№2, 2017

Yadigar N. Imamverdiyev

Digital libraries are complex information systems, which provide online library and information services, and ensuring information security and personal data protection are important for such systems. This paper proposes IDEA4SP-model for the analysis of information security problems in digital libraries, and structures the actual problems by the levels of this model. Moreover, it analyzes the technological approaches to ensuring personal data security and intellectual property protection in digital libraries (pp.65-72).

Keywords:digital library; personal data; information security; privacy; IDEA4SP.
  • Arms W.Y. Digital Libraries. - Cambridge, MA: The MIT Press, 2000, 304 p.
  • Al-Suqri M. Afzal W., Digital age: Challenges for libraries // Information, Society and Justice, 2007, vol. 1, no. 1, pp. 43-48.
  • Fox E., ElSherbiny N. Security and digital libraries. Digital Libraries - Methods and Applications. K.H.Huang (Ed.), InTech, 2011, pp. 151-160, http://www.intechopen.com/books/digital-libraries-methods-and-applications/security-and-digital-libraries
  • Anday A., Francese E., et al. Information security issues in a digital library environment: A literature review // Bilgi Dünyası, 2012, vol. 13, no. 1, pp. 117-137.
  • Hadow K. Data security for libraries: Prevent problems, don’t detect them // Feliciter, 2009, vol. 55, no. 2, pp. 50.
  • “State Programme on Development of Library-information spheres 2008-2013” in the Republic of Azerbaijan 6 October, 2008, http://www.e-qanun.az/alpidata/ framework/ data/15/c_f_15493.htm  
  • Khalafov А.А. Development of library study in Azerbaijan in the years of independence // Scientific works of ANAS CSL, 2010, No11, pp.3-31.
  • Aliyeva-Kangarli A. Development of electronic libraries: international and Azerbaijani experience, problems, perspectives // Scientific works of ANAS CSL, 2004, No 5, pp.3-11.
  • Jafarov C.A. Electronic catalog in library information service. Baku: Progress, 2012, p. 224
  • Alguliyev R.M., Mammadov E.Ch. Some Issues of Interaction of Integrated Library Systems and Electronic Libraries // ICT in Education, 2011, No3, pp.4-10.
  • Karimova S.H. Formation of commercial text databases, features and problems // Problems of information society, 2012, No2 (6), pp. 64-74.
  • Lancaster F.W. Libraries and librarians in the age of electronics. Arlington, VA: Information resources press, 1982, 229 p.
  • Antopolsky A.B., Vigursky K.V. The Concept of Electronic Libraries // Electronic Libraries, 1999. Vol. 2. Issue. 2, http://www.elbib.ru/index.phtml?page= elbib/rus/journal/1999/part2/antopol
  • Kruk S., McDaniel B. Semantic Digital Libraries. Springer Verlag. 2008, 245 p.
  • Baruzzo A., Casoto P., Challapalli P., Dattolo A., Pudota N., Tasso C. Toward semantic digital libraries: Exploiting web 2.0 and semantic services in cultural heritage // Journal of Digital Information, vol. 10, no. 6, 2009, http://www.journals.tdl.org/jodi/index.php/jodi/article/view/688/576
  • Lagoze C., Davis J.R. Dienst: An architecture for distributed document libraries // Communications of the ACM, 1995, vol. 38, no. 4, pp. 1.
  • Candela L., Castelli D., Ferro N., Koutrika G., et al. The DELOS Digital Library Reference model. Foundations for digital Libraries (Version 0.98), 2008, http://www.eprints.port.ac.uk/4104
  • Gonçalves M.A., Fox E.A. 5SL – A language for declarative specification and generation of digital libraries / Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries, 2002, pp. 263-272.
  • Gonçalves, M.A., et al. Streams, structures, spaces, scenarios, societies (5s): A formal model for digital libraries // ACM Transactions on Information Systems, 2004, vol. 22, no. 2, pp. 270-312.
  • Online Computer Library Center (OCLC): OCLC Digital Archive Preservation Policy and Supporting Documentation. Dublin, Ohio, 2006, 19 p.
  • Stallings W. Cryptography and Network Security. 4 ed. Pearson Prentice Hall: 2006.
  • Neuhaus P. Privacy and confidentiality in digital reference // Reference & User Services Quarterly, 2003, vol. 43, no. 1, pp. 26-36.
  • Saeednia S. How to maintain both privacy and authentication in digital libraries // International Journal on Digital Libraries, 2000, vol. 2, no. 4, pp. 251-258.
  • Kuzma J. European digital libraries: Web security vulnerabilities // Library Hi Tech, 2010, vol. 28, no. 3, pp. 402-413.
  • Adam N.R., Atluri V., Bertino E., Ferrari E. A content-based authorization model for digital libraries // IEEE Transactions on Knowledge and Data Engineering, 2002, vol. 14, no. 2, 296-315.
  • Ferrari E., Adam N.R., Atluri V., Bertino E., Capuozzo U. An authorization system for digital libraries // The VLDB Journal, 2002, vol. 11, no. 1, pp. 58 – 67.
  • Tyrväinen P. Concepts and a design for fair use and privacy in DRM // D-Lib Magazine, 2005, vol. 11, no. 2, http://www.dlib.org/dlib/february05/tyrvainen/02tyrvainen.html
  • ElSherbiny N. Security in digital libraries. Masters Thesis. June 2011.
  • Tolone W., et al. Access control in collaborative systems // ACM Computing Surveys, 2005, vol. 37, no. 1, pp. 29-41.
  • Information Supplement - PCI DSS E-commerce Guidelines. January 2013. 40 p.
  • Sturges P., Davies E., Dearnley J., Iliffe U., Iliffe U., Oppenheim C., Hardy R. User privacy in the digital library environment: an investigation of policies and preparedness // Library Management, 2003, vol. 24, no. 1/2, pp.44-50.
  • American Library Association Code of Ethics, http://www.ala.org/advocacy/proethics/codeofethics/codeethics
  • Questions and Answers on Privacy and Confidentiality, http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/qa-privacy
  • Noh Y. Digital library user privacy: changing librarian viewpoints through education // Library Hi Tech, 2014, vol. 32, no: 2, pp.300-317.
  • Gibb F., Thornley C., Ferguson S., Weckert J. The application of RFIDs in libraries: an assessment of technological, management and professional issues // International Journal of Information Management, 2011, vol. 31, no. 3, pp. 244-251.
  • American Library Association. RFID in libraries: privacy and confidentiality guidelines, 2006, http://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/rfidguidelines
  • Kelly E.P., Ericson G.S. RFID tags: Commercial applications v. privacy rights // Industrial Management and Data Systems, 2005, vol. 105, no. 6, pp. 703-713.
  • Ngai E.W.T., Moon K.K.L., Riggins F.J., Yi C.Y. RFID research: An academic literature review (1995-2005) and future research directions // International Journal of Production Economics, 2008, vol. 112, pp. 510-520.
  • Rieback M.R., Simpson P.N.D., Crispo B., Tanenbaum A.S. RFID malware: Design principles and examples // Pervasive and Mobile Computing, 2006, vol. 2, pp. 405-426.