Improving the Security and Privacy in Malaysia Academic Digital Libraries

Authors

  • Zairul Nizam Zainol Faculty of Information Science, Universiti Teknologi MARA Cawangan Selangor, Kampus Puncak Perdana, 40150 Shah Alam, Selangor, Malaysia
  • Saiful Farik Mat Yatin Faculty of Information Science, Universiti Teknologi MARA, Puncak Perdana , Selangor Malaysia, 40450 Shah Alam, Selangor
  • Mad Khir Johari Abdullah Sani Faculty of Information Science, Universiti Teknologi MARA, Puncak Perdana , Selangor Malaysia, 40450 Shah Alam, Selangor

DOI:

https://doi.org/10.24191/jikm.v15iSI2.7819

Keywords:

digital libraries, security, privacy, technology disruption

Abstract

Digital libraries have become an important and valuable platform because they provide easy access to various information and resources that users need. However, as the digital world continues to develop and the technological revolution and so-called technology disruption, becomes increasingly complex, concerns have emerged about the risk of cyber threats and their impact on user privacy and security when accessing digital libraries. Therefore, the objectives of this study focus on present key issues facing digital libraries in relation to privacy and security, evaluating the capacity of digital libraries to respond to emerging threats by studying their preparedness, and seeing if there are current policies or guidelines used by digital libraries in combating the cyber threats. The study outcome suggests developing a strategy for enhancement by looking at three areas, improving the current framework, producing new guidelines or policy suits for digital libraries, and developing a prototype based on AI technology to mitigate the cyber threats.

References

Angell, K. (2023). Privacy audit of public access computers and networks at a public college library. Information Technology and Libraries, 42(3). https://doi.org/10.5860/ital.v42i3.16233

Ansari, T. M., Pandey, D., & Alenezi, M. (2022). Store: security threat oriented requirements engineering methodology. Journal of King Saud University - Computer and Information Sciences, 34(2), 191-203. https://doi.org/10.1016/j.jksuci.2018.12.005

Avuglah, B. K., Owusu-Ansah, C. M., Tachie-Donkor, G., & Yeboah, E. B. (2020). Privacy practices in academic libraries in ghana: insight into three top universities. IFLA Journal, 47(2), 196-208. https://doi.org/10.1177/0340035220966605

Al-Suqri, M. N. and Akomolafe-Fatuyi, E. (2012). Security and privacy in digital libraries:. International Journal of Digital Library Systems, 3(4), 54-61. https://doi.org/10.4018/ijdls.2012100103

Anttila, J., & Jussila, K. (2017, December). Challenges for the comprehensive and integrated information security management. In 2017 13th International Conference on Computational Intelligence and Security (CIS) (pp. 586-589). IEEE.

Bialas, A. (2016). Computer-aided sensor development focused on security issues. Sensors, 16(6), 759. https://doi.org/10.3390/s16060759

Bitdefender. (2024, December 18). Hackers attack Toronto Public Library. Hot for Security. https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-attack-toronto-public-library

Briney, K. (2019). Data management practices in academic library learning analytics: a critical review. Journal of Librarianship and Scholarly Communication, 7(1). https://doi.org/10.7710/2162-3309.2268

Bulusu, S. T., Laborde, R., Wazan, A. S., Barrère, F., & Benzekri, A. (2017). Towards the weaving of the characteristics of good security requirements. Lecture Notes in Computer Science, 60-74. https://doi.org/10.1007/978-3-319-54876-0_5

CBC News. (2024, December 19). London Public Library cyber attack: System restoration services. CBC News. https://www.cbc.ca/news/canada/london/london-public-library-cyber-attack-system-resoration-services-1.7065676

Connolly, L. Y., Lang, M., Gathegi, J. N., & Tygar, D. (2017). Organisational culture, procedural countermeasures, and employee security behaviour. Information & Computer Security, 25(2), 118-136. https://doi.org/10.1108/ics-03-2017-0013

Downer, K. and Bhattacharya, M. (2022). Byod security: a study of human dimensions. Informatics, 9(1), 16. https://doi.org/10.3390/informatics9010016

Edinburgh Live. (2024, March 22). Edinburgh Heriot-Watt University admits cyber attack. Edinburgh Live. https://www.edinburghlive.co.uk/news/edinburgh-news/edinburgh-heriot-watt-university-admits-23490612

Foley, S. N. and Rooney, V. M. (2018). A grounded theory approach to security policy elicitation. Information & Computer Security, 26(4), 454-471. https://doi.org/10.1108/ics-12-2017-0086

Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2020). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452-462. https://doi.org/10.1080/08874417.2020.1845583

Gligorijevic, J. (2023). Tort-Based Protections for Data Privacy. Data and Private Law.

Haska, E. (2013). Development of higher education in albania: the case of the public university libraries in efforts to build digital and electronic services for the academic community. Academicus International Scientific Journal, 7, 137-148. https://doi.org/10.7336/academicus.2013.07.13

Huang, S., Han, Z., Yang, B., & Ren, N. (2016). Factor identification and computation in the assessment of information security risks for digital libraries. Journal of Librarianship and Information Science, 51(1), 78-94. https://doi.org/10.1177/0961000616668572

Kritikos, K. C. and Zimmer, M. (2017). Privacy policies and practices with cloud-based services in public libraries: an exploratory case of bibliocommons. Journal of Intellectual Freedom & Privacy, 2(1), 23-37. https://doi.org/10.5860/jifp.v2i1.6252

Kumar, R., Pandey, A., Baz, A., Alhakami, H., Alhakami, W., Agrawal, A.,& Khan, R. A. (2020). Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security. Symmetry, 12(4), 664. https://doi.org/10.3390/sym12040664

Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. (2021). Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 19(02), 289-302. https://doi.org/10.3846/bmee.2021.14798

Maceli, M. and Burke, J. J. (2016). Technology skills in the workplace: information professionals’ current use and future aspirations. Information Technology and Libraries, 35(4), 35-62. https://doi.org/10.6017/ital.v35i4.9540

Maceli, M. (2018). Encouraging patron adoption of privacy-protection technologies:. IFLA Journal, 44(3), 195-202. https://doi.org/10.1177/0340035218773786

Mohd, H., Robie, M. A. M., Baharom, F., Darus, N. M., Saip, M. A., & Yasin, A. (2016). Adapting rational unified process (rup) approach in designing a secure e-tendering model. AIP Conference Proceedings. https://doi.org/10.1063/1.4960906

Mshangi, M., Nfuka, E. N., & Sanga, C. (2018). Human sensor web crowd sourcing security incidents management in tanzania context. Journal of Information Security, 09(03), 191-208. https://doi.org/10.4236/jis.2018.93014

Oxford Student. (2024, February 14). Bodleian services still impacted by British Library cyber attack. Oxford Student. https://www.oxfordstudent.com/2024/02/14/bodleian-services-still-impacted-by-british-library-cyber-attack/

Pavlidis, M., Mouratidis, H., Panaousis, E., & Argyropoulos, N. G. (2017). Selecting security mechanisms in secure tropos. Trust, Privacy and Security in Digital Business, 99-114. https://doi.org/10.1007/978-3-319-64483-7_7

Ram, B., Kumar, A., & Pal, S. K. (2023). Applications of the internet of things in library and data privacy. IP Indian Journal of Library Science and Information Technology, 8(1), 14-19. https://doi.org/10.18231/j.ijlsit.2023.003

Robertshaw, M. B. and Asher, A. (2019). Unethical numbers? a meta-analysis of library learning analytics studies. Library Trends, 68(1), 76-101. https://doi.org/10.1353/lib.2019.0031

Shashi Kant Gupta, A. S. D. (2023). Analysis and development of security framework for iot device. Tuijin Jishu/Journal of Propulsion Technology, 44(4), 995-1008. https://doi.org/10.52783/tjjpt.v44.i4.955

Singley, E. (2020). A holistic approach to user privacy in academic libraries. The Journal of Academic Librarianship, 46(3), 102151. https://doi.org/10.1016/j.acalib.2020.102151

The Star. (2024, July 4). Why would you hack a library? US county still struggling months after cyberattack. The Star. https://www.thestar.com.my/tech/tech-news/2024/07/04/039why-would-you-hack-a-library039-us-county-still-struggling-months-after-cyberattack

Wilcox, L. (2016). Securing methods, practicing critique: a review of methods and critical security studies. International Studies Review, viw026. https://doi.org/10.1093/isr/viw026

Wu, Z., Shen, S., Lu, C., Li, H., & Su, X. (2020). How to protect reader lending privacy under a cloud environment: a technical method. Library Hi Tech, 40(6), 1746-1765. https://doi.org/10.1108/lht-07-2020-0178

Wu, Z., Shen, S., Li, H., Zhou, H., & Zou, D. (2021). A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment. Library Hi Tech, 40(6), 1930-1953. https://doi.org/10.1108/lht-07-2021-0239

Wilcox, L. (2016). Securing methods, practicing critique: a review of methods and critical security studies. International Studies Review, viw026. https://doi.org/10.1093/isr/viw026

Willis, S. and O'Reilly, F. (2018). Enhancing visibility of vendor accessibility documentation. Information Technology and Libraries, 37(3), 12-28. https://doi.org/10.6017/ital.v37i3.10240

Zimmer, M. (2013). Assessing the treatment of patron privacy in library 2.0 literature. Information Technology and Libraries, 32(2), 29-41. https://doi.org/10.6017/ital.v32i2.3420

Downloads

Published

01-08-2025

How to Cite

Zainol, Z. N. ., Mat Yatin, S. F. ., & Abdullah Sani, M. K. J. . (2025). Improving the Security and Privacy in Malaysia Academic Digital Libraries. Journal of Information and Knowledge Management, 15(SI2), 132–145. https://doi.org/10.24191/jikm.v15iSI2.7819

Issue

Section

The 6th International Conference of Information Science

Categories

Most read articles by the same author(s)