• Title/Summary/Keyword: Privacy in the library

Search Result 44, Processing Time 0.027 seconds

A Study on the Issues on the Right of Portrait for Performing Arts Archives (공연예술기록의 초상권에 관한 연구)

  • Lee, Ho-Sin
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.1
    • /
    • pp.333-355
    • /
    • 2013
  • This paper is to examine the issues of the right of portrait and to suppose practical guideline for performing arts archives. The right of portrait protects external looks of the human beings based on the constitutional human dignity, privacy of a secret and freedom. But sometimes these rights are limited in case of the right to know of the public shall have precedence to the interests of the privacy of individuals. It is hard to regard Performing Arts as a private life in two respects: first, Performing Arts is just one of societal expressions, two, performers are conducting a given role as a performing character. Producing database with the photos and videos under the reasonable agreement from the performers and making it available as a service can be disclaimers of the right of portrait. It is hard to be acknowledged, however, as disclaimers in case of being undermined sameness in the course of using the portraits of the performers.

The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader (안전한 모바일 RFID 리더를 위한 개방형 임베디드 소프트웨어 플랫폼 구현 방안)

  • Park, Nam-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.785-793
    • /
    • 2010
  • The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The technology for information and privacy protection should be developed in terms of general interconnection among elements and their characteristics of mobile RFID in order to such technology that meets the RFID circumstances. In this paper, transplanting and extending security library for protecting mobile RFID information in secure mobile RFID terminal S/W platform system to support security application on the path of all data from RFID reader to application server.

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection

  • Xu, Yanping;Wu, Chunhua;Zheng, Kangfeng;Niu, Xinxin;Lu, Tianling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4658-4679
    • /
    • 2017
  • Android is now the most popular smartphone platform and remains rapid growth. There are huge number of sensitive privacy information stored in Android devices. Kinds of methods have been proposed to detect Android malicious applications and protect the privacy information. In this work, we focus on extracting the fine-grained features to maximize the information of Android malware detection, and selecting the least joint features to minimize the number of features. Firstly, permissions and APIs, not only from Android permissions and SDK APIs but also from the developer-defined permissions and third-party library APIs, are extracted as features from the decompiled source codes. Secondly, feature selection methods, including information gain (IG), regularization and particle swarm optimization (PSO) algorithms, are used to analyze and utilize the correlation between the features to eliminate the redundant data, reduce the feature dimension and mine the useful joint features. Furthermore, regularization and PSO are integrated to create a new joint feature mining method. Experiment results show that the joint feature mining method can utilize the advantages of regularization and PSO, and ensure good performance and efficiency for Android malware detection.

Internet-Mediated Research in the Age of Social Distancing: Methodological Reflections and Recommendations from Two Online Research Projects (사회적 거리두기 시대의 인터넷 기반 연구: 두 온라인 연구 프로젝트로부터의 방법론적 고찰과 제안점)

  • Lee, Jisue;Hollister, Jonathan M.
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.319-353
    • /
    • 2020
  • Due to the COVID-19 pandemic, scholars at institutions of higher education around the world are transitioning their teaching, service, and research into online settings; for many this may be a new and challenging experience. While many of the best practices associated with research in traditional or face-to-face settings also apply to research in or via online settings, there are some additional challenges and nuances that researchers must adequately address and plan for due to the affordances and limitations of online settings. This paper discusses the key issues of privacy, informed consent, trust and trustworthiness, and retention through the literature and provides practical recommendations based on evidence and experience from two different online research projects. The reflections on and examples from these two research projects contextualize the above issues and act as evidence to inform research as a practice. The authors hope this evidence and practical guidance may help researchers better prepare for research in a socially distanced world.

A Study on Librarians' Perception about Government 3.0 (정부 3.0에 대한 도서관 사서의 인식조사 연구)

  • Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.2
    • /
    • pp.51-80
    • /
    • 2016
  • Recently in accordance with Government 3.0 policy, public data is being released in large quantities and entrepreneurs are succeeding in utilizing this policy to develop products and apps that increase the convenience of the people to use the information. As libraries belong to the public domain, libraries must open a variety of data to the public in accordance with the Government 3.0 policy, and make the various applications utilizing the data. Therefore, this study investigated the government 3.0 Policy, classified the success cases of the applications according to specific criteria, identified data having high availability from the library data, and tried to discover data that can increase the utilization value through the library from other subject areas. An awareness survey was conducted of librarians of the University and Special Library and the results are as follows: First, librarians' awareness about the Government 3.0 was more than the average of 3.6, whereas for the initiatives presented in 3.0. Second, those responding that the government 3.0 policy would have a positive effect on libraries were six times higher than those responding negatively. Third, the respondents listed the ways that the policy can be effectively utilized in the library, in order, as providing to the user public open data classified by topic, providing user education about utilizing method of public open data, and privacy-related user education regarding open data utilization. Fourth, there was overall agreement by the respondents that public open data would be helpful in improving the library's changing role and image, with 60% responding in a positive way.

The Factors which Should be Considered in Real-time Reference Service and the Effective Way of Using it (실시간 참고서비스의 효과적인 활용방안 및 고려요소)

  • Chung Jae-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.3
    • /
    • pp.75-101
    • /
    • 2006
  • This study is about the factors required to be considered in the aspects of policy and operation before introducing the real-time reference service and about the way to use the real-time reference service effectively, The real-time reference service should not be accepted and applied just based on the case of advanced nations without deciding how to apply and use through enough advanced investigation and example analysis. Working out in service policies, selecting appropriate programs. securing service manpower, devising privacy policies, groping the ways of cooperation between libraries, and operating the adequate evaluation system are the factors which should be considered in the policy aspect. Preparation of proper ways of application. operation time, and promotion are the factors which should be considered and reviewed in the operative aspect.

  • PDF

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Analysis of Space Use Patterns of Public Library Users through AI Cameras (AI 카메라를 활용한 공공도서관 이용자의 공간이용행태 분석 연구)

  • Gyuhwan Kim;Do-Heon Jeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.4
    • /
    • pp.333-351
    • /
    • 2023
  • This study investigates user behavior in library spaces through the lens of AI camera analytics. By leveraging the face recognition and tracking capabilities of AI cameras, we accurately identified the gender and age of visitors and meticulously collected video data to track their movements. Our findings revealed that female users slightly outnumbered male users and the dominant age group was individuals in their 30s. User visits peaked between Tuesday to Friday, with the highest footfall recorded between 14:00 and 15:00 pm, while visits decreased over the weekend. Most visitors utilized one or two specific spaces, frequently consulting the information desk for inquiries, checking out/returning items, or using the rest area for relaxation. The library stacks were used approximately twice as much as they were avoided. The most frequented subject areas were Philosophy(100), Religion(200), Social Sciences(300), Science(400), Technology(500), and Literature(800), with Literature(800) and Religion(200) displaying the most intersections with other areas. By categorizing users into five clusters based on space utilization patterns, we discerned varying objectives and subject interests, providing insights for future library service enhancements. Moreover, the study underscores the need to address the associated costs and privacy concerns when considering the broader application of AI camera analytics in library settings.

Analysis of Furniture Planning and Layout Type in Subject Specialization of University Library (대학도서관 주제자료실의 가구계획 및 배치유형 분석)

  • Chang, Ari;Hwang, Yeon-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.2
    • /
    • pp.180-188
    • /
    • 2015
  • University libraries aim to improve not only educational effects but also the general quality of colleges. A primary way of pursuing this goal is through providing professors and students with sufficient amounts of available references and materials that can be used for academic purposes. However, even though university libraries are intended to be used by college students majoring in different fields, they tend to provide mostly books. This limited offering of resources means that they are not distinguishing themselves from regular libraries. The purpose of this study is to present basic data for the spatial design of a subject specialization room in a college library. Included in the design are recommendations for the type and placement of the furniture in the room. The summary of results for this study and the conclusions are as follows: The layout of data space and reading space in a subject specialization room can be categorized into both document-oriented (document centralized and document categorized) and reading-oriented (reading centralized, all, and group types). The public reading seats and private reading seats in a subject specialization room, according to their ratio, can be divided into private reading, public reading, and distributed reading sections. The ratio of open-spaced tables is higher for groups of four or more people, but users often sit separately from others in order to ensure privacy. Unfortunately, this practice results in seating gaps that do not make efficient use of space. The result is that the public reading seats are less efficient than the private reading seats in terms of space. Therefore, it is necessary to increase the number of cubicles.

A Comparative Study on the Codes of Ethics by Professional Associations of Libraries, Archives and Museums in Foreign Countries (도서관, 기록관, 박물관의 윤리강령 비교 연구 - 해외 전문직협회 윤리강령을 중심으로 -)

  • Kim, Jihyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.5-27
    • /
    • 2014
  • This study investigated professional values on which the practices and the perceptions of professions were based, then identified common professional values and different ones. The codes of ethics by professional organizations of libraries, archives, or museums in the U.S., Canada, the U.K. and Australia were selected for the analysis. Predicated on the literature review, common professional values were derived from the existing studies. While conducting the analysis, 13 values were identified and finalized. As a result, it was found that common professional values included access, privacy, stewardship, professional conduct and professional responsibilities to the society. Intellectual freedom in the library area, records as an evidence in the archive area, and research and interpretation in the museum area are those emphasized and unique in each area.