바로가기메뉴

본문 바로가기 주메뉴 바로가기

logo

디지털도서관서비스기록과 이용자프라이버시에 관한 연구

A Study of Digital Library Service Records and User Privacy

정보관리학회지 / Journal of the Korean Society for Information Management, (P)1013-0799; (E)2586-2073
2012, v.29 no.3, pp.187-214
https://doi.org/10.3743/KOSIM.2012.29.3.187
노영희 (건국대학교)
  • 다운로드 수
  • 조회수

초록

도서관은 시민의 지적자유를 보장하기 위해 설립된 기관이며, 시민은 그들이 요구하고, 접근하고, 이용한 정보가 기밀로 유지될 권리를 갖는다. 그들의 프라이버시 보호는 언론의 자유, 사고의 자유, 집회의 자유를 실현하는데 핵심이 된다. 도서관과 사서가 이용자의 프라이버시 문제를 심각하게 생각해야 하는 이유는 도서관 이용자의 개인정보 보호는 사서가 가장 중요하게 생각해야 하는 임무중의 하나이며, 이용자가 지적자유를 진정으로 누릴 수 있도록 하기 위함이다. 본 연구에서는 도서관에서 발생할 수 있는 프라이버시 침해가능성에 대해서 포괄적으로 조사․분석하고자 하였다. 그 결과 국가나 법률관련기관이 업무를 집행하는 과정에서 발생했던 프라이버시 침해 사례, 대출반납서비스, 참고서비스, 온라인탐색서비스 등 일상적인 도서관서비스를 하는 과정에서 발생했던 프라이버시 침해가능성 및 사례, 그리고 도서관업무를 아웃소싱하는 과정에서 발생할 수 있는 침해 가능성 및 사례 등이 있는 것으로 조사되었다.

keywords
디지털도서관, 도서관이용자, 이용자서비스, 서비스 기록, 프라이버시, 사례연구, digital library, library user, user service, service record, privacy, case study, digital library, library user, user service, service record, privacy, case study

Abstract

Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users’ privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users’ privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies’ enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

keywords
디지털도서관, 도서관이용자, 이용자서비스, 서비스 기록, 프라이버시, 사례연구, digital library, library user, user service, service record, privacy, case study, digital library, library user, user service, service record, privacy, case study

참고문헌

1.

국가인권위원회. (2005). 공공도서관 개인정보 보호실태 조사결과 보고서. 국가인권위원회.

2.

국립중앙도서관. (2005). 국립중앙도서관, 공공도서관의 개인정보보호지침 마련. http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020.

3.

국립중앙도서관. (2012). 개인정보보호지침:국립중앙도서관.

4.

김송수. (2012). 디지털 환경에서 도서관 이용자의 프라이버시 보호에 관한 연구 : 도서 대출 기록을 중심으로.

5.

노영희. (2012). 도서관의 이용자맞춤형서비스와 프라이버시. 한국도서관·정보학회지, 43(3), 353-384.

6.

박상근. (2010). 공공도서관 개인정보보호 정책의 강화 방안 연구.

7.

이명희. (2004). 도서관에서의 지적자유 수호를 위한 노력과 금서에 관한 연구 - 한국과 미국의 경우를 중심으로 -. 한국비블리아학회지, 15(1), 193-216.

8.

정현태. (2000). 우리나라 공공도서관의 지적자유에 대한 사례연구. 한국문헌정보학회지, 34(1), 243-264.

9.

제성호. (2003). 미국의 반테러법과 우리에 대한 시사점. 중앙법학, 5(3), 129-162.

10.

한국도서관협회. (1997). 도서관인윤리선언. Retrieved from디지털도서관서비스기록과 이용자프라이버시에 관한 연구. http://www.kla.kr/jsp/information/library_info.jsp.

11.

AALL. (1999). AALL Ethical Principles. http://www.aallnet.org/about/policy_ethics.asp.

12.

Adams, H. R.. (2005). Privacy in the 21st century: Issues for public, school, and academic libraries:Libraries Unlimited.

13.

Airoldi, J.. Librarian’s brush with FBI shapes her view of the USA Patriot Act.

14.

American Library Association. (1995). American Library Association Code of Ethics, art Ⅲ. http://www.ala.org/ala/oif/statementspols/codeofethics/coehistory/codeofethics.pdf..

15.

American Library Association. (2002). Privacy: An interpretation of the Library Bill of Rights. http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy.

16.

Anonymous. (2002). Expended FBI powers threaten library privacy. American Libraries, 33(7), 19-.

17.

Balas, J.. (2001). How should privacy be protected in the electronic library. Computers in Libraries, 21(6), 53-55.

18.

Bender, K.. Library gala faces privacy protest.

19.

Blitz, M. J.. (2006). Constitutional safeguards for silent experiments in living: Libraries, the right to read, and a first amendment theory for an unaccompanied right to receive information. UMKC L. Rev., 74, 799-.

20.

Boone, T.. (2006). Smart barcodes: Planning for RFID and related privacy issues. AALL Spectrum, 11, 18-.

21.

Bowers, S. L.. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383.

22.

Bowers, S. L.. (2008). Self-service holds : A violation of library patron’s privacy. Public Libraries, 47(4), 54-57.

23.

Breeding, M.. (2006). Technology for the next generation. Computers in Libraries, 26(10), 28-30.

24.

Butters, A.. (2007). RFID systems, standards and privacy within libraries. The Electronic Library, 25(4), 430-439.

25.

Caldwell-Stone, D.. Privacy, libraries, and ALA.

26.

Clarke, R.. (1996). Privacy and dataveillance, and organisational strategy (-). Keynote address to the Conference of the I.S. Audit & Control Association.

27.

DeMarco, D. A.. (2006). Understanding consumer information privacy in the realm of Internet commerce : Personhood and pragmatism, pop-tarts and six-packs. Texas Law Review, 87(11), 1013-1017.

28.

Dettlaff, C.. (2007). Protecting user privacy in the library. Community & Junior College Libraries, 13(4), 7-8.

29.

Enright, K. P.. (2001). Privacy audit checklist. http://cyber.law.harvard.edu/clinical/privacyaudit.html.

30.

Falk, H.. (2004). Privacy in libraries. The Electronic Library, 22(3), 281-284.

31.
32.

Fifarek, A.. (2002). Technology and privacy in the academic library. Online Information Review, 26(6), 366-374.

33.

Fillo, M.. (1999). Privacy concern, printer control clash at library. Hartford Courant, B1. Intellectual Freedom Committee. http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy.

34.

Johnston, S. D.. (2000). Rethinking privacy in the public library. The International Information& Library Review, 32(3), 509-517.

35.

Kennedy, S. D.. (2006). I’ve been violated. Information Today, 17, 20-.

36.

Kinzie, S.. September 7). In online social club, sharing is the point until it goes too far.

37.

Klinefelter, A.. (2007). Privacy and library public services: Or, I know what you read last summer. Legal Reference Services Quarterly, 26(1), 253-279.

38.

Lamb, A.. (2006). Want to be my"friend"? What you need to know about social technologies. Teacher Librarian, 34(1), 55-.

39.

Leiserson, A. B.. (2002). A user’s perspective on privacy and the web. Law Library Journal, 94(3), 539-546.

40.

Levine, C.. (2006). IM: Real-time problems; Traders increasingly are adopting public instant messaging services, but most of these applications open severe security holes:Wall Street & Technology.

41.

Madison Public Library. (2012). Patriot Act and Madison Public Library records. http://www.madisonpubliclibrary.org/policies/usa-patriot-act-and-madison-public-library-records.

42.

McMenemy, D.. (2007). Handbook of ethical practice: A practical guide to dealing with ethical issues in information and library work:Chandos Publishing.

43.

Medical Library Association. (1994). Goals and principles for ethical conduct. http://www.mlanet.org/about/ethics.html.

44.

Pariser, E.. (2011). Beware online “filter bubbles". http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html.

45.

Peralta, E.. Google admits it did not delete data taken from Wi-Fi devices. http://www.npr.org/blogs/thetwo-way/2012/07/27/157494565/google-admits-it-did-notdelete-data-taken-from-wi-fi-devices.

46.

Shils, E.. (1966). Privacy : Its constitution and vicissitudes. Law and Contemporary Problems, 31(2), 281-306.

47.

Shuler, J.. (2004). Privacy and academic libraries : Widening the frame of discussion. Journal of Academic Librarianship, 30(2), 157-159.

48.

Silas, F. A.. (1986). An open book? Library privacy guarded. ABA Journal, 72(3), 21-.

49.

Spitz, M.. (2012). Your phone company is watching. http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html.

50.

Sturges, P.. (2002). Remember the human : The first rule of netiquette, librarians and the internet. Online Information Review, 26(3), 209-16.

51.

Tripathi, S.. (2010). Privacy in libraries : The perspective from India. Library Review, 59(8), 615-623.

52.

Ventura County Library (n.d.). http://www.vencolibrary.org/.

53.

Wallace, M.. (1988). Ethics: Is it time for a code? In managing the law firm library 1988. PIL/PAT, 258, 329-.

54.

Warren, S. D.. (1890). The right to privacy. Harvard Law Review, 4, 193-.

55.

Xiaozhao, D.. (2009). Users' privacy in the Second Life Library (337-340). ITIME '09: IEEE International Symposium on IT in Medicine & Education 2009.

56.

Zimerman, M.. (2009). Technology and privacy erosion in united states libraries: A personal viewpoint. New Library World, 111(1), 7-15.

정보관리학회지