bubbles. Retrieved from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
  61. Park, H. (2001). A Study on the Data Protection Measures in Line with EU Directive. Seoul: Korea Information Security Agency. Research Report 2001-11.
  62. Park, S. (2009). A Study on the Plans for the Reinforcement of the Personal Information Protection Policy in Public Libraries. M.A. thesis, Kyonggi University.
  63. Park, S., & Lee, M. (2008). Awareness of the Privacy Concepts in Knowledge Management in Scholarly Publications from 2000 to 2004. Journal of the Korean Society for Information Management, 25(2), 99-114. https://doi.org/10.3743/KOSIM.2008.25.2.099
  64. Peralta, E. (2012). Google Admits It Did Not Delete Data Taken From Wi-Fi Devices. Retrieved from http://www.npr.org/blogs/thetwo-way/2012/07/27/157494565/google-admits-it-did-not-deletedata-taken-from-wi-fi-devices
  65. Piterson, W., Ebbers, W., & vanDijk, J. (2007). Personalization in the public sector An inventory of organizational and user obstacles towards personalization of electronic services in the public sector. Government Information Quarterly, 24(1), 148-164. https://doi.org/10.1016/j.giq.2005.12.001
  66. Powell, J. A. et al. (2005). A critical analysis of the literature on the Internet and consumer health information. J TelemedTelecare, 11(1), 41-3.
  67. Scism, L., & Maremont, M. (2010). Insurers Test Data Profiles to Identify Risky Clients. Retrieved from http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html
  68. Shils, E. (1966). Privacy: its constitution and vicissitudes. Law and Contemporary Problems, 31(2), 281-306. https://doi.org/10.2307/1190672
  69. Shuler, J. (2004). Privacy and Academic Libraries: Widening the Frame of Discussion. Journal of Academic Librarianship, 30(2), 157-159. https://doi.org/10.1016/j.acalib.2004.01.008
  70. Silas, F. A. (1986). An open book? Library privacy guarded. ABA Journal, 72(3), 21.
  71. Sohn, Y. O. (1996). A study on the professional ethical relationship between librarian and library work. Journal of Korean Library and Information Science Society, 24, 485-517.
  72. Spitz, M. (2012). Your phone company is watching. Retrieved from http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html
  73. Sturges, P., Davies, E., Dearnley, J., Iliffe, U., Oppenheim, C., & Hardy, R. (2003). User privacy in the digital library environment: an investigation of policies and preparedness. Library Management, 24(1-2), 44-50. https://doi.org/10.1108/01435120310454502
  74. Sturges, P., Teng, V., & Iliffe, U. (2001). User privacy in the digital library environment: a matter of concern for information professionals. Library Management, 22(8-9), 364-370. https://doi.org/10.1108/01435120110406309
  75. Sturges, P. (2002). Remember the human: the first rule of netiquette, librarians and the internet. Online Information Review, 26(3), 209-216. https://doi.org/10.1108/14684520210432486
  76. Swan, J. C. (1983). Public Records and Library Privacy. Library Journal, 108(15), 1645-1650.
  77. Syracuse University Library. (2013). Syracuse University Library Privacy Policy. Retrieved from http://library.syr.edu/PDF/privacypolicy.pdf
  78. The Seattle Public Library. (2014). The Seattle Public Library Website: Privacy Notice. Retrieved from http://www.spl.org/privacy/the-seattle-public-library-website-privacy-notice
  79. Tripathi, S., & Tripathi, A. (2010). Privacy in libraries: the perspective from India. Library Review, 59(8), 615-623. https://doi.org/10.1108/00242531011073146
  80. Warren, S. D., & Brandeis, L D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193. https://doi.org/10.2307/1321160
  81. Xiaozhao, D., & Jianhai, R. (2009). Users' privacy in the Second Life Library. IT in Medicine & Education2009. ITIME '09. IEEE International Symposium on, 1, 337-340.
  82. Zetter, K. (2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved from http://www.wired.com/threatlevel/2010/01/operation-aurora
  83. Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.