Protecting users’ privacy in academic libraries in Egypt: a field study

Authors

DOI:

https://doi.org/10.70000/cj.2023.70.583

Keywords:

Data privacy, user data, academic libraries, Egypt

Abstract

The study aims to identify and analyse the policies for protecting the privacy of patrons’ data in Arabic and international academic libraries, study the legislation governing these policies. In order to achieve the objectives of the study, the descriptive analytical method has been used to assemble the policies of protecting data privacy of patrons of international academic libraries, and to study the current situation of academic libraries in Egypt. This is attained by using a set of data collection tools, the most important of which are the personal interviews, checklists, and questionnaires.

The study concludes with a number of results, the most important of which are:

  1. illustrates the importance of using specialists in the field of libraries and information for their significance in raising awareness of the importance of protecting data privacy in academic libraries in Egyptian universities.

Establishing policies to protect the privacy of beneficiary data in Egyptian academic libraries.

References

Al-Bakrī, Yūsuf ʻAlī al-Shaykh Muṣṭafá. (2017). Amn al-maʻlūmāt bi-al-maktabāt al-jāmiʻīyah al-Sūdānīyah bi-al-ishārah ilá maktabatī Jāmiʻat al-Nīlīn wa-Jāmiʻat Wādī al-Nīl. Al-Muʼtamar al-Sanawī al-Thālith wa-al-ʻAsharūn, al-Baḥrayn. 7-9 Mārīs 2017. Available: https://bit.ly/2K5XZzS. Retrieved: 7/4/2020.

Al-ḥimāyah al-qānūnīyah li-al-bayānāt al-shakhṣīyah. (2015). Silsilat Awraq al-ḥaqq fī al-maʻrifah. Markaz Daʻm li-Tiknūlūjiyā al-Maʻlūmāt (SITC). Available: https://bit.ly/2Lwt40d. Retrieved: 15/5/2020.

Al-Mutbullī, Hibah Aḥmad Muḥammad. (2022). Siyāsāt ḥimāyat khuṣūṣīyat bayānāt al-mustafīdīn min al-maktabāt fī al-bīʼah al-raqāmīyah: dirāsah taḥlīlīyah ʻalá ʿaynah min al-maktabāt al-ajnabīyah maʻa istinbāṭ siyāsah lil-maktabāt al-ʿArabīyah. Buḥūth fī ʻIlm al-Maktabāt wa-al-Maʻlūmāt, 29(29), 173-216. Available: https://rb.gy/z42y0. Retrieved: 30/10/2022.

Al-Shāmī, Aḥmad. (2018). Al-khuṣūṣīyah, ḥimāyat al-bayānāt. Muṣṭalaḥāt al-maktabāt wa-al-maʻlūmāt wa-al-ārshīf. Available: https://bit.ly/2Z5npGp. Retrieved: 15/5/2020.

Al-Sukkarī, ʿImād al-Dīn. (2020). Ikhtibār t li-l-furūq bayna ʿaynatayn mustaqillatayn al-juzʼ al-awwal. Available: https://www.youtube.com/watch?v=woG2p_zdsiY. Retrieved: 14/5/2023.

Al-Zughayl, Walīd. (2020). Al-ikhtibārāt al-iḥṣāʼīyah al-buʻdīyah al-muqāranāt al-mutaʿaddidah ikhtibār Tukey. Available: https://shorturl.at/vGMOR. Retrieved: 14/5/2023.

ʿAlī, Yūnus Ṣalāḥ al-Dīn. (2016). Al-masʼūliyah al-madaniyyah al-nājimah ʻan al-taʻaddī ʻalá al-ḥaqq fī al-khuṣūṣīyah fī al-qānūn al-ingilīzī: dirāsah taḥlīlīyah muqāranah bi-al-qānūn al-ʿIrāqī. Kullīyat al-Qānūn wa-al-ʿAlāqāt al-Duwalīyah: Jāmiʻat Jīhān al-Khāṣṣah. Majallat al-ʿUlūm al-Qānūnīyah, 31(1), 491-566. Available: https://bit.ly/2T94abh. Retrieved: 15/5/2020.

Ford, Anne. (2017). How to protect patrons’ digital privacy: As broadband privacy rules are rolled back, what can libraries do to respond? American Libraries, 21 April. Retrieved from: https://bit.ly/2K3gZin. Available at: 7/4/2020.

Friedewald, Michael & Wright, David. (2013). Seven Types of Privacy. In European Data Protection: Coming of Age, Chapter: Seven Types of Privacy. Publisher: Springer. Editors: Serge Gutwirth, Ronald Leenes, Paul de Hert, Yves Poullet, pp. 3-32. Retrieved from: https://bit.ly/3b4Oi0m. Available at: 3/4/2019.

Hess, Amanda Nichols; LaPorte-Fiori, Rachelle; Engwall, Keith. (2015). Preserving Patron Privacy in the 21st Century Academic Library. The Journal of Academic Librarianship, 41(1), 105-115. Retrieved from: https://bit.ly/3b9LxL7. Available at: 7/4/2020.

Jamāl, Maḥmūd. (2022). Ahammīyat taḥlīl al-tabāyūn wa-ṭarīqat ḥisābihi wa-istikhdāmātihi. Available: https://shorturl.at/cjmuR. Retrieved: 14/5/2023.

Kokolakis, Spyros. (2015). Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. Retrieved from: https://bit.ly/2Kaq3St. Available at: 7/4/2020.

Koren, Marian & Schepman, Tessie. (2008). Anonymity of library users in The Netherlands and Croatia. Emerald Insight. Retrieved from: https://bit.ly/34C7Ir4. Available at: 7/4/2020.

Lambert, April D.; Parker, Michelle; Bashir, Masooda. (2015). Library Patron Privacy in Jeopardy: An analysis of the privacy policies of digital content vendors. ASIST 2015, November 6-10, 2015. Retrieved from: https://bit.ly/2wJoYhG. Available at: 7/4/2020.

Magi, Trina J. (2006). Protecting Library Patron Confidentiality: Checklist of Best Practices. Illinois Library Association. Retrieved from: https://bit.ly/2RAy2fK. Available at: 7/4/2020.

Reitz, Joan M. (2014). Privacy. Retrieved from: https://bit.ly/3fRgQNM. Available at: 15/5/2020.

Robinson. (2017). Navigating the Changing Landscape of Library Privacy. Webinar. Reaching Across Illinois Library System. Retrieved from: https://bit.ly/34yBqxd. Available at: 7/4/2020.

Privacy Act of 1974. (2008). (n.d.). West's Encyclopedia of American Law, edition 2. Retrieved from: https://bit.ly/2LsO8oo. Available at: 15/5/2020.

Tripathi, Sneha & Tripathi, Aditya. (2010). Privacy in libraries: the perspective from India. Emerald Insight. Retrieved from: https://bit.ly/3egfYl3. Available at: 7/4/2020.

Zimmer, Michael. (2014). Librarians’ Attitudes Regarding Information and Internet Privacy. The University of Chicago Press, 84(2), 123-151. Retrieved from: https://bit.ly/2xmauoi. Available at: 7/4/2020.

Published

2023-12-31

How to Cite

Labib, N. (2023). Protecting users’ privacy in academic libraries in Egypt: a field study. Cybrarians Journal, (70), 87–101. https://doi.org/10.70000/cj.2023.70.583