DOI QR코드

DOI QR Code

The Value of Personal Information: An Exploratory Study for Types of Personal Information and Its Value

  • Minjung Park (School of Business, Ewha Womans University) ;
  • Sangmi Chai (School of Business, Ewha Womans University)
  • 투고 : 2018.04.10
  • 심사 : 2018.08.01
  • 발행 : 2018.09.29

초록

As the number of online privacy incidents are increasing, lawsuits related with personal information infringements have been also growing as well. However, there are large differences between a plaintiff and a defendant to determine the amount of payment for damages from the incident. After the verdict was made, a plaintiff is not satisfied with the amount of compensation, whereas a defendant usually tries to their best to reduce the payment amount. This is because the value for personal information are hardly assessed exactly. In addition, there is no criteria for calculating the price of the information itself. Since the development of information technology enables the firms could collect and use any piece of information to identify a particular individual, the range of personal information has been also broadening. Based on these phenomenon, this study tries to grouping the types of personal information and exploring the perceived value of types of information. Therefore, this study could provide a foundation for narrowing the gap of the value of personal information between the firm and the defendant. Through AHP (Analytic Hierarchy Process), this study finds out that people usually value more on biometrics information, medical records, and criminal records whereas weigh less for email address and date of birth.

키워드

참고문헌

  1. Acquisti, A. (2004). Privacy and security of personal information. Economics of Information Security, 179-186. 
  2. Bansal, G., Zahedi, F. M., and Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1-21.  https://doi.org/10.1016/j.im.2015.08.001
  3. Byun, D. H. (1999). AHP Model for Evaluating EIS Software Packages. Asia Pacific Journal of Information Systems, 9(3), 75-92. 
  4. Chiu, W., Lee, Y., and Lin, T. (2010). Performance evaluation criteria for personal trainers: An analytical hierarchy process approach. Social Behavior and Personality: An International Journal, 38(7), 895-905.  https://doi.org/10.2224/sbp.2010.38.7.895
  5. Cranor, L. F., Reagle, J., and Ackerman, M. S. (2000). Beyond concern: Understanding net users' attitudes about online privacy. The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, 47-70. 
  6. Han, J., Kang, S. B., and Moon, T. S. (2013). An empirical study on perceived value and continuous intention to use of smart phone, and the moderating effect of personal innovativeness. Asia Pacific Journal of Information Systems, 23(4), 53-84.  https://doi.org/10.14329/apjis.2013.23.4.053
  7. Ham, S., and Park, D. (2017). Study on policies for national cybersecurity. Journal of the Korea Institute of Information and Communication Engineering, 21(9), 1666-1673.  https://doi.org/10.6109/JKIICE.2017.21.9.1666
  8. Ishizaka, A., and Lusti, M. (2006). How to derive priorities in AHP: A comparative study. Central European Journal of Operations Research, 14(4), 387-400.  https://doi.org/10.1007/s10100-006-0012-9
  9. IGP, C., and CIPP, C. (2016). EU privacy regulations' impact on information governance. Information Management, 50(1), 20. 
  10. Janczewski, L., and Shi, F. X. (2002). Development of information security baselines for healthcare information systems in new zealand. Computers & Security, 21(2), 172-192.  https://doi.org/10.1016/S0167-4048(02)00212-2
  11. Jung, W., and Lee, S. T. (2015). What affects the value of information privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305.  https://doi.org/10.14329/apjis.2015.25.2.289
  12. Kashyap, R., and Bojanic, D. C. (2000). A structural analysis of value, quality, and price perceptions of business and leisure travelers. Journal of travel research, 39(1), 45-51.  https://doi.org/10.1177/004728750003900106
  13. Ko, K., and Ha, H. (2008). Meta analysis of the utilization of analytic hierarchy process for policy studies in korea. Korean Policy Studies Review, 17(1), 287-313. 
  14. Krishnamurthy, B., and Wills, C. E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM Workshop on Online Social Networks, 7-12. 
  15. Kwon, H., Lee, E., Kim, T., and Jun, H. (2012). Estimating compensation for personal information infringement in korea using contingent valuation methods. Journal of the Korea Institute of Information Security and Cryptology, 22(2), 367-377.  https://doi.org/10.13089/JKIISC.2012.22.2.367
  16. Lipovetsky, S., and Conklin, W. (2015). AHP priorities and the markov-chapman-kolmogorov steady-states probabilities. International Journal of the Analytic Hierarchy Process, 7(2), 349-363.  https://doi.org/10.13033/ijahp.v7i2.243
  17. Liu, C., Ang, R. P., and Lwin, M. O. (2016). Influences of narcissism and parental mediation on adolescents' textual and visual personal information disclosure in Facebook. Computers in Human Behavior, 58, 82-88.  https://doi.org/10.1016/j.chb.2015.12.060
  18. McCallister, E., Grance, T., and Scarfone, K.A. (2010). SP 800-122-Guide to protecting the confidentiality of personally identifiable information, Technical Report. 
  19. Montes, R., Sand-Zantman, W., and Valletti, T. (2015). The value of personal information in markets with endogenous privacy (No. 851). Institut d'Economie Industrielle (IDEI), Toulouse. 
  20. Nowak, G. J., and Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when "privacy" matters. Journal of Direct Marketing, 9(3), 46-60.  https://doi.org/10.1002/dir.4000090307
  21. Park, K. A., Lee, D. Y., and Koo, C. (2014). A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks. Asia Pacific Journal of Information Systems, 24(3), 299-323.  https://doi.org/10.14329/apjis.2014.24.3.299
  22. Park, J., Kewon, E., Park., M, and Chai, S. (2017). The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties. Information Systems Review, 19(3), 155-177.  https://doi.org/10.14329/isr.2017.19.3.155
  23. Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.  https://doi.org/10.1509/jppm.19.1.27.16941
  24. Saaty, T. L. (1977). A scaling method for priorities in hierarchical structures. Journal of Mathematical Psychology, 15(3), 234-281.  https://doi.org/10.1016/0022-2496(77)90033-5
  25. Saaty, T. L. (1994). How to make a decision: The analytic hierarchy process. Interfaces, 24(6), 19-43.  https://doi.org/10.1287/inte.24.6.19
  26. Saaty, T. L. (2003). Decision-making with the AHP: Why is the principal eigenvector necessary. European Journal of Operational Research, 145(1), 85-91.  https://doi.org/10.1016/S0377-2217(02)00227-8
  27. Schoch, T. P. (2016). EU privacy regulations' impact on information governance. Information Management Journal, 50(1), 20-25. 
  28. Shinyoung Park, "Financial related personal information Commercial transactions must be allowed", 2018.03.30, Retrieved from http://news.hankyung.com/article/201803308 
  29. Simoens, K., Bringer, J., Chabanne, H., and Seys, S. (2012). A framework for analyzing template security and privacy in biometric authentication systems. IEEE Transactions on Information Forensics and Security, 7(2), 833-841.  https://doi.org/10.1109/TIFS.2012.2184092
  30. TAHAOGLU, O. O. (2009). Personal data protection in Turkey: An information technology framework indented for privacy risk management (Doctoral dissertation, DEu Fen Bilimleri Enstitusu). 
  31. Tasidou, A., Efraimidis, P. S., and Katos, V. (2009). Economics of personal data management: Fair personal information trades. International Conference on E-Democracy, 151-160. 
  32. Terzi, D. S., Terzi, R., and Sagiroglu, S. (2015). A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference (pp. 202-207). IEEE. 
  33. Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480.  https://doi.org/10.1016/j.giq.2016.06.004
  34. Wind, Y., and Saaty, T. L. (1980). Marketing applications of the analytic hierarchy process. Management Science, 26(7), 641-658.  https://doi.org/10.1287/mnsc.26.7.641
  35. Yoo, J., Jie, S. H., and Lim, J. (2009). Estimating Direct Costs of Enterprises by Personal Information Security Breaches. Journal of the Korea Institute of Information Security and Cryptology, 19(4), 63-75.  https://doi.org/10.13089/JKIISC.2009.19.4.63
  36. Yu, M. M., Ting, S. C., and Chen, M. C. (2010). Evaluating the cross-efficiency of information sharing in supply chains. Expert Systems with Applications, 37(4), 2891-2897.  https://doi.org/10.1016/j.eswa.2009.09.048
  37. Personal Information Definition. Retrieved February 21, 2018, from www.PrivacySense.net 
  38. Chosunbiz, 2018.02.17 Retrieved from http://biz.chosun.com/site/data/html_dir/2017/02/17/2017021701092.html?rsMobile=false 
  39. Yonhapnews, 2016.07.28 Retrieved from http://www.yonhapnews.co.kr/bulletin/2016/07/27/0200000000AKR20160727136900002.HTML