DOI QR코드

DOI QR Code

A Study of Public Library Patrons' Understanding of Library Records and Data Privacy

  • Received : 2014.04.08
  • Accepted : 2014.06.01
  • Published : 2014.06.30

Abstract

As instances of private information leak increase, taking steps to protect such information becomes a necessity. In this study of public library patrons, we strove for a comprehensive understanding of library usage records to suggest viable solutions for private information safety in public libraries. To this end, we investigated the patrons' understanding of library usage records and determined the relationship between different user characteristics and privacy knowledge or leaks. The results show that a high number of patrons perceived these records as their own private information, but that there was no necessity for legal procedures or consent for the use of these records. Also, even though the understanding of these usage records showed that there was a relationship between the frequency of library visits and leaks of personal information, the correlation was not particularly strong.

Keywords

References

  1. Balas, J. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55.
  2. Bower, S. L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383. https://doi.org/10.1016/j.acalib.2006.03.005
  3. Bower, S. L. (2008). Self-service holds: A violation of library patron's privacy. Public Libraries, 47(4), 54-57.
  4. Breedingm M. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30.
  5. Butters, A. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439. https://doi.org/10.1108/02640470710779844
  6. Caldwell-Stone, D. (2008). Privacy, libraries, and ALA American Libraries, September, 58.
  7. Clarke, R. (1996). Privacy and dataveillance, and organisational strategy. Keynote address to the Conference of the I.S. Audit & Control Association. Perth, Western Australia.
  8. DeMarco, D. A. (2006). Understanding consumer information privacy in the realm of Internet cinnerce: Personhood and pragmatism, pop tarts and six packs. Texas Law Review, 87(11), 1013-1017.
  9. Enright, K. P. (2001). Privacy audit checklist. Retrieved from http://cyber.law.harvard.edu/clinical/priva cyaudit.html
  10. Falk, Howard. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284. https://doi.org/10.1108/02640470410541697
  11. Fifarek, A. (2002). Technology and privacy in the academic library. Online Information Review, 26(6). 366-374. https://doi.org/10.1108/14684520210452691
  12. Johnston, S. D. (2000). Rethinking privacy in the public library. The International Information & Library Review, 32(3-4), 509-517. https://doi.org/10.1006/iilr.2000.0150
  13. Joung, Hyun-Tae. (2000). A study on the intellectual freedom in Korean public libraries. Journal of the Korean Society for Library and Information Science, 34(1), 243-264.
  14. Kang Sun Hui. (2003). Saseo mit jeongbo service jikui yunli uisik-e gwanhan yeongu. Library with People, 4(4), 53-55.
  15. Kennedy, S. D. (2006). I've been violated. Information Today. 17. 20.
  16. Kim, Gi-Mun. (2003). Miguk-ui aegukbeobgwa doseogwan iyoungjaui privacy. Library with People, 4(4), 60-71.
  17. Kim, Hae-Kyoung, & Nam, Tae-Woo. (2004). A new model for codes of ethics for librarians of South Korea. Journal of the Korean Society for Information Management, 21(4), 329-352. https://doi.org/10.3743/KOSIM.2004.21.4.329
  18. Kim, Hye-Sun. (1994). A Study on Ethics in Librarianship. M.A. thesis, Ewha Womans University.
  19. Kim, Ki-Seong. (2006). A Study on the Privacy of University Libraries. M.A. thesis, Chungnam University.
  20. Kim, Song-soo. (2012). A study on library user privacy protection in the digital environment: Focused on record of checked out books. Hanyang University, Graduate School of Public Policy.
  21. Klinefelter, A. (2007). Privacy and library public services: Or, I know what you read last summer. Legal Reference Serivces Quarterly, 26(1-2), 253-279. https://doi.org/10.1300/J113v26n01_13
  22. Lee, Mi-Hwa. (2006). A study on user perceptions about privacy and library records. The Journal of the Korean Private University Library Association, 7, 225-240.
  23. Lee, Myeong-Hee. (2004). Libraries' efforts to preserve intellectual freedom and banned book. Journal of the Korean Biblia Society for library and Information Science, 15(1), 193-216.
  24. Leiserson, A. B. (2002). A user's perspective on privacy and the web. Law Library Journal, 94(3), 539-546.
  25. Levine, C. (2006). IM: Real-time problems: Traders increasingly are adopting public instant messaging services, but most of these applications open severe security goles. Wall Street & Technology.
  26. Noh, Younghee. (2012a). A Study on Developing and Proposing the Library Privay Policy. Journal of Korean Library and Information Science Society, 46(4), 207-242. https://doi.org/10.4275/KSLIS.2012.46.4.207
  27. Noh, Younghee. (2012b). A study of personalized user services and privay in the library. Journal of Korean Library and Information Science Society, 43(3), 357-398.
  28. Noh, Younghee. (2012c). A study of digital library service records and user privacy. Journal of the Korean Society for Information Management, 29(3), 187-214. https://doi.org/10.3743/KOSIM.2012.29.3.187
  29. Noh, Younghee. (2013). A study on librariands perception of library user privacy. Journal of Korean Library and Information Science Society, 47(3), 73-96. https://doi.org/10.4275/KSLIS.2013.47.3.073
  30. Noh, Younghee. (2013). Digital Library User privacy: Changing Librarian View points through Education. in progress.
  31. OECD. (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data [online] Retrieved 2013.08.23.
  32. Park, Sang-Keun. (2010). A study on the plans for the reinforcement of the personal information protection policy in public libraries. Graduate School of Kyonggi University, Department of Library and Information Science.
  33. Shuler, J. (2004). Privacy and academic libraries: Widening the frame of discussion. Journal of Academic Librarianship, 30(2), 157-159. https://doi.org/10.1016/j.acalib.2004.01.008
  34. Sturges, P. (2002). Remember the human: The first rule of netquette, librarians and the internet. Online Information Review, 26(3), 209-16. https://doi.org/10.1108/14684520210432486
  35. The National Library of Korea. (2012). Guidelines for personal information protection. Seoul: The National Library of Korea.
  36. Tripathi, Sneha, & Tripathi, Aditya. (2010). Privacy in libraries: The Perspective from India. Library Review, 59(8), 615-623. https://doi.org/10.1108/00242531011073146
  37. Wallace, M. (1988). Ethics: Is it time for a code? In managing the law firm library 1988. 258 PIL/ PAT 329(Sept. 1, 1988).
  38. Wareen, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review. 4, 193. https://doi.org/10.2307/1321160
  39. Zimerman, M. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1/2), 7-15.

Cited by

  1. A Study on the Investigation of the Awareness for the Privacy of the Users at the School Libraries vol.26, pp.4, 2015, https://doi.org/10.14699/kbiblia.2015.26.4.031
  2. A Study on the Analysis and Current State of the Records Disposition Schedule in College of Education: Focused on J College of Education vol.27, pp.1, 2016, https://doi.org/10.14699/kbiblia.2016.27.1.187
  3. A Study on the Change of Perception and Culture Diversity Education Program in Public Library vol.27, pp.3, 2016, https://doi.org/10.14699/kbiblia.2016.27.3.201
  4. A Study on Applying the Sharing Economy to Libraries vol.27, pp.3, 2016, https://doi.org/10.14699/kbiblia.2016.27.3.075
  5. Data Protection in UK Library and Information Services: Are We Ready for GDPR? vol.18, pp.01, 2018, https://doi.org/10.1017/S1472669618000063