An approach for the protection of users’ book browsing preference privacy in a digital library

2018 ◽  
Vol 36 (6) ◽  
pp. 1154-1166 ◽  
Author(s):  
Zongda Wu ◽  
Chengren Zheng ◽  
Jian Xiejian ◽  
Zhifeng Zhou ◽  
Guandong Xu ◽  
...  

PurposeThe problem of privacy protection in digital libraries is causing people to have increasingly extensive concerns. This study aims to design an approach to protect the preference privacy behind users’ book browsing behaviors in a digital library.Design/methodology/approachThis paper proposes a client-based approach, whose basic idea is to construct a group of plausible book browsing dummy behaviors, and submit them together with users’ true behaviors to the untrusted server, to cover up users’ sensitive preferences.FindingsBoth security analysis and evaluation experiment demonstrate the effectiveness of the approach, which can ensure the privacy security of users’ book browsing preferences on the untrusted digital library server, without compromising the usability, accuracy and efficiency of book services.Originality/valueTo the best of the authors’ knowledge, this paper provides the first attempt to the protection of users’ behavior privacy in digital libraries, which will have a positive influence on the development of privacy-preserving libraries in the new network era.

2014 ◽  
Vol 70 (6) ◽  
pp. 970-996 ◽  
Author(s):  
Paula Goodale ◽  
Paul David Clough ◽  
Samuel Fernando ◽  
Nigel Ford ◽  
Mark Stevenson

Purpose – The purpose of this paper is to investigate the effects of cognitive style on navigating a large digital library of cultural heritage information; specifically, the paper focus on the wholist/analytic dimension as experienced in the field of educational informatics. The hypothesis is that wholist and analytic users have characteristically different approaches when they explore, search and interact with digital libraries, which may have implications for system design. Design/methodology/approach – A detailed interactive IR evaluation of a large cultural heritage digital library was undertaken, along with the Riding CSA test. Participants carried out a range of information tasks, and the authors analysed their task performance, interactions and attitudes. Findings – The hypothesis on the differences in performance and behaviour between wholist and analytic users is supported. However, the authors also find that user attitudes towards the system are opposite to expectations and that users give positive feedback for functionality that supports activities in which they are cognitively weaker. Research limitations/implications – There is scope for testing results in a larger scale study, and/or with different systems. In particular, the findings on user attitudes warrant further investigation. Practical implications – Findings on user attitudes suggest that systems which support areas of weakness in users’ cognitive abilities are valued, indicating an opportunity to offer diverse functionality to support different cognitive weaknesses. Originality/value – A model is proposed suggesting a converse relationship between behaviour and attitudes; to support individual users displaying search/navigation behaviour mapped onto the strengths of their cognitive style, but placing greater value on interface features that support aspects in which they are weaker.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zongda Wu ◽  
Shigen Shen ◽  
Chenglang Lu ◽  
Huxiong Li ◽  
Xinning Su

PurposeIn this paper, the authors propose an effective mechanism for the protection of digital library readers' lending privacy under a cloud environment.Design/methodology/approachThe basic idea of the method is that for each literature circulation record, before being submitted to the untrusted cloud database of a digital library for storage, its reader number has to be encrypted strictly at a client, so as to make it unable for an attacker at the cloud to know the specific reader associated with each circulation record and thus protect readers' lending privacy. Moreover, the authors design an effective method for querying the encrypted literature circulation records, so as to ensure the accuracy and efficiency of each kind of database queries related to the encrypted reader number field of literature circulation records.FindingsFinally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed methods.Originality/valueThis paper presents the first study attempt to the privacy protection of readers' literature circulations, which can improve the security of readers' lending privacy in the untrusted cloud, without compromising the accuracy and efficiency of each kind of database queries in the digital library. It is of positive significance to construct a privacy-preserving digital library platform.


2015 ◽  
Vol 33 (5) ◽  
pp. 916-927 ◽  
Author(s):  
Michael Trachtengerts ◽  
Adilbek Erkimbaev ◽  
Vladimir Zitserman ◽  
Georgii Kobzev

Purpose – The purpose of this paper is to reveal main advantages of digital libraries in comparison with technology of common database for data-oriented fields of modern science. As an example, the subject domain “nanomaterials and nanotechnologies” with new features due to evolution of concepts and objects is presented. Design/methodology/approach – An analysis of the information system ABCD as a basis for science-oriented digital library was fulfilled. Also, a survey of peculiarities of data in fast developing fields of science was prepared. Findings – The results of this paper showed that functional capacities of ABCD satisfy requirements for complex collections and archives of scientific documents. Based on the ABCD tools and this concept, the digital library for storage and systematization of data and documents on nanomaterials and nanotechnologies for the power engineering was constructed. The library combines opportunities of bibliographic, full text and factual information systems. Originality/value – This paper gives the foundation for creation of a library that combines services of bibliographic, full text and factual (numerical) information systems. Some analyses of ABCD tools were made before elsewhere, but they did not point on data peculiarities of complexly organized domains: semi-structured data, multitude formats (text, image and tables), interconnection of content with external sources located on other servers or in the Web.


2015 ◽  
Vol 33 (4) ◽  
pp. 824-841 ◽  
Author(s):  
Mehdi Alipour-Hafezi ◽  
Hamid Amanollahi Nick

Purpose – The purpose of this study is to identify the situation of evaluating Iranian digital libraries using DigiQUAL protocol. Design/methodology/approach – Evaluative survey research method is used in this study to assess digital libraries. In this way, digital libraries of Iranian research institutes constitute the study population. DigiQUAL protocol actually was used to evaluate eight Iranian digital libraries. Systematic observation and interview based on researcher-made checklist was used for data collection. In fact, checklist was constructed based on DigiQual protocol. Findings – The results showed that Digital Library of Isfahan Science and Technology Town has the best performance and Noor digital library has the lowest operation in studied digital libraries. The overall score of all studied digital libraries was under 60 (out of 100) which shows the average performance of the digital libraries. Originality/value – This study emphasizes on evaluating active digital libraries in Iran by DigiQUAL protocol. Because digital libraries are new in Iran and their progress need to evaluate their activity, this research was done to demonstrate their situation.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ridhima Mehta

Purpose This paper aims to evaluate the user satisfaction criterion for qualitative assessment of timeliness and efficacy of digital libraries based on the multivariate fuzzy logic technique. Design/methodology/approach In this paper, the performance of digital library services using fuzzy logic modeling are evaluated. This model based on fuzzy logic control is used to compute the dynamic response of users by using multiple independent variables. These parameters with inherent uncertainties in practical scenarios are characterized by fuzzy linguistic information. Findings Several parameters determining the user satisfaction metric in the deployment of digital library exhibit implicit uncertainties which can be intelligently modeled by means of fuzzy control systems. Given the sample data set for the proposed fuzzy multi-attribute decision-making framework, the simulation results are used to compute various error performance measures in the estimation of the fuzzy output variables. Research limitations/implications The size of the considered sample data set is considerably small. Scalable real-world data sets can be used to reinforce the statistical efficiency and accuracy of the proposed model. Moreover, other techniques such as evolutionary multi-objective optimization and the Markovian process can be implemented to explore the efficient correlation between different parameters influencing the users’ behavior and facilitate the general application of the proposed technique. Originality/value The paper applied a fuzzy design methodology in which several attributes related to the service of digital library and the affiliated online resource provisions are used to assess their synchronous impact on user convenience in accessing and manipulating the library information. End-users’ satisfaction is crucial for quality-based valuation of compliance with the time limitations and proficiency of digital libraries.


2015 ◽  
Vol 43 (3) ◽  
pp. 151-159 ◽  
Author(s):  
Alexander Plemnek ◽  
Natalia Sokolova

Purpose – The purpose of this paper is to demonstrate the current situation and history of cooperation and resource sharing in Russian libraries. The resources and services provided cooperatively are described. Design/methodology/approach – A narrative combining description, surveys, analysis and evaluation. Findings – Fundamental changes have occurred in Russian libraries as a result of the development of consortia services development, particularly in resource sharing. Research limitations/implications – Digital libraries and databases subscriptions were not within the scope of this study. Social implications – The paper demonstrates the efforts of many libraries cooperatively producing services at a national level. Originality/value – One of the few articles to describe the current state of resource sharing and consortia development in Russia.


2015 ◽  
Vol 33 (4) ◽  
pp. 714-729 ◽  
Author(s):  
Miroslaw Górny ◽  
John Catlow ◽  
Jolanta Mazurek

Purpose – The purpose of this paper is to describe and evaluate the role played by digital libraries in Polish society, particularly in relation to users who are not in education or professionally engaged in academic work. Design/methodology/approach – Results are presented from a survey of non-academic users, identified as one of the key groups of digital library users in an exploratory survey in 2008-2009. The targeted survey was carried out by sending e-mails to persons who had supplied their addresses in the first survey or had set up accounts with the Digital Library of Wielkopolska. Analysis was also made of e-mail correspondence between digital library users and librarians, and data from digital library server logs, during 2008-2013. Findings – The research provided three interesting results. The first is that the creation of digital libraries in Poland has caused a significant number of people to pursue an interest in genealogical or local historical research. The second result is that the evaluations of digital libraries made by non-academics do not differ significantly from those made by students and academics. The third is the fact that at present, approximately 50 per cent of digital library users in the non-academic category are over 50 years of age. Originality/value – This is the first comprehensive study on the use of digital libraries in Poland by non-academic users. It shows what role digital libraries play, and to what extent, in the stimulation of cultural activity in Polish society.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zongda Wu ◽  
Shigen Shen ◽  
Huxiong Li ◽  
Haiping Zhou ◽  
Dongdong Zou

PurposeFirst, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.Design/methodology/approachIn this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.FindingsAs a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.Originality/valueAlong with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.


2014 ◽  
Vol 32 (2) ◽  
pp. 134-146 ◽  
Author(s):  
Mehdi Alipour-Hafezi

Purpose – The main purpose of this article is to provide a focal framework with the aim of making integrated digital libraries in technical and content level of syntactic interoperability between digital libraries. Design/methodology/approach – Literature review, library research method and analytical approach were used in the first step of this research in order to design IDL framework. Then a survey of 11 Iranian digital library applications was conducted for testing the proposed framework. Finally, based on the findings, conceptual integration architecture was proposed based on the framework. Findings – Based on the literature a framework for integration of digital library applications in syntax level is proposed which includes four core layers: models, protocols, metadata formats, and context-based layer. Based on the findings of the survey, integration architecture is proposed which includes all the mentioned layers in the IDL framework. So as to decrease cost of installing the architecture, cloud base technology architecture introduced to be used inverse. Originality/value – A gap exists between research and practice in the field of integrated digital libraries. In fact this article is an attempt to cover this gap by proposing a framework that can be implemented.


2017 ◽  
Vol 35 (2) ◽  
pp. 290-302 ◽  
Author(s):  
Sanaz Rahrovani ◽  
Mahdieh Mirzabeigi ◽  
Javad Abbaspour

Purpose The purpose of this paper is to investigate the trained and untrained users’ mental models compatibility with search module icons in three Iranian digital library applications, namely, Nika, Azarakhsh, and Simorgh. Design/methodology/approach The population of this survey consisted of two groups including trained and untrained users. The trained user group consisted of 174 samples, all of which were included in the study due to scarcity of the samples. The untrained user group consisted of 8,210 samples, from which 267 cases were selected through stratified sampling. Findings Results showed that the trained users’ mental models were more compatible with the search module icons than those of the untrained users. The comparison of three software applications showed that the mental models of trained and untrained users had the highest compatibility with the search icons of Azarakhsh and the lowest compatibility with those of Nika. Concerning the untrained users’ status in terms of their fields of study, results showed that users majoring technical and engineering field and those in agriculture had, respectively, the highest and lowest mental models compatibility with the icons embedded in the user interface of the studied applications. Originality/value Since the mental models may be incomplete or inaccurate, the study of the trained and untrained users’ mental models compatibility with the search module icons of user interface embedded in various library applications may help in assessing the software’ status and the designers’ level of success in conveying the content. This also may assist information literacy specialists to estimate the required amount of training for trained and untrained users.


Sign in / Sign up

Export Citation Format

Share Document