바로가기메뉴

본문 바로가기 주메뉴 바로가기

ACOMS+ 및 학술지 리포지터리 설명회

  • 한국과학기술정보연구원(KISTI) 서울분원 대회의실(별관 3층)
  • 2024년 07월 03일(수) 13:30
 

logo

  • P-ISSN2466-2542
  • KCI

도서관의 이용자맞춤형서비스와 프라이버시

A Study of Personalized User Services and Privacy in the Library

한국도서관·정보학회지 / Journal of Korean Library and Information Science Society, (P)2466-2542;
2012, v.43 no.3, pp.353-384
https://doi.org/10.16981/kliss.43.3.201209.353
노영희 (건국대학교)

초록

본 연구는 최근에 이슈가 되고 있는 필터버블 문제와 프라이버시 침해 문제가 이용자맞춤형서비스를 제공하는 도서관과 무관하지 않다는 인식에서 수행되었다. 본 연구에서는 최첨단기술을 활용하는 위치기반서비스, 상황인식서비스, 책추천서비스, RFID기반서비스, 클라우드서비스가 어떤 측면에서 개인정보침해 및 프라이버시 침해가능성이 있는지를 고찰하였다. 또한 특정 서비스 이용을 위해 개인정보를 제공한 이용자는 개인정보를 포기한 것으로 보아야 하는지, 국내 도서관에서 도서관 이용자의 프라이버시 문제가 논의된 적이 있는지, 필터버블 문제가 도서관 이용자에게 줄 수 있는 위험성과 해결책은 무엇인지에 대해서도 간단히 논의하였다. 본 연구는 도서관 프라이버시에 대한 초기단계의 연구로서 향후 국내 프라이버시 연구의 기초자료로 활용될 수 있기를 바란다.

keywords
Personalized user services, Personal information, Privacy in the library, Filter bubble, 이용자맞춤형서비스, 개인정보, 도서관 프라이버시, 필터버블

Abstract

This study was conducted on the observation that the filter bubble and privacy violation problems are related to the personalized services provided by libraries. This study discussed whether there is the possibility for invasion of privacy when libraries provide services utilizing state-of-the-art technology, such as location-based services, context aware services, RFID-based services, Cloud Services, and book recommendation services. In addition, this study discussed the following three aspects: whether or not users give up their right to privacy when they provide personal information for online services, whether or not there are discussions about users' privacy in domestic libraries, and what kind of risks the filter bubble problem can cause library users and what are possible solutions. This study represents early-stage research on library privacy in Korea, and can be used as basic data for privacy research.

keywords
Personalized user services, Personal information, Privacy in the library, Filter bubble, 이용자맞춤형서비스, 개인정보, 도서관 프라이버시, 필터버블

참고문헌

1.

국가인권위원회. 공공도서관 개인정보 보호실태 조사결과 보고서. 서울: 국가인권위원회, 2005.

2.

국립중앙도서관. “국립중앙도서관, 공공도서관의 개인정보보호지침 마련,” 2005.<http://www.mcst.go.kr/web/notifyCourt/press/mctPressView.jsp?pSeq=7020> [cited2012. 7. 29].

3.

김동민, 천지영, 노건태, 정익래. “다자간 환경에서 사용자 탈퇴가 가능한 프라이버시 보호 키워드검색 기법.” 정보보호학회논문지, 제21권, 제1호(2011), pp.3-14.

4.

김보선, 홍의경. “교무업무시스템에서의 개인정보보호를 위한 역할기반 접근제어 확장.” 정보과학회논문지, 제14권, 제2호(2008), pp.171-179.

5.

남기효. “웹 프라이버시 필터링 및 스캐닝 제품 분석.” 주간기술동향, 제1284호(2009), pp.13-20.

6.

노건태, 천지영, 정의래, 이동훈. “프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법.” 정보보호학회논문지, 제19권, 제5호(2009), pp.35-43.

7.

노영희. “디지털도서관서비스기록과 이용자프라이버시에 관한 연구.” 정보관리학회지, 제29권, 제3호(2012), pp.1-23.

8.

안지민, 김한일. “개인화 서비스를 제공하는 웹사이트에서 유사 사용자 정보에 대한 접근제어 모듈설계.” 2008년 한국멀티미디어학회 추계학술발표대회논문집, 2008, pp.535-538.

9.

이연님, 권오병. “상황인식서비스를 위한 모델 기반이 프라이버스 염려 예측.” 지능정보연구, 제15권, 제2호(2009), pp.97-111.

10.

이정미. “상황인식 컴퓨팅의 개념과 도서관 정보서비스에의 적용.” 한국비블리이학회지, 제23권, 제1호(2012), pp.179-194.

11.

이준기, 최희재, 최선아. “서비스의 유용성과 프라이버시 염려도가 개인화 된 서비스 수용성에 미치는 영향에 관한 연구.” 한국전자거래학회지, 제12권, 제4호(2007), pp. 37-51.

12.

정강수, 박석. “많은 사용자가 위치기반 서비스를 사용하는 환경에서 개인화된 프라이버시 보호 기법”, 한국정보과학회 2011가을 학술발표논문집, 제38권, 제2호(2011), pp.1-4.

13.

정종섭. 헌법학원론. 서울: 박영사, 2008.

14.

한국정보보호진흥원. 구글 검색DB 주민번호 노출점검 SW 개발 최종보고서. 경기: 동진흥원, 2006.

15.

허순철. “인터넷 검색과 개인정보자기결정권.” 공법학연구, 제10권, 제2호(2009), pp.157-186.

16.

Adams, Helen R. Robert F. Bocher, Carol A. Gordon, & Elizabeth Barry-Kessler. Privacy in the21st Century: Issues for Public, School, and Academic Libraries. Westport: LibrariesUnlimited, 2005.

17.

Allen, Cliff, Deborah Kania, and Beth Yaeckel. Internet World Guide to One-to-One Marketing. New York: Wiley Computer Publishing, 1998.

18.

ALA. Privacy Resources for Librarians, Library Users, and Families, 2012.<http://www.ala.org/offices/oif/ifissues/issuesrelatedlinks/privacyresources> [cited 2012. 8. 1].

19.

Angwin, Julia and Tom Mcginty. Sites Feed Personal Details To New Tracking Industry, 2010.<http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html>[cited 2012. 6. 10].

20.

Awad, N. F. and M. S. Krishnan. “The personalization privacy paradox : an empirical Evaluation of information transparency and the Willingness to be profiled online for Personalization.” MIS Quarterly, Vol. 30, No. 1(2006), pp.13-28.

21.

Brunk, B. “Exoinformation & Interface Design. Bulletin of the American Society for Information Science and Technology." Vol.27, No.1(2001).<http://www.asis.org/Bulletin/Aug-01/brunk.html> [cited 2012. 6. 12].

22.

Dinev, T. and P. Hart. “An Extended Privacy Calculus Model for E-Commerce Transactions.” Information Systems Research, Vol.17, No.1(2006), pp.61-80.

23.

Falk, Howard. “Privacy in libraries.” The Electronic Library, Vol.22, No.3(2004), pp. 281-284.

24.

Gardner, Carrie. “FACT or FICTION: PRIVACY IN AMERICAN LIBRARIES.” presented at CFP 2002, the 12th Conference on Computers Freedom & Privacy. <http://www.cfp2002.org/proceedings/proceedings/gardner.pdf> [cited 2012. 7. 23].

25.

Gavison, R. “Privacy and the limits of law." Yale Law Journal, No.89(1980), pp.421-471.

26.

Green, Holly. Breaking Out of Your Internet Filter Bubble, 2011.<http://www.forbes.com/sites/work-in-progress/2011/08/29/breaking-out-of-your-internet-filter-bubble/> [cited 2012. 7. 23].

27.

Hansell, Saul. Increasingly, Internet's Data Trail Leads to Court, 2006.<http://www.nytimes.com/2006/02/04/technology/04privacy.html?pagewanted=all>[cited 2012. 7. 23].

28.

Hartmann, M. Context-Aware Intelligent User Interface for Supporting System Use. Doctoral Dissertation. Germany: Technology University Darmstadt, 2010.

29.

Henn, Steven. How His Life Was Hacked In The Cloud, 2012. [cited 8 August 2012], available from .

30.

Kantor, Andrew. 2006. “Google Trends.” <http://www.npr.org/blogs/alltechconsidered/2012/08/07/158365355/how-his-life-was-hacked-in-the-cloud> [cited 2012. 7. 23].

31.

Klinefelter, Anne. “Privacy and Library Public Services: Or, I Know What You Read Last Summer.” Legal Reference Services Quarterly, Vol.26, No.1-2(2007), pp. 253-279.

32.

Leslie, Scism and Mark Maremont. Insurers Test Data Profiles to Identify Risky Clients, 2010.<http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html>[cited 2012. 6. 25].

33.

Levy, Steven. Has Google Popped the Filter Bubble?, 2012.<http://www.wired.com/business/2012/01/google-filter-bubble/> [cited 2012. 7. 23].

34.

Luhn, H. P. “A Business Intelligence System.” IBM Journal of R&D, No.2(1958), pp.314-319.

35.

Madison Public Library. Confidentiality of Library Records, 2004.<http://www.madisonpubliclibrary.org/policies/confidentiality-library-records> [Cited 2012.7. 29].

36.

Madison Public Library. USA Patriot Act and Madison Public Library Records, 2012.<http://www.madisonpubliclibrary.org/policies/usa-patriot-act-and-madison-public-library-records> [Cited 2012. 7. 29].

37.

Pariser, Eli. 10 Ways to Pop Your Filter Bubble, 2011. [Cited 2011. 7. 16].<http://www.thefilterbubble.com/10-things-you-can-do>.

38.

Pariser, Eli. Beware online “filter bubbles", 2011. <http://www.ted.com/talks/eli_pariser_ beware_online_filter_bubbles.html> [Cited 2012. 4. 10].

39.

Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. New York: The Penguin Press, 2011.

40.

Park, Soo-jin, and Myeong Hee Lee. 2008. "Awareness of the Privacy Concepts in Knowledge Management in Scholarly Publications from 2000 to 2004." Journal of the Korean Society for Information Management, Vol.25, No.2(2008), pp.99-114.

41.

Phelps, J., D. Souza, and G. Nowak. “Antecedents and consequences of consumer privacy concern s:An empirical investigation.” Journal of Interactive Marketing, Vol.15, No.4(2001), pp.2-17.

42.

Piterson, W., Wolfgang Ebbers and Jan van Dijk, “Personalization in the public sector An inventory of organizational and user obstacles towards personalization of electronic services in the public sector.” Government Information Quarterly, Vol. 24(2007), pp.148-164.

43.

Shuler, John. “Privacy and Academic Libraries: Widening the Frame of Discussion.” Journal of Academic Librarianship. Vol.30, No.2(2004), pp.157-159.

44.

Slyke, V., J. T. Shim, R. Johnson, and J. Jiang. “Concern for Information Privacy and Online Consumer Purchasing”, Journal of the Association for Information Systems, Vol.7, No.6(2006), pp.415-444.

45.

Spitz, Malte. Your phone company is watching, 2012. <http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html> [cited 2012. 7. 23].

46.

Stewart, K. A. and A. H. Segars. “An Empirical Examination of the Concern for Information Privacy Instrument.” Information Systems Research, Vol.13, No.1(2002), pp.36-49.

47.

Timmer, J. New algorithm guesses SSNs using date and place of birth, 2009.<http://arstechnica.com/tech-policy/news/2009/07/social-insecurity-numbers-open-to-hacking.ars> [Cited 2012. 4. 10].

48.

Warren, S. and L. Brandeis. “The right to privacy." Harvard Law Review, No.4(1890), pp.193-220.

49.

Weiser, M. “Some computer science issues in ubiquitous computing." Communications of the ACM, Vol.36, No.7(2003), pp.75-84.

50.

공공기관의 개인정보보호에 관한 법률.<http://www.law.go.kr/LSW/LsInfoP.do?lsiSeq=84173#0000>.

51.

국립중앙도서관 개인정보보호정책. <http://book.nl.go.kr/iplls/Privacy.do>.

52.

국립중앙도서관 개인정보처리방침. <http://www.nl.go.kr/nl/c6/page1_1.jsp>.

53.

국립중앙도서관 공공도서관의 개인정보보호. <http://www.nl.go.kr/nl/notice/notice_view.jsp? board_no=4043&notice_type_code=1>.

54.

네이버 개인정보취급방침. <http://www.naver.com/rules/privacy.html>.

55.

인권위원회 공공도서관 cctv 인권침해 논란.<http://www.ohmynews.com/NWS_Web/view/at_pg.aspx?cntn_cd=A0000246489>.

56.

CNN.com. 2001. “Is your PC watching you? Find out!”<http://archives.cnn.com/2001/TECH/ptech/11/07/snoopware.idg/index.html>.

57.

DuckDuckGo. <https://duckduckgo.com/privacy.html>.

58.

Electronic Privacy Information Center. “Investigations of Google Street View.”<http://epic.org/privacy/streetview/>.

59.

EPIC Online Guide to Practical Privacy Tools. <http://epic.org/privacy/tools.html>.

60.

Filter bubbles, meet Upworthy. <http://www.thefilterbubble.com/>.

61.

Google Corporate Information, Technology Overview. <http://www.google.com/corporate>.

62.

Jimmy Carter Library Web Site Privacy Statement. 2004.<http://www.jimmycarterlibrary.gov/privacy.phtml>.

63.

Minnesota Government Data Practices 13.40, Library and historical data. 2011.<https://www.revisor.mn.gov/statutes/?id=13.40>.

64.

MLA. Intellectual Freedom Committee.<http://mnlibraryassociation.org/committees-subunits/intellectual-freedom-committee/>.

65.

Privacy International. <http://www.privacy.org/pi>.

66.

Privacy Rights Clearinghouse. 2012. “Fact Sheet 18: Online Privacy: Using the Internet Safely.”<https://www.privacyrights.org/fs/fs18-cyb.htm>.

67.

Start Page. 2012. <https://startpage.com/uk/?>.

68.

The Association for Computing Machinery (ACM). <http://www.acm.org/usacm/privacy>.

69.

The Electronic Frontier Foundation. <http://www.eff.org>.

70.

The Electronic Privacy Information Center. <http://www.epic.org>.

71.

The Privacy Page. <http://www.privacy.org>.

72.

The Seattle Public Library Website: Privacy Notice. 2012.<http://www.spl.org/privacy/the-seattle-public-library-website-privacy-notice>.

한국도서관·정보학회지