DOI QR코드

DOI QR Code

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Received : 2016.07.19
  • Accepted : 2016.09.28
  • Published : 2016.10.31

Abstract

This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Keywords

References

  1. eshwang, Mobile learning management systems utilize integrated information, Graduate School of Korea University, 2011.
  2. bckim, "A study on Utilization of Big Data Based on the Personal Information Protection Act", The Society of Digital Policy & Management, 12(12), pp. 87-92, Dec. 2014.
  3. sjkang, "Bigdata Ethics", Hanbit Media e-book, 2013.
  4. Protect Privacy of the Bigdata era, http://lugenzhe.blog.me/90159790578
  5. National Legal Information Center, http://www.law.go.kr
  6. NaverWikipedia, http://terms.naver.com/entry.nhn?docId=1691554&cid=42171&categoryId=42183
  7. Computer World, http://www.comworld.co.kr/news/articleView.html?idxno=45899
  8. IT DAILY, http://www.itdaily.kr/news/articleView.html?idxno=62928
  9. Information Communication Ethics, "Security Ethics", Seoul:Ehanmedia, 2015.
  10. hjpark, dylee, A Study on Information Sharing Behavior and Utility of Internet Users, Korea Society for Information Management Conference, pp. 151-156, 2005.
  11. jhkim, Golobal social media trends deployment, national Industry Promotion Agency IT Report, 2013.
  12. Korea Internet Safety Commission, "Security Code", Ehanmedia, 2015.
  13. wychoi, Study on the User Empowerment of the Information and Technological Regulation of the Internet : Political Implications of the Technological Principle and Structure of the ICRS(Internet Content Rating System), 10(1), pp. 189-199, 2005.
  14. sychoi, trends and countermeasures for the mobile malicious code disseminate, Korean Society of Computer Information Semiannual, 22(1), 2014.
  15. Weitzner. Daniel J., Yelling "Filter" on the Crowded Net: The Implications of User Control Technologies. in Price. Monrce E(ed.) The V-Chip Debate: Content Filtering from Television to the Internet. Lawrence Elbaum Associates. Inc, 1998.
  16. jykim, IoT Activation Plan, Korean Society of Computer Information Semiannual, 23(1), 2015.
  17. NIA, BigData World Report, http://nia.or.kr.