{"title":"A study on strategies to improve the protection of personal information for university libraries users","authors":"Caihong Gao","doi":"10.1109/ICASI.2016.7539952","DOIUrl":null,"url":null,"abstract":"In the digitization course of college library, the personal information security of library users meets some new challenges. The privacy protections mainly lie in the information generation, migration, utilization, sharing, storage, destruction, recovery and other links. Various factors, including the defects of the cloud computing system, hacker attacks and viruses, the inadequate internal management of cloud service providers, national or regional legislative conflicts, may pose threats to the personal information security of library users. Therefore, we should perfect the policies and regulations of personal information protection, adopt flexible application strategies of privacy technology, strengthen the privacy security supervision in the cloud service industry and formulate unified technical standards and industry guide of privacy protection so as to protect the personal information security of library users.","PeriodicalId":170124,"journal":{"name":"2016 International Conference on Applied System Innovation (ICASI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI.2016.7539952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the digitization course of college library, the personal information security of library users meets some new challenges. The privacy protections mainly lie in the information generation, migration, utilization, sharing, storage, destruction, recovery and other links. Various factors, including the defects of the cloud computing system, hacker attacks and viruses, the inadequate internal management of cloud service providers, national or regional legislative conflicts, may pose threats to the personal information security of library users. Therefore, we should perfect the policies and regulations of personal information protection, adopt flexible application strategies of privacy technology, strengthen the privacy security supervision in the cloud service industry and formulate unified technical standards and industry guide of privacy protection so as to protect the personal information security of library users.