References
- AALL. (1999). AALL Ethical Principles. Retrieved from http://www.aallnet.org/about/policy_ethics.asp
- Adams, H. R. (2002). Privacy & Confidentiality: Now More Than Ever Youngsters Need to Keep Their Library Use Under Wraps. American Libraries, 33(10), 44-48.
- Ahn, J., & Kim, H. (2008). Design of Access control module of Similar user Information on web site Providing Personal Service. Proceeding of the Fall Conference of the Korea Multimedia Society, 535-538.
- ALA. (2014). Privacy: An Interpretation of the Library Bill of Rights. Retrieved from http://www.ala.org
- ALA. (2014). Privacy Resources for Librarians, Library Users, and Families. Retrieved form http://www.ala.org/offices/oif/ifissues/issuesrelatedlinks/privacyresources
- Allen, C., Kania, D., & Yaeckel, B. (1998). Internet World Guide to One-to-One Marketing. New York: Wiley Computer Publishing.
- Angwin, J., & Mcginty, T. (2010). Sites Feed Personal Details To New Tracking Industry. Retrieved from http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html
- Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical Evaluation of information transparency and the Willingness to be profiled online for Personalization. MIS Quarterly, 30(1), 13-28. https://doi.org/10.2307/25148715
- Balas, J. (2001). How Should Privacy Be Protected in the Electronic Library. Computers in Libraries, 21(6), 53-55.
- Bates, M. J., & Maack, M. N. (2009). Encyclopedia of Library and Information Sciences, Third Edition. London: CRC Press.
- Blitz, M. J. (2006). Constitutional Safeguards for Silent Experiments in Living: Libraries, The Right to Read, and a First Amendment Theory for an Unaccompanied Right to Receive Information. 74(4), 799-882.
- Bowers, S. L. (2006). Privacy and Library Records. Journal of Academic Librarianship, 32(4), 377-383. https://doi.org/10.1016/j.acalib.2006.03.005
- Bowers, S. L. (2008). Self-Service Holds: a Violation of Library Patron's Privacy. Public Libraries, 47(4), 54-57.
- Brunk, B. (2001). Exoinformation & Interface Design. Bulletin of the American Society for Information Science and Technology, 27(6), Retrieved from http://www.asis.org/Bulletin/Aug-01/brunk.html
- Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. https://doi.org/10.1108/02640470710779844
- Caldwell-Stone, D. (2008). Privacy, Libraries, and ALA. American Libraries, 39(8), 58-58.
- Chen, A. (2010). GCreep: Google Engineer Stalked Teens, Spied on Chats. Retrieved form http://gawker.com/5637234
- Chong, J. (2008). Constitutional law. Seoul: PAKTOUNGSA.
- Clarke, R. (1996). Privacy and Dataveillance, and Organisational Strategy. Keynote address to the Conference of the I.S. Audit & Control Association, Perth, Western Australia.
- Coombs, K. A. (2005). Protecting User Privacy in the Age of Digital Libraries. Computers in Libraries, 25(6), 16-20.
- Coombs, K. A. (2004). Walking a Tightrope: Academic Libraries and Privacy. Journal of Academic Librarianship, 30(6), 493-498. https://doi.org/10.1016/j.acalib.2004.08.003
- Dettlaff, C. (2007). Protecting User Privacy in the Library. Community & Junior College Libraries, 13(4), 7-8. https://doi.org/10.1300/J107v13n04_03
- Falk, H. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. https://doi.org/10.1108/02640470410541697
- Fifarek, A. (2002). Technology and Privacy in the Academic Library. Online Information Review, 26(6), 366-374. https://doi.org/10.1108/14684520210452691
- Garoogian, R. (1991). Librarian/Patron Confidentiality: An Ethical Challenge. Library Trends, 40(20), 216-33.
- Gavison, R. (1980). Privacy and the limits of law. Yale Law Journal, 89(3), 421-471. https://doi.org/10.2307/795891
- Green, H. (2011). Breaking Out of Your Internet Filter Bubble. Retrieved from http://www.forbes.com/sites/work-in-progress/2011/08/29/breaking-out-of-your-internet-filterbubble
- Han, S. (2002). The human rights on constitution. HeonbeobNonchong, 13, 623-678.
- Hopkins, C. (2010). Google's 2nd Transparency Report: U.S. Info Requests Increase. Retrieved from http://www.readwriteweb.com/archives/googles_second_transparency_report_us_info_request.php
- Huh, S. (2009). Internet Search and the Right to Informational Self-Determination. Public Law Journal, 10(2), 157-186.
- Intellectual Freedom Committee, American Library Association. (2002). Questions and Answers on Privacy and Confidentiality. Retrieved from http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy
- Johnston, S. D. (2000). Rethinking Privacy in the Public Library. The International Information & Library Review, 32(3-4), 509-517. https://doi.org/10.1006/iilr.2000.0150
- Jones, B. M. (2010). Libraries, Technology, and the Culture of Privacy: Global Perspective. Library Technology Report, November(01), 8-12.
- Joung, H. (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1), 243-264.
- Jung, K., & Park, S. (2011). Personalization Privacy Protection Technique for Massive User in Location Based Service. Proc. of the KIISE Korea Computer Congress 2011, 38(2), 1-4.
- Kang, S. (2003). A study on ethic of librarians and information servies job. Library with People, 4(4), 20-59.
- Kim, B., & Hong, E. (2008). Extending Role-based Access Control for Privacy Preservation in Academic Affairs System. Journal of The Korea Institute of Information Security and Cryptology, 14(2), 171-179.
- Kim, D. M., Chun, J., Young, N., Geon, T., & Jeong, I. R. (2009). Secure Searchable Encryption with User-Revocability in Multi-User Settings. Journal of The Korea Institute of Information Security and Cryptology, 21(1), 3-14.
- Kim, H., & Nam, T. (2004). A new model for codes of ethics for librarians of South Korea. Journal of the Korean Society for Information Management, 21(4), 329-352. https://doi.org/10.3743/KOSIM.2004.21.4.329
- Kim, H. (1994). A Study on Ethics in Librarianship. M.A. thesis, EwhaWomans University.
- Kim, K. (2006). Study on the Privacy of University Libraries. M.A. thesis, Chungnam University.
- Kim, S. (2011). A study on library user privacy protection in the digital environment: focused on record of checked out books. M.A. thesis, Hanyang University, Graduate School of Public Policy.
- Klinefelter, A. (2007). Privacy and Library Public Services: Or, I Know What You Read Last Summer. Legal Reference Services Quarterly, 26(1-2), 253-279. https://doi.org/10.1300/J113v26n01_13
- Korea Information Security Agency. (2009). MinganGieobGaeinJeongboBoho Manual. Seoul: Korea Information Security Agency.
- Korean Library Association. (1997). Code of Ethics for Librarians. Retrieved from http://www.kla.kr/jsp/information/library_info.do
- Korean Library Association. (1997). 'Code of Ethics for Librarians' was enacted. KLA Journal, 38(6), 37-39.
- Kwon, G. (2005). Privacy and control of self-information. Seoul: KyeonginMunhwasa.
- Lee, G. (2005). A Study on the Information Security of Public Libraries. M.A. thesis, Hannam University.
- Lee, J. (2012). The Concept of the Context-Aware Computing and Its Application to the Library Information Services. Journal of the Korean BIBLIA Society for library and Information Science, 23(1), 79-194.
- Lee, M. (2006). A study on user perceptions about privacy and library records. Journal of Korean Association of Private University Libraries, 7, 225-240.
- Lee, Y., & Kwon, O. (2009). Model Based Approach to Estimating Privacy Concerns for Context-Aware Services. Journal of Intelligent Information Systems, 15(2), 97-111.
- Lee, Z., Choi, H., & Choi, S. (2007). Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance. The Journal of Society for e-Business Studies, 12(4), 37-51.
- Lim, L., Byun, N., Choi, J., and Im, S. (2010). An Analysis of the Relationship between Visual Privacy and Preference of Seats of University Library. Journal of The Architectural Institute of Korea Planning & Design, 26(5), 139-147.
- McMenemy, D., Poulter, A., & Burton, P. F. (2007). Handbook of Ethical Practice: A Practical Guide to Dealing with Ethical Issues in Information and Library Work. Oxford: Chandos Publishing.
- Medical Library Association. (2014). Goals and Principles for Ethical Conduct. Retrieved from http://www.mlanet.org/about/ethics.html
- Noh, G. T., Chun, J. Y., Jeong, I. R., & Lee, D. H. (2009). Privacy Preserving Keyword Search with Access Control. Journal of The Korea Institute of Information Security and Cryptology, 19(5), 35-43.
- Noh, Y. (2012). A study of personalized user services and privacy in the library. Journal of Korean Library and Information Science Society, 43(3), 353-384. https://doi.org/10.16981/kliss.43.3.201209.353
- OECD. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Retrieved from http://www.oecd.org/internet/interneteconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
- Pariser, E. (2011). 10 Ways to Pop Your Filter Bubble. Retrieved from http://www.thefilterbubble.com/10-things-you-can-do
- Pariser, Eli. (2011). Beware online filter bubbles. Retrieved from http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
- Park, H. (2001). A Study on the Data Protection Measures in Line with EU Directive. Seoul: Korea Information Security Agency. Research Report 2001-11.
- Park, S. (2009). A Study on the Plans for the Reinforcement of the Personal Information Protection Policy in Public Libraries. M.A. thesis, Kyonggi University.
- Park, S., & Lee, M. (2008). Awareness of the Privacy Concepts in Knowledge Management in Scholarly Publications from 2000 to 2004. Journal of the Korean Society for Information Management, 25(2), 99-114. https://doi.org/10.3743/KOSIM.2008.25.2.099
- Peralta, E. (2012). Google Admits It Did Not Delete Data Taken From Wi-Fi Devices. Retrieved from http://www.npr.org/blogs/thetwo-way/2012/07/27/157494565/google-admits-it-did-not-deletedata-taken-from-wi-fi-devices
- Piterson, W., Ebbers, W., & vanDijk, J. (2007). Personalization in the public sector An inventory of organizational and user obstacles towards personalization of electronic services in the public sector. Government Information Quarterly, 24(1), 148-164. https://doi.org/10.1016/j.giq.2005.12.001
- Powell, J. A. et al. (2005). A critical analysis of the literature on the Internet and consumer health information. J TelemedTelecare, 11(1), 41-3.
- Scism, L., & Maremont, M. (2010). Insurers Test Data Profiles to Identify Risky Clients. Retrieved from http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html
- Shils, E. (1966). Privacy: its constitution and vicissitudes. Law and Contemporary Problems, 31(2), 281-306. https://doi.org/10.2307/1190672
- Shuler, J. (2004). Privacy and Academic Libraries: Widening the Frame of Discussion. Journal of Academic Librarianship, 30(2), 157-159. https://doi.org/10.1016/j.acalib.2004.01.008
- Silas, F. A. (1986). An open book? Library privacy guarded. ABA Journal, 72(3), 21.
- Sohn, Y. O. (1996). A study on the professional ethical relationship between librarian and library work. Journal of Korean Library and Information Science Society, 24, 485-517.
- Spitz, M. (2012). Your phone company is watching. Retrieved from http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html
- Sturges, P., Davies, E., Dearnley, J., Iliffe, U., Oppenheim, C., & Hardy, R. (2003). User privacy in the digital library environment: an investigation of policies and preparedness. Library Management, 24(1-2), 44-50. https://doi.org/10.1108/01435120310454502
- Sturges, P., Teng, V., & Iliffe, U. (2001). User privacy in the digital library environment: a matter of concern for information professionals. Library Management, 22(8-9), 364-370. https://doi.org/10.1108/01435120110406309
- Sturges, P. (2002). Remember the human: the first rule of netiquette, librarians and the internet. Online Information Review, 26(3), 209-216. https://doi.org/10.1108/14684520210432486
- Swan, J. C. (1983). Public Records and Library Privacy. Library Journal, 108(15), 1645-1650.
- Syracuse University Library. (2013). Syracuse University Library Privacy Policy. Retrieved from http://library.syr.edu/PDF/privacypolicy.pdf
- The Seattle Public Library. (2014). The Seattle Public Library Website: Privacy Notice. Retrieved from http://www.spl.org/privacy/the-seattle-public-library-website-privacy-notice
- Tripathi, S., & Tripathi, A. (2010). Privacy in libraries: the perspective from India. Library Review, 59(8), 615-623. https://doi.org/10.1108/00242531011073146
- Warren, S. D., & Brandeis, L D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193. https://doi.org/10.2307/1321160
- Xiaozhao, D., & Jianhai, R. (2009). Users' privacy in the Second Life Library. IT in Medicine & Education2009. ITIME '09. IEEE International Symposium on, 1, 337-340.
- Zetter, K. (2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved from http://www.wired.com/threatlevel/2010/01/operation-aurora
- Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.