On Strategies of Personal Information Protection in the Personalized Information Service in Big Data Times

Similar documents
Analysis and design on airport safety information management system

Research on Internal Control of Accounting Information System under Network Environment. Qing Xie 1,a

STUDY ON EVALUATION OF INTERNATIONAL SCIENCE AND TECHNOLOGY COOPERATION PROJECT (ISTCP) IN CHINA

The Evaluation Research of Corporate Brand Competitiveness in Web2.0 Environment

Mechanism Study for E-commerce Affecting China's Future Marketing Mode. Zhenzhen Wang

The risks and legal advice of NFC payment Xiaoyu Zou1, a

Research on the Construction of Agricultural Product Virtual Logistics Enterprise

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment

Looking at the Future Development of Internet Finance from the Third party Payment Industry

Research on Comprehensive Evaluation Index System of Software Outsourcing Personnel Training Jingxian Wang

Initial Analysis on the Development of Cloud Logistics Model in China Quan YUAN

Research on e-commerce logistics system informationization in Chain

The Impact of Risk Attitude on the Network Purchasing Decision. Xiaolin Zhu

POSITION DETAILS. Principal Archivist : Primary Collections. UCT Libraries Information Systems and Resources Special Collections

Analysis of Management Fraud in Listed Companies Based on Fraud Triangle Theory. Jing YAO *

Research on the Impact of Big Data on Logistics

Problems and Countermeasures in Construction Quality Management of House Building Engineering

Exploration and Reflection on the Practical Teaching of Advertising Creative Curriculum under the Context of Information Exchange.

Innovative Methods of Strengthening the Construction Quality of Mechanical and Electrical Engineering

Design of fresh food sensory perceptual system for cold chain logistics

Analysis of Multi-Financing Channels of Mediumsized and Small Enterprises

3rd International Conference on Science and Social Research (ICSSR 2014)

PROFESSIONAL ETHICS IN VOLUNTEER ADMINISTRATION

The Impact of Big Data and Cloud Computing on Traditional Accounting Industry. Xiao-ting LI * and Jian XU

Corporate Social Responsibility Best Practice Principles of ASPEED Technology

Food Cold Chain Logistics Based on Internet of Things Technology

Recruitment Privacy Notice

Analysis on Psychology of Contemporary College Students Shopping Online Wei YAO

Current Situation of Highway Daily Maintenance Management in Beijing

Research on the Development of Network Video Advertisement in Micro Video Times

The Application of Agile Management in Software Project

Cloud Services Platform based on Big Data Analytics and its Application in Livestock Management and Marketing

Analysis on the Effective Integration of Information Technology and Personnel Management in Colleges and Universities

Application of Information System in Warehouse Management

G U I D E B O O K TENSORFLOW ON AWS. P R O G R A M : D A T A A N A L Y T I C S D O C U M E N T R D e c e m b e r

The Crown & Cushion Privacy Notice

*Corresponding author. Keywords: Logistics management specialty, Experimental course system, Local colleges and universities in Guangxi.

Study on the Governance Mechanism of Technology Enterprise Based on the Improvement of Independent Innovation Ability

International Conference on Management Science and Management Innovation (MSMI 2015)

The Research of the Project Proprietor s Management Control of Engineering Change

Construction of Supply Chain of Fresh Agricultural Products of CR Vanguard Supermarket Based on Computer Information Platform Zhang Peng, Kang Jian

Analysis of Problems Existing in the Financial Management in Construction Enterprises

BIG DATA TECHNOLOGY IN ESTABLISHMENT AND AMENDMENT OF WATER MANAGEMENT STANDARD

Master's Degree Program in Technical and Scientific Communication (MTSC)

Construction Project Management and its Control Measures

HERMES MICROVISION, INC. Corporate Social Responsibility Best Practice Principles

Research on Construction Projects Cost Management

Analysis on Factors to Cause the Price Change of Building Materials

WeChat The WeChat guide for B2B marketing in China

Financial Performance Evaluation of Grid Enterprises Based on IPA Model -- Taking XX Power Supply Bureau as an Example

Research on the Digital Transformation of China s Traditional Publishing Industry Based on an International Perspective Bao-Ling LI

Cost Management of Mechanical and Electrical Engineering Project Based on Bim Technology

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks

Pegatron Corporation Corporate Social Responsibility Practice Principles

Research on Comparative Analysis of Regional Logistics Information Platform Operation Mode Based on Cloud Computing 1

Contents 5. Building and Maintaining an Effective Team 6. An Overview of Planning and Estimating

Research on the Platform Construction of Road Freight Market in China

Privacy Policy - RevTech Media Pty Ltd ABN Who we are

Study on Promoting Significance of Big Data Analysis for E-commerce Marketing

The 6 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, December 02-03, 2011

Strengthening Public Affairs through Project Financing of the Franchise Contract Foreign Intervention

SOCIAL MEDIA - POLICIES AND PROCEDURES

Dynamic management and cost optimization control of construction project cost

The impact analysis of new auditing standards on audit risk Hu Xiaoqing

How to Secure Your Healthcare Communications in a World of Security and Compliance Threats

ARE YOU SICK OF HEARING OVER QUALIFIED?

Research on Intelligent Logistics Development Model Based on Internet of Things and Cloud Computing in Big Data Age

5 Technology Trends Construction Contractors Can t Afford To Ignore

Research of the Social Media Data Analyzing Platform Based on Cloud Mining Yi-Tang ZENG, Yu-Feng ZHANG, Sheng CAO, Li LI, Cheng-Wei ZHANG *

Key words: E-commerce Service Model, Management Performance, B2C platform, Empirical Study

HOW TO BECOME A PROFITABLE AFFILIATE MARKETER. Expert-made 1 Step by Step Guide

Research on the Social Responsibility of Corporations in China

Analysis on the Logistics Cost Control of Self-Logistics System in the Electric Business Enterprise

The Development Status Quo and Counter measures of Logistics Informationization Standards of China

Study on Patent Strategy of High & New Technology Enterprises Cluster

On Low-Carbon Technology

Personalized Recommendation-based Partner Selection for SDN

Result 14 Definition of new Learning Outcomes

Research on Human Genetic Resources Sharing Mechanism Qi CAO 1,a, Wei ZHAO 2,b,* and Xiang-long WANG 3,c

2018 Supervisor s Guide to Performance Evaluation

Principles of Personal Data Protection

Social media and user-generated content: the key roles of publishers and libraries in the future.

User s Guide WELCOME TO SIGI 3

THE APPLICATION OF INFORMATION TECHNOLOGY IN THE LIBRARY SYSTEM

Laboratory Management Based on Internet of Things. Jianming Huang

Analysis and Evaluation of Chinese Cross-Border Electricity Supplier Logistics

Research on Mixed Ownership Economy Development in Hubei Province

JOB DESCRIPTION. Nadi Head Of ICT As follows

The Research of Environmental Costs Based On Activity Based Cost

The research of intelligent substation project management mode based on RFID

The Problems and Countermeasures of the E-commerce Enterprise Internal Audit Informationization Hu Xiaoqing, Zhang Chengqian

Study on the Construction of Enterprise Quality Culture for Brand Strategy

Design of Crane Safety Monitoring System Based on Big Data Analysis

On the Principles and Target Mode of Overall Planning for the China Public Goods Supply

Function Design of Township Enterprise Online Approval System

Financial Advisors: How to Optimize your LinkedIn Profile

Tourism Informatization Research under the Mode of Internet of Things. Gangzhi Guo

E-Commerce Law of the People s Republic of China (Draft for Comments)

Based on the coal mine's essential safety management system of safety accident cause analysis

Application Research on Monitoring Cloud Platform of Bridge Construction Based on BIM ZHI Peng1, a, SHI Tianyun2, b, WANG Wanqi3, c, WANG Huilin4, d

Transcription:

ITM Web Conferences 47 7, 03002 (2016) On Strategies Personal Information Protection in Personalized Information Service in Big Data Times Li-Ping ZHANG Library Shanghai Dianji University, Shanghai, China 201306 E-mail: zlp660112@163.com Abstract: Obtaining personalized service library must inevitably involve readers personal. In Big Data times, readers personal is ten leaked out, which will directly influence readers satisfaction and trust for personalized service library. This article aims discuss sorts potential security risks by using descriptive method and analytical method, and list effective strategies for defense readers personal. The outcome is that only by working out effective strategies protection can we strengn protection readers personal, and eliminate possible potential safety risks, and ensure smooth development personalized service library. 1. Introduction In Big Data times, library is facing choice tackle Big Data challenge, such as collecting, integrating and researching structural and nonstructural data, which is explicated and implicated in readers havior. Under this situation, in process personalized service library, collecting, handling and sharing readers data will tend opened and exposed outside world and it is obviously increasing that readers privacy threatened and invaded. Thus, protecting readers privacy is an inevitably important project solve in personalized service library in Big Data times. Therefore, only by working out effective strategies for protection can we strengn defense readers personal, eliminate possible potential safety risks, and ensure smooth development personalized service library (PISL). 2. The meaning in PISL personal On meaning personal in PISL, it has not come an agreement. The academia consistently holds that personal should have an important feature: recognition. There exists a certain objectively determined relevance tween recognized and subject, through which subject can recognized directly or indirectly by personal. [1] Therefore, personal can regarded as a summary all direct/ indirect identification individual a natural person. PISL refers individual needs based on specific readers, which is characterized by using a variety technical means track and analyze readers habit havior and interest using, and it is also a kind service that provides readers with specific informative content and systematic functions, such as cusmized service, push service and reference service. In process PISL, maximally meet individual needs, library must collect as much personal readers as possible identify personal characteristics, and infer potential individual demand. PISL includes following personal : active that readers provide directly, aumatic that records readers haviors and interactive in process reference services. The active refers personal data and demand when y apply for PISL, among which lots contents that can directly recognize readers identity and features are involved; aumatic is personalized service system aumatically captures and records all kinds activities personal log files every time y enter website, apply for service and transfer, etc. Such personal can aumatically preserved by server in a long-term and successive way and it is a basis for PISL; interactive refers response-answer when readers get involved in it, and usually it is carried out in forms using virtual chat stware or e-mails put forward question that y want consult and get corresponding answer. Such is usually related field scientific research, and has certain creativity, advancement and potential economic value. The Authors, published by EDP Sciences. This is an open access article distributed under terms Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/).

ITM Web Conferences 47 7, 03002 (2016) 3. The Potential Security Risks Personal Information In Pisl risks include following: (1) readers database directly gets malicious attacks and intrusion, resulting in personal ing illegally read, tampered, downloaded, and spread. (2) Because imperfect network technology, readers personal will illegally downloaded in aumatic transmit system and sharing with or websites.(3) As readers input user s name and password, y are tracked and slen by illegal stware, resulting in leakage readers individual. (4) When cusmers are ready utilize cusmized service functions, readers personal or cusmized may seen by ors cause y do not exit ir personal interface in time, or enter a search term but do not clear it in time. (5) The leak personal may caused by analysis and research from library, such as improper srage, unawareness importance for keeping individual, disclosing personal without any permission. Of 3.1 Security risks personal in Reference Service Reference Service is a kind academic, knowledge-based service that librarian reference puts mutual exchange shared with readers by aid network interactive ols, which can have a discussion on a specific issue, and help readers with answers or solutions problem, or making decisions. The security risks personal also exist in process reference service: (1) in real time reference consulting, virtual chat stware is generally used for text or video communication. If tracking device is artificially installed, n, recorded may exposed third party without readers awareness. Typically, conversational record will reserved in system for a period time. The longer it is kept in system, more dangerous it is. (2) E-mailing reference service involves personal email addresses. If consultant discloses personal e-mail address without permission, it may cause network space readers filled with a large numr spam emails or ft emzzlement. (3) web form reference may have readers chose wher or not disclose personal in network discussing forum. If reader lacks awareness self-protection or improper operation librarian, it may cause reader s personal disclosed public. (4) From contents reference, we can see that in services Selective Dissemination Information (SDI) and Novelty Retrieval Sci Tech, readers research direction and research progress are involved. In order ensure originality, uniqueness and advancement research, readers are reluctant disclose related in advance. If librarian takes discussed in public platform as common problems, it will cause certain damage readers, cause lack protective awareness personal, (5) in reference service, re are some items for fees and it requires readers provide a bank account. If slen, it may cause readers certain economic losses. 3.3 Security risks personal in Information Push Service Information Push Service is informative havior that librarian analyzes readers through personal log stware, such as types resources, access mode, access frequency, access length time that readers regularly visit, selective latest through matching algorithm for readers, and regular taking initiative send readers using a certain push technique and push mode. Most readers individual and interests are involved in personal logs, in which individual in process Information Push Service may exist some security risks: (1) cause use Cookie tech, many varieties that readers input is allowed remained, and sred in a unified way in readers PC hard drive for next recognition reader, including registering, credit card numr, etc. If reader s computer card numr is used by ors, in Cookie may seen by ors. This will cause leakage personal. (2) If server with record personal log files is illegally invaded by third party (such as hackers), readers search habits, research field, demand tendency and or important may deduced after received data. This will put readers individual in risk infringement. (3) Without permission readers, in readers log is processed, transmitted, sred, computed, and reutilized by librarian. 3.2 Potential security risks in personal in Cusmized Information Service Cusmized service is a kind service specific systematic function, in which readers cusmize resource and ir service forms, in accordance with ir wishes and needs. It usually includes ordering readers interface, readers navigation interface, readers retrieval function, system resources, and specific service functions, etc. Among personal, basic personal, service demand and received content cusmized are included. [2] In service process, main security potential 4. Strategy for removing security risks From status quo present literature review, research protection personal has 2

ITM Web Conferences 47 7, 03002 (2016) So, relevant departments should speed up legislative work Library Law, determine rights and obligations for both library and readers in process PISL, restraint, limit or ban use technology with a higher rational standard value judgment, and clearly define scope its application and responsibility. [5] en done separately on a single perspective, such as legal protection, industrial policy, technology innovation etc. Therefore, a systematic ory framework for guidance is needed. The author is attempting set up a scientific system for protection personal, using principles framework, make an overall protection personal and let readers enjoy PISL without fear. 4.1 Legal system as fundamental guarantee 4.2 Industrial guarantee 4.1.1 Establishment right personal 4.2.1 Perfecting rules and regulations, and formulating industrial service guide At present, when we say protection personal, we ten refer equivalence protection right reputation in scope traditional right privacy and personal right. However, due development times, scope personal continues expand, contents continue increase, and forms continue update. Private contents have en unable fully cover privacy personal. The protection personal is not just same privacy protection, which is a passive removal use by ors, but, in most cases, it is a right for an aunomous control and for appropriate communication. In addition, Right Reputation in human right can not reflect full respect for personal control. [3] So, each individual must given right control its own, that is, right personal. The violation right readers personal by library is related lack perfect system and effective implementation industrial guide. Aiming at problem protecting readers personal, library should formulate specific rules and regulations regulate haviors when each department library and librarians deal with readers personal, and clearly define responsibilities and obligations librarians in aspect protecting readers personal, so as eliminate problems invading personal through internal management mechanism when library deals with readers. legislative basic Because imperfect aspects laws, libraries with different systems have ir own rules and regulations. This will make it difficult for readers understand all rules and regulations and details for protection personal in each library. If library really wants protect readers personal in PISL and let readers have a sense security, declaration system personal protection must established. The declaration bulletin board personal protection should placed in a conspicuous place, with clear and detailed contents. The importance protection for personal has en recognized by every country and many have issued special laws for protection personal. At present, more than 50 countries or regions have formulated laws for personal protection.[4] In China, legislation personal protection started late until in 2008 did draft Law Personal Information Protection submit State Council, but when put it in practice has not decided yet. Therefore, China should learn from successful experience foreign relevant legislation, and speed up formulation Law Personal Information Protection so as protect personal effectively from a legal point view. up as a 4.2.2 Declaration and conformation protection statement personal 4.1.2 Speeding up process legislation for laws personal protection 4.1.3 Speeding Library Law self-discipline 4.2.3 Improving quality Librarians Now, many countries over world have regulated occupational moral principles library practitioners, which focus on protection security readers personal. China s Librarians Occupational Moral Maxims issued in 2003 writes that librarians should maintain readers rights and interests and protect readers secrets. In order accomplish this mission, all kinds libraries must take various measures improve quality librarians: First, it should strengn education librarians legal sense and strengn study related legal knowledge; Second, it should strengn construction librarian s pressional ethics, make librarians respect readers personal process A sound legal protection system needs not only a unified Law Personal Information Protection but some relevant laws for specific industries. Obviously, in domain library, Library Law has seriously take hisrical responsibility protect readers personal. 3

ITM Web Conferences 47 7, 03002 (2016) 4.4.2 Developing simple and easy--operate technology for protection personal protection, and make librarians protect personal for readers; Third, it should strengn training librarians for ir security technology, and make librarians have a good master relevant skills for protection personal ; Fourth, regular evaluation takes ability for protecting personal as one evaluation contents for librarians. Fifth, a full-time supervision post should set up for personal safety. This will require that librarians grasp in time new trend threat personal security. It should ten assess potential safety risks PISL system and should improve ability individual protection, using various technical means. Library readers are from all walks life, with different ages, different educational levels. It is obviously o harsh ask every reader skillfully master computer tech and it is also not realistic. So, our country should support and encourage tech industries develop some simple and easy--operate st ware for protection, which may allow readers self-protect ir own personal by using this stware technology. 4.4.3 Different technology projects personal protection for readers 4.3 The self-protection as inner motivation Because every reader has different degrees sensitivity personal, degree selection service protection and degree for ir personalized service are different. Therefore, appropriate protective scheme for personal should well dynamically formulated for each reader. Because no unified policies and regulations for protection is promulgated, P3P platform can used help readers identify policy and regulation items for personal protection let readers make decision aumatically or semi-aumatically wher or not accept m.[8] The national legislation and industrial self-discipline are a public protection device or a system protect readers personal with aid outside forces. The readers own protective consciousness cannot ignored. As what Charles Fried pointed out, protection personal does not seem limited not let ors get our personal, but should extended that we ourselves control use and flow personal.[6] Librarians also put forward certain demands readers on ir quality, which is usually stressed in PISL statement that if cause readers own reasons for leakage personal, resulting in personal loss, library will not ar legal responsibility. This requires that readers must have ability self-protection. The improvement competence readers self-protection can carried out from following three aspects: (1) enhance readers awareness self-protection through education and study relevant laws and regulations; (2) improve self-protection skills, and build up a Trinity---an overall system self-protection, which includes self-control, self-selection, and self-defense;[7] (3) library should take task educate readers ability self-protection, and it will incorporated in readers education content. 5. Conclusion At present, one main causes less quality PISL is that users have ir worries in use PISL, that is, y are not willing fill out in details or truthfully ir personal, and thus it will cause deviation analysis users needs. Therefore, only dramatic protective strategies are worked out can protection readers personal strengned, and can hidden safety risks eliminated, can we have chance ensure smooth development PISL. References 4.4 Safety Technology as main ol 1. 4.4.1 Maintaining environment security internet 2. Network moral loss and temptation economic interests can make some companies or some bad haviorists stall a certain specific network program technologically stalk in library s website in order copy, record readers personal data. Therefore, we must use a variety new and high technology network security measures prevent personal security risks cause loopholes or defect in system. 3. 4. 5. 4 LIU Qing, Yuan-yuan, HUANG. 2007. Effects and Solutions Law Personal Information Protection Information Service Library [J]. Journal Academic Libraries. (3): 86-92. Jing-cheng LI, Chang-ping WENG. 2012. On protection users privacy in personalized service library [J]. Journal Academic Library and Information Science, (3):67-70. Li-ming WANG. 2012. Individual Information Right: an Independent Right [N]. Beijing Daily, July 9, 18. XIE Jun. 2011. Obligations Personal Information Protection and Completion Legislation Library [J]. Library Construction, (8): 1-5. Song-lin JIA. 2010. Comparison and Consideration

ITM Web Conferences 47 7, 03002 (2016) 6. 7. 8. on Privacy Protection Policy Library in China and in Foreign Countries [J]. Library Tribune, (3): 156-158. Shoeman, F. D. 1984. Philosophical Dimensions Privacy: An Anthology [M]. New York: Cambridge University Press. Faison, D. 2000. Privacy in Internet Age [J]. Commercial Law Bulletin, (6): 8-12. LIU Ying. 2007. on Personal Privacy Protection in Personalized Information Service [J]. Information Science, (12): 1794-1798. 5