Improving the Security and Privacy in Malaysia Academic Digital Libraries
DOI:
https://doi.org/10.24191/jikm.v15iSI2.7819Keywords:
digital libraries, security, privacy, technology disruptionAbstract
Digital libraries have become an important and valuable platform because they provide easy access to various information and resources that users need. However, as the digital world continues to develop and the technological revolution and so-called technology disruption, becomes increasingly complex, concerns have emerged about the risk of cyber threats and their impact on user privacy and security when accessing digital libraries. Therefore, the objectives of this study focus on present key issues facing digital libraries in relation to privacy and security, evaluating the capacity of digital libraries to respond to emerging threats by studying their preparedness, and seeing if there are current policies or guidelines used by digital libraries in combating the cyber threats. The study outcome suggests developing a strategy for enhancement by looking at three areas, improving the current framework, producing new guidelines or policy suits for digital libraries, and developing a prototype based on AI technology to mitigate the cyber threats.
References
Angell, K. (2023). Privacy audit of public access computers and networks at a public college library. Information Technology and Libraries, 42(3). https://doi.org/10.5860/ital.v42i3.16233
Ansari, T. M., Pandey, D., & Alenezi, M. (2022). Store: security threat oriented requirements engineering methodology. Journal of King Saud University - Computer and Information Sciences, 34(2), 191-203. https://doi.org/10.1016/j.jksuci.2018.12.005
Avuglah, B. K., Owusu-Ansah, C. M., Tachie-Donkor, G., & Yeboah, E. B. (2020). Privacy practices in academic libraries in ghana: insight into three top universities. IFLA Journal, 47(2), 196-208. https://doi.org/10.1177/0340035220966605
Al-Suqri, M. N. and Akomolafe-Fatuyi, E. (2012). Security and privacy in digital libraries:. International Journal of Digital Library Systems, 3(4), 54-61. https://doi.org/10.4018/ijdls.2012100103
Anttila, J., & Jussila, K. (2017, December). Challenges for the comprehensive and integrated information security management. In 2017 13th International Conference on Computational Intelligence and Security (CIS) (pp. 586-589). IEEE.
Bialas, A. (2016). Computer-aided sensor development focused on security issues. Sensors, 16(6), 759. https://doi.org/10.3390/s16060759
Bitdefender. (2024, December 18). Hackers attack Toronto Public Library. Hot for Security. https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-attack-toronto-public-library
Briney, K. (2019). Data management practices in academic library learning analytics: a critical review. Journal of Librarianship and Scholarly Communication, 7(1). https://doi.org/10.7710/2162-3309.2268
Bulusu, S. T., Laborde, R., Wazan, A. S., Barrère, F., & Benzekri, A. (2017). Towards the weaving of the characteristics of good security requirements. Lecture Notes in Computer Science, 60-74. https://doi.org/10.1007/978-3-319-54876-0_5
CBC News. (2024, December 19). London Public Library cyber attack: System restoration services. CBC News. https://www.cbc.ca/news/canada/london/london-public-library-cyber-attack-system-resoration-services-1.7065676
Connolly, L. Y., Lang, M., Gathegi, J. N., & Tygar, D. (2017). Organisational culture, procedural countermeasures, and employee security behaviour. Information & Computer Security, 25(2), 118-136. https://doi.org/10.1108/ics-03-2017-0013
Downer, K. and Bhattacharya, M. (2022). Byod security: a study of human dimensions. Informatics, 9(1), 16. https://doi.org/10.3390/informatics9010016
Edinburgh Live. (2024, March 22). Edinburgh Heriot-Watt University admits cyber attack. Edinburgh Live. https://www.edinburghlive.co.uk/news/edinburgh-news/edinburgh-heriot-watt-university-admits-23490612
Foley, S. N. and Rooney, V. M. (2018). A grounded theory approach to security policy elicitation. Information & Computer Security, 26(4), 454-471. https://doi.org/10.1108/ics-12-2017-0086
Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2020). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452-462. https://doi.org/10.1080/08874417.2020.1845583
Gligorijevic, J. (2023). Tort-Based Protections for Data Privacy. Data and Private Law.
Haska, E. (2013). Development of higher education in albania: the case of the public university libraries in efforts to build digital and electronic services for the academic community. Academicus International Scientific Journal, 7, 137-148. https://doi.org/10.7336/academicus.2013.07.13
Huang, S., Han, Z., Yang, B., & Ren, N. (2016). Factor identification and computation in the assessment of information security risks for digital libraries. Journal of Librarianship and Information Science, 51(1), 78-94. https://doi.org/10.1177/0961000616668572
Kritikos, K. C. and Zimmer, M. (2017). Privacy policies and practices with cloud-based services in public libraries: an exploratory case of bibliocommons. Journal of Intellectual Freedom & Privacy, 2(1), 23-37. https://doi.org/10.5860/jifp.v2i1.6252
Kumar, R., Pandey, A., Baz, A., Alhakami, H., Alhakami, W., Agrawal, A.,& Khan, R. A. (2020). Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security. Symmetry, 12(4), 664. https://doi.org/10.3390/sym12040664
Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. (2021). Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 19(02), 289-302. https://doi.org/10.3846/bmee.2021.14798
Maceli, M. and Burke, J. J. (2016). Technology skills in the workplace: information professionals’ current use and future aspirations. Information Technology and Libraries, 35(4), 35-62. https://doi.org/10.6017/ital.v35i4.9540
Maceli, M. (2018). Encouraging patron adoption of privacy-protection technologies:. IFLA Journal, 44(3), 195-202. https://doi.org/10.1177/0340035218773786
Mohd, H., Robie, M. A. M., Baharom, F., Darus, N. M., Saip, M. A., & Yasin, A. (2016). Adapting rational unified process (rup) approach in designing a secure e-tendering model. AIP Conference Proceedings. https://doi.org/10.1063/1.4960906
Mshangi, M., Nfuka, E. N., & Sanga, C. (2018). Human sensor web crowd sourcing security incidents management in tanzania context. Journal of Information Security, 09(03), 191-208. https://doi.org/10.4236/jis.2018.93014
Oxford Student. (2024, February 14). Bodleian services still impacted by British Library cyber attack. Oxford Student. https://www.oxfordstudent.com/2024/02/14/bodleian-services-still-impacted-by-british-library-cyber-attack/
Pavlidis, M., Mouratidis, H., Panaousis, E., & Argyropoulos, N. G. (2017). Selecting security mechanisms in secure tropos. Trust, Privacy and Security in Digital Business, 99-114. https://doi.org/10.1007/978-3-319-64483-7_7
Ram, B., Kumar, A., & Pal, S. K. (2023). Applications of the internet of things in library and data privacy. IP Indian Journal of Library Science and Information Technology, 8(1), 14-19. https://doi.org/10.18231/j.ijlsit.2023.003
Robertshaw, M. B. and Asher, A. (2019). Unethical numbers? a meta-analysis of library learning analytics studies. Library Trends, 68(1), 76-101. https://doi.org/10.1353/lib.2019.0031
Shashi Kant Gupta, A. S. D. (2023). Analysis and development of security framework for iot device. Tuijin Jishu/Journal of Propulsion Technology, 44(4), 995-1008. https://doi.org/10.52783/tjjpt.v44.i4.955
Singley, E. (2020). A holistic approach to user privacy in academic libraries. The Journal of Academic Librarianship, 46(3), 102151. https://doi.org/10.1016/j.acalib.2020.102151
The Star. (2024, July 4). Why would you hack a library? US county still struggling months after cyberattack. The Star. https://www.thestar.com.my/tech/tech-news/2024/07/04/039why-would-you-hack-a-library039-us-county-still-struggling-months-after-cyberattack
Wilcox, L. (2016). Securing methods, practicing critique: a review of methods and critical security studies. International Studies Review, viw026. https://doi.org/10.1093/isr/viw026
Wu, Z., Shen, S., Lu, C., Li, H., & Su, X. (2020). How to protect reader lending privacy under a cloud environment: a technical method. Library Hi Tech, 40(6), 1746-1765. https://doi.org/10.1108/lht-07-2020-0178
Wu, Z., Shen, S., Li, H., Zhou, H., & Zou, D. (2021). A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment. Library Hi Tech, 40(6), 1930-1953. https://doi.org/10.1108/lht-07-2021-0239
Wilcox, L. (2016). Securing methods, practicing critique: a review of methods and critical security studies. International Studies Review, viw026. https://doi.org/10.1093/isr/viw026
Willis, S. and O'Reilly, F. (2018). Enhancing visibility of vendor accessibility documentation. Information Technology and Libraries, 37(3), 12-28. https://doi.org/10.6017/ital.v37i3.10240
Zimmer, M. (2013). Assessing the treatment of patron privacy in library 2.0 literature. Information Technology and Libraries, 32(2), 29-41. https://doi.org/10.6017/ital.v32i2.3420
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Zairul Nizam Zainol, Saiful Farik Mat Yatin, Mad Khir Johari Abdullah Sani

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright of articles that appear in the journal belongs exclusively to Faculty of Information Science, Universiti Teknologi MARA (Publisher). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions or any other reproductions of similar nature.







