ITM Web Conferences 47 7, 03002 (2016) On Strategies Personal Information Protection in Personalized Information Service in Big Data Times Li-Ping ZHANG Library Shanghai Dianji University, Shanghai, China 201306 E-mail: zlp660112@163.com Abstract: Obtaining personalized service library must inevitably involve readers personal. In Big Data times, readers personal is ten leaked out, which will directly influence readers satisfaction and trust for personalized service library. This article aims discuss sorts potential security risks by using descriptive method and analytical method, and list effective strategies for defense readers personal. The outcome is that only by working out effective strategies protection can we strengn protection readers personal, and eliminate possible potential safety risks, and ensure smooth development personalized service library. 1. Introduction In Big Data times, library is facing choice tackle Big Data challenge, such as collecting, integrating and researching structural and nonstructural data, which is explicated and implicated in readers havior. Under this situation, in process personalized service library, collecting, handling and sharing readers data will tend opened and exposed outside world and it is obviously increasing that readers privacy threatened and invaded. Thus, protecting readers privacy is an inevitably important project solve in personalized service library in Big Data times. Therefore, only by working out effective strategies for protection can we strengn defense readers personal, eliminate possible potential safety risks, and ensure smooth development personalized service library (PISL). 2. The meaning in PISL personal On meaning personal in PISL, it has not come an agreement. The academia consistently holds that personal should have an important feature: recognition. There exists a certain objectively determined relevance tween recognized and subject, through which subject can recognized directly or indirectly by personal. [1] Therefore, personal can regarded as a summary all direct/ indirect identification individual a natural person. PISL refers individual needs based on specific readers, which is characterized by using a variety technical means track and analyze readers habit havior and interest using, and it is also a kind service that provides readers with specific informative content and systematic functions, such as cusmized service, push service and reference service. In process PISL, maximally meet individual needs, library must collect as much personal readers as possible identify personal characteristics, and infer potential individual demand. PISL includes following personal : active that readers provide directly, aumatic that records readers haviors and interactive in process reference services. The active refers personal data and demand when y apply for PISL, among which lots contents that can directly recognize readers identity and features are involved; aumatic is personalized service system aumatically captures and records all kinds activities personal log files every time y enter website, apply for service and transfer, etc. Such personal can aumatically preserved by server in a long-term and successive way and it is a basis for PISL; interactive refers response-answer when readers get involved in it, and usually it is carried out in forms using virtual chat stware or e-mails put forward question that y want consult and get corresponding answer. Such is usually related field scientific research, and has certain creativity, advancement and potential economic value. The Authors, published by EDP Sciences. This is an open access article distributed under terms Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/).
ITM Web Conferences 47 7, 03002 (2016) 3. The Potential Security Risks Personal Information In Pisl risks include following: (1) readers database directly gets malicious attacks and intrusion, resulting in personal ing illegally read, tampered, downloaded, and spread. (2) Because imperfect network technology, readers personal will illegally downloaded in aumatic transmit system and sharing with or websites.(3) As readers input user s name and password, y are tracked and slen by illegal stware, resulting in leakage readers individual. (4) When cusmers are ready utilize cusmized service functions, readers personal or cusmized may seen by ors cause y do not exit ir personal interface in time, or enter a search term but do not clear it in time. (5) The leak personal may caused by analysis and research from library, such as improper srage, unawareness importance for keeping individual, disclosing personal without any permission. Of 3.1 Security risks personal in Reference Service Reference Service is a kind academic, knowledge-based service that librarian reference puts mutual exchange shared with readers by aid network interactive ols, which can have a discussion on a specific issue, and help readers with answers or solutions problem, or making decisions. The security risks personal also exist in process reference service: (1) in real time reference consulting, virtual chat stware is generally used for text or video communication. If tracking device is artificially installed, n, recorded may exposed third party without readers awareness. Typically, conversational record will reserved in system for a period time. The longer it is kept in system, more dangerous it is. (2) E-mailing reference service involves personal email addresses. If consultant discloses personal e-mail address without permission, it may cause network space readers filled with a large numr spam emails or ft emzzlement. (3) web form reference may have readers chose wher or not disclose personal in network discussing forum. If reader lacks awareness self-protection or improper operation librarian, it may cause reader s personal disclosed public. (4) From contents reference, we can see that in services Selective Dissemination Information (SDI) and Novelty Retrieval Sci Tech, readers research direction and research progress are involved. In order ensure originality, uniqueness and advancement research, readers are reluctant disclose related in advance. If librarian takes discussed in public platform as common problems, it will cause certain damage readers, cause lack protective awareness personal, (5) in reference service, re are some items for fees and it requires readers provide a bank account. If slen, it may cause readers certain economic losses. 3.3 Security risks personal in Information Push Service Information Push Service is informative havior that librarian analyzes readers through personal log stware, such as types resources, access mode, access frequency, access length time that readers regularly visit, selective latest through matching algorithm for readers, and regular taking initiative send readers using a certain push technique and push mode. Most readers individual and interests are involved in personal logs, in which individual in process Information Push Service may exist some security risks: (1) cause use Cookie tech, many varieties that readers input is allowed remained, and sred in a unified way in readers PC hard drive for next recognition reader, including registering, credit card numr, etc. If reader s computer card numr is used by ors, in Cookie may seen by ors. This will cause leakage personal. (2) If server with record personal log files is illegally invaded by third party (such as hackers), readers search habits, research field, demand tendency and or important may deduced after received data. This will put readers individual in risk infringement. (3) Without permission readers, in readers log is processed, transmitted, sred, computed, and reutilized by librarian. 3.2 Potential security risks in personal in Cusmized Information Service Cusmized service is a kind service specific systematic function, in which readers cusmize resource and ir service forms, in accordance with ir wishes and needs. It usually includes ordering readers interface, readers navigation interface, readers retrieval function, system resources, and specific service functions, etc. Among personal, basic personal, service demand and received content cusmized are included. [2] In service process, main security potential 4. Strategy for removing security risks From status quo present literature review, research protection personal has 2
ITM Web Conferences 47 7, 03002 (2016) So, relevant departments should speed up legislative work Library Law, determine rights and obligations for both library and readers in process PISL, restraint, limit or ban use technology with a higher rational standard value judgment, and clearly define scope its application and responsibility. [5] en done separately on a single perspective, such as legal protection, industrial policy, technology innovation etc. Therefore, a systematic ory framework for guidance is needed. The author is attempting set up a scientific system for protection personal, using principles framework, make an overall protection personal and let readers enjoy PISL without fear. 4.1 Legal system as fundamental guarantee 4.2 Industrial guarantee 4.1.1 Establishment right personal 4.2.1 Perfecting rules and regulations, and formulating industrial service guide At present, when we say protection personal, we ten refer equivalence protection right reputation in scope traditional right privacy and personal right. However, due development times, scope personal continues expand, contents continue increase, and forms continue update. Private contents have en unable fully cover privacy personal. The protection personal is not just same privacy protection, which is a passive removal use by ors, but, in most cases, it is a right for an aunomous control and for appropriate communication. In addition, Right Reputation in human right can not reflect full respect for personal control. [3] So, each individual must given right control its own, that is, right personal. The violation right readers personal by library is related lack perfect system and effective implementation industrial guide. Aiming at problem protecting readers personal, library should formulate specific rules and regulations regulate haviors when each department library and librarians deal with readers personal, and clearly define responsibilities and obligations librarians in aspect protecting readers personal, so as eliminate problems invading personal through internal management mechanism when library deals with readers. legislative basic Because imperfect aspects laws, libraries with different systems have ir own rules and regulations. This will make it difficult for readers understand all rules and regulations and details for protection personal in each library. If library really wants protect readers personal in PISL and let readers have a sense security, declaration system personal protection must established. The declaration bulletin board personal protection should placed in a conspicuous place, with clear and detailed contents. The importance protection for personal has en recognized by every country and many have issued special laws for protection personal. At present, more than 50 countries or regions have formulated laws for personal protection.[4] In China, legislation personal protection started late until in 2008 did draft Law Personal Information Protection submit State Council, but when put it in practice has not decided yet. Therefore, China should learn from successful experience foreign relevant legislation, and speed up formulation Law Personal Information Protection so as protect personal effectively from a legal point view. up as a 4.2.2 Declaration and conformation protection statement personal 4.1.2 Speeding up process legislation for laws personal protection 4.1.3 Speeding Library Law self-discipline 4.2.3 Improving quality Librarians Now, many countries over world have regulated occupational moral principles library practitioners, which focus on protection security readers personal. China s Librarians Occupational Moral Maxims issued in 2003 writes that librarians should maintain readers rights and interests and protect readers secrets. In order accomplish this mission, all kinds libraries must take various measures improve quality librarians: First, it should strengn education librarians legal sense and strengn study related legal knowledge; Second, it should strengn construction librarian s pressional ethics, make librarians respect readers personal process A sound legal protection system needs not only a unified Law Personal Information Protection but some relevant laws for specific industries. Obviously, in domain library, Library Law has seriously take hisrical responsibility protect readers personal. 3
ITM Web Conferences 47 7, 03002 (2016) 4.4.2 Developing simple and easy--operate technology for protection personal protection, and make librarians protect personal for readers; Third, it should strengn training librarians for ir security technology, and make librarians have a good master relevant skills for protection personal ; Fourth, regular evaluation takes ability for protecting personal as one evaluation contents for librarians. Fifth, a full-time supervision post should set up for personal safety. This will require that librarians grasp in time new trend threat personal security. It should ten assess potential safety risks PISL system and should improve ability individual protection, using various technical means. Library readers are from all walks life, with different ages, different educational levels. It is obviously o harsh ask every reader skillfully master computer tech and it is also not realistic. So, our country should support and encourage tech industries develop some simple and easy--operate st ware for protection, which may allow readers self-protect ir own personal by using this stware technology. 4.4.3 Different technology projects personal protection for readers 4.3 The self-protection as inner motivation Because every reader has different degrees sensitivity personal, degree selection service protection and degree for ir personalized service are different. Therefore, appropriate protective scheme for personal should well dynamically formulated for each reader. Because no unified policies and regulations for protection is promulgated, P3P platform can used help readers identify policy and regulation items for personal protection let readers make decision aumatically or semi-aumatically wher or not accept m.[8] The national legislation and industrial self-discipline are a public protection device or a system protect readers personal with aid outside forces. The readers own protective consciousness cannot ignored. As what Charles Fried pointed out, protection personal does not seem limited not let ors get our personal, but should extended that we ourselves control use and flow personal.[6] Librarians also put forward certain demands readers on ir quality, which is usually stressed in PISL statement that if cause readers own reasons for leakage personal, resulting in personal loss, library will not ar legal responsibility. This requires that readers must have ability self-protection. The improvement competence readers self-protection can carried out from following three aspects: (1) enhance readers awareness self-protection through education and study relevant laws and regulations; (2) improve self-protection skills, and build up a Trinity---an overall system self-protection, which includes self-control, self-selection, and self-defense;[7] (3) library should take task educate readers ability self-protection, and it will incorporated in readers education content. 5. Conclusion At present, one main causes less quality PISL is that users have ir worries in use PISL, that is, y are not willing fill out in details or truthfully ir personal, and thus it will cause deviation analysis users needs. Therefore, only dramatic protective strategies are worked out can protection readers personal strengned, and can hidden safety risks eliminated, can we have chance ensure smooth development PISL. References 4.4 Safety Technology as main ol 1. 4.4.1 Maintaining environment security internet 2. Network moral loss and temptation economic interests can make some companies or some bad haviorists stall a certain specific network program technologically stalk in library s website in order copy, record readers personal data. Therefore, we must use a variety new and high technology network security measures prevent personal security risks cause loopholes or defect in system. 3. 4. 5. 4 LIU Qing, Yuan-yuan, HUANG. 2007. Effects and Solutions Law Personal Information Protection Information Service Library [J]. Journal Academic Libraries. (3): 86-92. Jing-cheng LI, Chang-ping WENG. 2012. On protection users privacy in personalized service library [J]. Journal Academic Library and Information Science, (3):67-70. Li-ming WANG. 2012. Individual Information Right: an Independent Right [N]. Beijing Daily, July 9, 18. XIE Jun. 2011. Obligations Personal Information Protection and Completion Legislation Library [J]. Library Construction, (8): 1-5. Song-lin JIA. 2010. Comparison and Consideration
ITM Web Conferences 47 7, 03002 (2016) 6. 7. 8. on Privacy Protection Policy Library in China and in Foreign Countries [J]. Library Tribune, (3): 156-158. Shoeman, F. D. 1984. Philosophical Dimensions Privacy: An Anthology [M]. New York: Cambridge University Press. Faison, D. 2000. Privacy in Internet Age [J]. Commercial Law Bulletin, (6): 8-12. LIU Ying. 2007. on Personal Privacy Protection in Personalized Information Service [J]. Information Science, (12): 1794-1798. 5