DOI QR코드

DOI QR Code

사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach

  • 정서화 (서울과학기술대학교 IT정책전문대학원 공공정책) ;
  • 조현석 (서울과학기술대학교 행정학과)
  • Jeong, Seo Hwa (Public Policy, Seoul National University of Science and Technology) ;
  • Cho, Hyun Suk (Dept. of Public Administration, Seoul National University of Science and Technology)
  • 투고 : 2014.03.10
  • 심사 : 2014.05.20
  • 발행 : 2014.05.28

초록

이 글은 한국에서 시기별 개인정보 유출에 대한 프레임이 어떤 형태로 변화하는지에 초점을 맞추고 있다. 이를 위하여 개인정보 유출이라는 텍스트가 등장하기 시작한 1984년도부터 현재까지 30년 간 걸쳐 보도된 신문기사의 제목을 수집하였다. 시기마다 형성되어 있는 지배적인 프레임을 도출하기 위하여 단순 빈도분석과 공동출현빈도 매트릭스 기반의 텍스트 네트워크 분석, 군집분석을 실시하였다. 사회연결망분석의 주요 지표인 연결중심성의 개념을 적용하여 시기별 주된 프레임을 밝혀내었다. 총 4시기에 걸쳐 프레임의 태동, 형성, 확장, 전환의 과정이 일어났는데, 개인정보에 대한 접근 및 보유주체가 주로 정부였다면 점차 전자상거래 등 고객맞춤형 서비스로 인해 민간 기업으로 확대되었다. 또한 초국가기업의 등장은 개인정보 유출의 경계를 자연스럽게 국내에서 국외로 확장시켰다. 빅데이터 시대의 엄청난 정보량과 데이터 생태계의 역동성은 새로운 정보보안위협으로 다가오고 있어 강력한 정보보호체계 설계가 시급함을 프레임의 전환을 통하여 보여주고 있다.

This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

키워드

참고문헌

  1. Hyun Suk Cho et al., Big data and risk information society: Seoul: Communications books, 2013.
  2. Lewicki, R., Gray, B., & Elliott, M., Making sense of intractable environmental conflicts: Concepts and cases, Washington, D.C.: Island Press, 2003.
  3. Entman, R., M., Framing: Toward Clarification of a Fractured Paradigm. Journal of Communication, Vol. 43, No. 4, pp. 51-58, 1993. https://doi.org/10.1111/j.1460-2466.1993.tb01304.x
  4. Gitlin, T., The whole world is watching: Mass media in the making & unmaking of the new left. Berkeley: University of California Press, 1980.
  5. Goffman, E., Frame analysis: An essay on the organization of experience. Boston: Northeastern University Press, 1974.
  6. Ik-Jae Chung, Risk perception and risk communication, Korea Public Administration Forum, Vol. 139, pp. 34-36, 2012.
  7. Young-Hee Kim, Sangkil Yoon, and Woonho Choi, The concept analysis related to journalism of the Korean editorials in the Daehan Maeilsinbo: A case study of the Corpus utilization. Korean Journal of Journalism & Communication Studies, Vol. 55, No.2, pp. 77-102, 2011.
  8. Pollak, S., Coesemans, R., Daelemans, W., and Lavrac, N., Detecting contrast patterns in newspaper articles by combining discourse analysis and text mining. Pragmatics, Vol. 21, No. 4, pp. 647-683, 2011. https://doi.org/10.1075/prag.21.4.07pol
  9. Han-Woo Park, Yeon-ok Lee, A Mixed Text Analysis of user comments on a portal site: The 'BBK' scandal' in the 2007 Presidential election of South Korea. Journal of the Korean Data Analysis Society, vol. 11, No. 2(B), pp. 731-744, 2009.
  10. Miah Kam, Min Song, A study on differences of contents and tones of arguments among newspaper using text mining analysis. Journal of Intelligence and Information Systems, Vol. 18, No. 3, pp. 53-77, 2012.
  11. Eujong Kim, Junho Choi, Sungjoon Lee, A comparative study on the spectrum policy issues in convergence environment semantic network analysis of news coverage in the U.S and S. Korea. International Telecommunications Policy Review, Vol. 17, N0. 4, pp. 107-139, 2010.
  12. Dong-Hoon Lee, Won-Young Kim, How does frame move the society? chapter .5(pp. 115-134). Samsung Economic Research Institute.
  13. Young-Chool Choi, Kwang-Koo Kim, A comparative analysis of the research trends in the study of public administration in Korea and the UK. Korean Comparative Government Review, Vol. 15, No. 1, pp. 1-26, 2011.
  14. Leydesdorff, L., The Construction and Globalization of the Knowledge Base in Inter-human Communication Systems. Canadian Journal of Communication, Vol. 28, No. 3, pp. 1-21, 2003.
  15. Han-Woo Park, Leydesdorff, L, Understanding the KrKwic: A computer program for the analysis of Korean text. Journal of the Koran Data Analysis Society, Vol. 6, No. 5, pp. 1377-1387, 2004.
  16. Dong-Won Sohn, Social Network Analysis. KyungMoonSa Press, 2002.
  17. Yong-Hak Kim, Social network analysis. Pakyoungsa Press, 2007.
  18. Fleiss, J. L., Measuring Nominal Scale Agreement among Many Raters. Psychological Bulletin, Vol. 76, No. 5, pp. 378-382.
  19. Byung-Nam Kang, Complex network society. Jipmoondang, 2010.
  20. National Information Society Agency, IT history, www.nia.or.kr/contents/01_data/allview/.
  21. Jun-Hyung Hong, A study on Legislation for the protection of privacy and personal information, Korean Computerization Agency, 2004.
  22. Chang-Bum Lee, Gyun-Sung Park, Hee-Jung Lee, Byung-Hyo Moon, Su-Tae Jang, A study on the major nation's information protection law and system of executive power, Korea Information Security Agency, 2007.
  23. Sang-Oh Yun, A study of personal information protection legislation for implementation of e-Government. Journal of The Korean Association for Regional Information Society, Vol. 12, No. 2, pp. 1-29, 2009.
  24. Kwang-Suk Lee, The phasic changes in the mode of dominance and the construction of big data-driven surveillance. Journal of Cybercommunication Academic Society, Vol. 30, No. 2, pp. 191-231, 2013.
  25. Gwang-Hyung Lee, China's cyber crime investigation. Institute of Justice, 2008.
  26. Ji-Hoon Kim, Si-Haeng Cho, Security threats of Cyber. Korea Institute of Information Security and Cryptology, Vol. 20, No. 4, pp. 11-20, 2010.
  27. Ki-Joo Lee, A proposal for personal information protection policy about threats of smart society. The Korean Institute of Communications and Information Sciences, Vol. 30, No. 1, pp.24-32.
  28. Sang-Kyu Rheem, Chang-Kil Lee, Jong-Eop Kim, The information Security risk of smart age and EU5's responses, Journal of Safety and Crisis Management, Vol. 7, No.4, pp. 135-150, 2011.