Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

A proposed framework technical requirements copyright protection for information resources in NLAI information systems: with Fuzzy Delphi Technique

Document Type : Original Article

Author
Information Management and Knowledge Organization Department; National Library and Archives of Iran; Tehran, Iran.
Abstract
The current research is practical in terms of purpose. In present study used a qualitative approach to examine and analyze the status of the Information Systems of the National Library and Archives of Iran (NLAI). Documentary analysis, Tem analysis, and Fuzzy Delphi techniques were used to collect data. The research community includes the Information systems of the NLAI and experts in the field of information technology. The Information Systems consisted of Digital Library system, Iranian Newspaper System (SANA), National libraries network, National document center network, Iran Publications database, Manuscript database, Iranian Scientific Publications System. Also, 21 people (10 people to interview and 11 people to Delphi techniques) was selected experts in the fields of information systems, digital libraries, copyright and technology. For data analysis, coding and categorization of concepts were used in the form of open coding for documentary analysis and Tem analysis. Qualitative data analysis was done manually and using the MAXQDA 2020 software. Also, descriptive survey was used to analyze the indicators in fuzzy Delphi method and calculations were done using Excel. Tableau 2018 software was used to display and draw indicators better.
Therefore, using Tem analysis method, 70 indicators of preventive technical requirements were identified, and then these indicators were given to 11 experts, and after two rounds of the fuzzy Delphi panel, 69 indicators identify. These indicators included 12 components was carried out. Finally, indicators “Adobe Reader and other tools” was removed from the checklist. The use of different methods to collect technical indicators and the use of triangulation method gives credibility to the research. Network Security; standards and frameworks; Authentication; digital reading tools; digital preservation; payment systems; rights metadata; access control; copy control; License; Digital repository and transfer have formed 12 components of preventive technical requirements. Also, the findings of the research showed that digital and bibliographic systems were at a weak level in terms of taking advantage of preventive technical requirements for copyright. This study offered technical framework. Also, the use of technical requirements such as: look inside, the copyright of policy, rights metadata, development and updating of systems and communication and interaction with the software support company, METS standard and use of digital repository offered in the studied information systems.
Keywords
Subjects

فهرست منابع
آقاسیدجوادی، پریچهر، و مهدی علیپور حافظی. 1395. بهره‌گیری از فناوری مدیریت حقوق دیجیتالی در سامانه مدیریت پایان‌نامه‌های پژوهشگاه علوم و فناوری اطلاعات ایران. تعامل انسان و اطلاعات 3 (1): 20-32.
آموزگار، سیما، علیرضا نوروزی، و مریم صراف‌زاده. 1401. تحلیل مسائل و چالش‌های حق مؤلف منابع دیجیتالی متنی از دیدگاه مدیران کتابخانه‌های دیجیتالی شهر تهران. فصلنامه کتابداری و اطلاع‌رسانی 25 (1): 29-59.
پاپی، زینب. 1394. حق مؤلف در فضای سایبری با تأکید بر حقوق مؤلفان در جمهوری اسلامی ایران: ارائه الگوی پیشنهادی جهت اجرای حقوق سایبر مؤلفان پایان‌نامه‌ها در سامانه ملی پایان‌نامه‌ها. رساله دکتری، دانشگاه آزاد اسلامی واحد علوم و تحقیقات تهران.
تقوا، محمدرضا، و ماندانا ایزدی. 1392. بررسی امنیت در سیستم‌های اطلاعاتی توسعه‌یافته (SOA) با روش معماری سرویس‌گرا. مدیریت فناوری اطلاعات 5 (3): 25-42.
حبیبی، آرش، و صنم آفریدی. ۱۴۰1. تصمیم‌گیری چندشاخصه. تهران: انتشارات نارون.
حریری، نجلا، و زهرا نظری. 1391. امنیت اطلاعات در کتابخانه‎های دیجیتالی ایران. کتابداری و اطلاع‌رسانی 15 (2): 61-90.
رحمانی، سحر. 1390. نظام مدیریت دیجیتال (DRM) و حمایت از آثار ادبی و هنری با استفاده از آن. پایان‌نامه کارشناسی ارشد، دانشگاه قم.
سازمان ملی استاندارد ایران. 1394. فناوری اطلاعات- فنون امنیتی- سامانه مدیریت امنیت اطلاعات- الزامات: ایزو آی‌ای‌سی 27001. تهران: سازمان ملی استاندارد ایران.
کمالی، یحیی. 1397. روش‌شناسی تحلیل مضمون و کاربرد آن در مطالعات سیاست‌گذاری عمومی. فصلنامه علمی-پژوهشی سیاست‌گذاری عمومی 4 (2): 189-208.
کوکبی، مرتضی، و منصور کوهی رستمی. 1394. امنیت اطلاعات سامانه‌های تحت وب نهاد کتابخانه‌های عمومی کشور. فصلنامه تحقیقات اطلاع‌رسانی و کتابخانه‌های عمومی 21 (1): 89-107.
مدنی بروجنی، سید احمد، و احمدرضا نصر. 1388. سه‌سوسازی: راهبردی برای نوآوری در پژوهش‌های آموزشی. فصلنامه نوآوری‌های آموزشی 30 (8): 53-73.
نوروزی، علیرضا. 1381. حقوق مالکیت فکری: حق مؤلف و مالکیت صنعتی. تهران: نشر چاپار.
نوروزی، یعقوب.1390. محورهای توسعه کتابخانه‌های دیجیتالی. فصلنامه تحقیقات اطلاع‌رسانی و کتابخانه‌های عمومی 17 (3، پیاپی 64): 129-153.
References
Abu Sirhan, A., K. M. Abdrabbo, S. Ahmed Ali Al Tawalbeh, M. Hamdi Ahmed, and M. Ali Helalat. 2019. Digital rights management (DRM) in libraries of public universities in Jordan", Library Management 40 (8/9): 496-502. https://doi.org/10.1108/LM-05-2018-0044 (accessed November 24, 2021).  
Albatli, L, S. Aldossary, F. Almhdood, B. Alhothail, M. Alshimer, Sh. Alotaibi, R. lqahtani, et al. 2023. Comparison between Windows and Linux Operating System by Analyzing the Related Security Features. Journal Not Specified. https://www.mdpi.com/journal/notspecified (accessed June 23, 2023). 
Batt, S., T. Grealis, O. Harmon, & P. Tomolonis. 2020. Learning Tableau: A data visualization tool, The Journal of Economic Education 51:3-4, 317-328, DOI: 10.1080/00220485.2020.1804503 (accessed November 5, 2022).
Conroy, M. 2006. A comparative study of technological protection measures in copyright law. PhD diss., University of South Africa.
Crews, K. 2008. Study on copyright limitations and exceptions for libraries and archives. Presented at 17th STANDING COMMITTEE ON COPYRIGHT AND RELATED RIGHTS, WIPO. Geneva.
Day, J. M. 2017. Proxy Servers: Basics and Resources. https://libtechlaunchpad.com/2017/04/25/proxy-servers-basics-and-resources/ (accessed June 17, 2023).
Digital Rights Management and Technical Protection Measures. 2006. https://www.priv.gc.ca/resource/fs-fi/02_05_d_32_e.asp (accessed November 24, 2021).
European Commission. 2011. Information System Security Policy C (2006) 3602: STANDARD ON ACCESS CONTROL AND AUTHENTICATION. https://b2n.ir/a06212 (accessed November 13, 2022).
Hassanein, M. S., & Gh. Ghinea. 2013. Fingerprint Scheme for Digital Text. International Journal Multimedia and Image Processing (IJMIP) 3 (3/4), DOI:10.20533/ijmip.2042.4647.2013.0021 (accessed 27 August. 2022).
Huiming, Ch. 2021. Research on Limitations and Exceptions of Technical Measures for Long-term Preservation of Library Digital Resources: Considerations Based on the “Technical Path” of Copyright Protection [J]. Libraly Journal 40 (1): 48-56.
Jean-Mary, Ch. 2020. An Overview of X.509 Certificates, https://www.ibm.com/support/pages/system/files/inline- files/An_Overview_of_x.509_certificates.pdf (accessed November 24, 2021).
Keplinger, M. 2001. Part 1: Technological Measures for Protection of and Related Rights on the Internet- Present and Future Technologies, Part II: Enforcement of copyright and Related Rights in Digital Networks, the Technology and Its possibilities for Infringement and Surveillance. The Enforcement Rules under the WCT and the WPPT. Presented at Regional Workshop for countries of Asia and the Pacific on the WIPO Internet Treaties and Electronic commerce by WIPO. Manila.
OCLC. 2023. Streamline and secure access to e-resources. https://www.oclc.org/en/ezproxy.html (accessed June 17, 2023).
Rathje, B. D, M. McGrory, C. Pollitt, & P. Voutilainen. 2005. Designing and Building Integrated Digital Library Systems – Guidelines. IFLA Professional Reports. International Federation of Library Associations and Institutions. https://b2n.ir/u07812 (accessed June 25, 2023).
Skalka, Ch. 2005. Programming languages and systems security. THE IEEE COMPUTER SOCIETY. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1439509 (accessed June 5, 2023).
Stabingis, L., L. Šarlauskiene, N. and Čepaitien. 2014. Measures for plagiarism prevention in students’ written works: case study of ASU experience. Procedia - Social and Behavioral Sciences 110 (2014): 689 – 699.
Technological Protection Measures and the Copyright Amendment Act 2006. The Official Guide to Copyright Issues for Australian Schools and TAFE.
www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/num_act/caa2006213/sch12.html (accessed November 5, 2023).
Wazirali, R., R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh. 2021. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021, 10, 1744. https:// doi.org/10.3390/electronics10141744 (accessed November 24, 2021).

  • Receive Date 25 June 2023
  • Revise Date 16 July 2023
  • Accept Date 18 July 2023