{"title":"高校图书馆用户个人信息保护对策研究","authors":"Caihong Gao","doi":"10.1109/ICASI.2016.7539952","DOIUrl":null,"url":null,"abstract":"In the digitization course of college library, the personal information security of library users meets some new challenges. The privacy protections mainly lie in the information generation, migration, utilization, sharing, storage, destruction, recovery and other links. Various factors, including the defects of the cloud computing system, hacker attacks and viruses, the inadequate internal management of cloud service providers, national or regional legislative conflicts, may pose threats to the personal information security of library users. Therefore, we should perfect the policies and regulations of personal information protection, adopt flexible application strategies of privacy technology, strengthen the privacy security supervision in the cloud service industry and formulate unified technical standards and industry guide of privacy protection so as to protect the personal information security of library users.","PeriodicalId":170124,"journal":{"name":"2016 International Conference on Applied System Innovation (ICASI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A study on strategies to improve the protection of personal information for university libraries users\",\"authors\":\"Caihong Gao\",\"doi\":\"10.1109/ICASI.2016.7539952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the digitization course of college library, the personal information security of library users meets some new challenges. The privacy protections mainly lie in the information generation, migration, utilization, sharing, storage, destruction, recovery and other links. Various factors, including the defects of the cloud computing system, hacker attacks and viruses, the inadequate internal management of cloud service providers, national or regional legislative conflicts, may pose threats to the personal information security of library users. Therefore, we should perfect the policies and regulations of personal information protection, adopt flexible application strategies of privacy technology, strengthen the privacy security supervision in the cloud service industry and formulate unified technical standards and industry guide of privacy protection so as to protect the personal information security of library users.\",\"PeriodicalId\":170124,\"journal\":{\"name\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Applied System Innovation (ICASI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASI.2016.7539952\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI.2016.7539952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on strategies to improve the protection of personal information for university libraries users
In the digitization course of college library, the personal information security of library users meets some new challenges. The privacy protections mainly lie in the information generation, migration, utilization, sharing, storage, destruction, recovery and other links. Various factors, including the defects of the cloud computing system, hacker attacks and viruses, the inadequate internal management of cloud service providers, national or regional legislative conflicts, may pose threats to the personal information security of library users. Therefore, we should perfect the policies and regulations of personal information protection, adopt flexible application strategies of privacy technology, strengthen the privacy security supervision in the cloud service industry and formulate unified technical standards and industry guide of privacy protection so as to protect the personal information security of library users.