DOI QR코드

DOI QR Code

Construction of a Digitally Represented Person by Personal Data: A Multidimensional Framework from an Inforg Perspective

  • Jinyoung Min (Department of Industrial Security, Chung-Ang University) ;
  • HanByeol Stella Choi (Department of Management Information Systems, Myongji University) ;
  • Chanhee Kwak (Department of Artificial Intelligence Convergence, Kangnam University) ;
  • Junyeong Lee (Department of Management Information Systems, Chungbuk National University)
  • 투고 : 2023.09.18
  • 심사 : 2024.01.07
  • 발행 : 2024.03.31

초록

The amount of data a related to a person is so substantial that it appears that a digital version of them can be built thereon. They are usually handled as personal information, and the attempts made to understand personal information have led to bundling and unbundling of various data, yielding numerous fragmented categories of personal information. Therefore, we attempt to construct a generalizable lens for a deeper understanding of person-related data. We develop a theoretical framework that provides a fundamental method to understand these data as an entity of a digitally represented person based on literature review as well as the concepts of inforg and infosphere. The proposed framework suggests person-related data consist of three informational inforg dimensions that can preserve the archetype of a person, form, content, and interaction. Subsequently, the framework is examined and tested through several analyses in two different contexts: social media and online shopping mall. This framework demonstrates the suggested dimensions are interrelated with certain patterns, the prominent dimension can determine the data characteristics, and the dimensional composition of data types can imply the characteristics of the digitally represented person in certain contexts.

키워드

과제정보

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2019S1A5A2A03041910).

참고문헌

  1. Baelo-Allue, S. (2022). Technological Vulnerability in the Fourth Industrial Revolution: Don DeLillo's The Silence (2020). In Representing Vulnerabilities in Contemporary Literature (pp. 135-149): Routledge. 
  2. Beldad, A., De Jong, M., and Steehouder, M. (2011). I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions. Computers in Human Behavior, 27(6), 2233-2242. https://doi.org/10.1016/j.chb.2011.07.002 
  3. Brand, S. (1995). How Buildings Learn. London: Penguin Books. 
  4. Casemajor, N., Couture, S., Delfin, M., Goerzen, M., and Delfanti, A. (2015). Non-participation in digital media: toward a framework of mediated political action. Media, Culture & Society, 37(6), 850-866.  https://doi.org/10.1177/0163443715584098
  5. Chellappa, R. K., and Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Inf Technol Manage, 6(2-3), 181-202. https://doi.org/10.1007/s10799-005-5879-y 
  6. Chen, Y., and Xie, J. (2008). Online consumer review: Word-of-mouth as a new element of marketing communication mix. Management science, 54(3), 477-491. https://doi.org/10.1287/mnsc.1070.0810 
  7. Ester, M., Kriegel, H. P., Sander, J., and Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. Paper presented at the Kdd. 
  8. Faja, S., and Trimi, S. (2006). Influence of the web vendor's interventions on privacy-related behaviors in e-commerce. Communications of the Association for Information Systems, 17(1), 27. https://doi.org/10.17705/1CAIS.01727 
  9. Federal Trade Commission. (2000). Privacy online: Fair information practices in the electronic marketplace. Retrieved from Washington, DC: 
  10. Floridi, L. (1999). Information ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology, 1(1), 33-52. https://doi.org/10.1023/a:1010018611096 
  11. Floridi, L. (2002a). Information ethics: an environmental approach to the digital divide. Philosophy in the Contemporary World, 9(1), 39-45. http://dx.doi.org/10.2139/ssrn.3848486 
  12. Floridi, L. (2002b). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4(4), 287-304. https://doi.org/10.1023/A:1021342422699 
  13. Floridi, L. (2007). A look into the future impact of ICT on our lives. The Information Society, 23(1), 59-64. https://doi.org/10.1080/01972240601059094 
  14. Floridi, L. (2014). The Fourth Revolution: How the Infosphere is Reshaping Human Reality. OUP Oxford. 
  15. Fung, B. C., Wang, K., Chen, R., and Yu, P. S. J. A. C. S. (2010). Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4), 1-53. https://doi.org/10.1145/1749603.1749605 
  16. Goh, B. (2020). China rolls out fresh data collection campaign to combat coronavirus. Retrieved from https://www.reuters.com/article/us-china-health-data-collection-idUSKCN20K0LW 
  17. Huang, P., and Simmon-Duffin, s. (2020). White House Strips CDC Of Data Collection Role For COVID-19 Hospitalizations. Retrieved from https://www.npr.org/sections/health-shots/2020/07/15/891351706/white-house-strips-cdc-of-data-collection-role-for-covid-19-hospitalizations 
  18. Jin, S. A. A. (2013). Peeling back the multiple layers of Twitter's private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media & Society, 15(6), 813-833. https://doi.org/10.1177/1461444812471814 
  19. Jones, W. (2010). Keeping Found Things Found: The Study and Practice of Personal Information Management. Morgan Kaufmann. 
  20. Knijnenburg, B. P. (2018). Privacy in social information access. In P. Brusilovsky and D. He (Eds.), Social Information Access (pp. 19-74). Springer, Cham. 
  21. Liu, C., Marchewka, J. T., Lu, J., and Yu, C. S. (2005). Beyond concern-a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289-304. https://doi.org/10.1016/j.im.2004.01.003 
  22. Markos, E., Labrecque, L. I., and Milne, G. R. (2018). A new information lens: The self-concept and exchange context as a means to understand information sensitivity of anonymous and personal identifying information. Journal of Interactive Marketing, 42, 46-62. https://doi.org/10.1016/j.intmar.2018.01.004 
  23. Micheli, M., Lutz, C., and Buchi, M. (2018). Digital footprints: An emerging dimension of digital inequality. Journal of Information, Communication and Ethics in Society, 16(3), 242-251. https://doi.org/10.1108/JICES-02-2018-0014 
  24. Milne, G. R., Pettinico, G., Hajjat, F. M., and Markos, E. (2017). Information sensitivity typology: Mapping the degree and type of risk consumers perceive in personal data sharing. Journal of Consumer Affairs, 51(1), 133-161. https://doi.org/10.1111/joca.12111 
  25. Min, J., and Kim, B. (2015). How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. Journal of the Association for Information Science and Technology, 66(4), 839-857. https://doi.org/10.1002/asi.23206 
  26. Morley, J., Cowls, J., Taddeo, M., and Floridi, L. (2020). Public health in the information age: recognizing the infosphere as a social determinant of health. Journal of Medical Internet Research, 22(8), e19311. https://doi.org/10.2196/19311 
  27. Palfrey, J. G., and Gasser, U. (2011). Born digital: Understanding the first generation of digital natives: ReadHowYouWant.com. 
  28. Parkinson, B., Millard, D. E., O'Hara, K., and Giordano, R. (2018). The digitally extended self: A lexicological analysis of personal data. Journal of information science, 44(4), 552-565. https://doi.org/10.1177/0165551517706233 
  29. Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41. https://doi.org/10.1509/jppm.19.1.27.16941 
  30. Polonetsky, J., Tene, O., and Finch, K. (2016). Shades of gray: Seeing the full spectrum of practical data de-intentification. Santa Clara Law Review, 56, 593. 
  31. Robinson, C. (2017). Disclosure of personal data in ecommerce: A cross-national comparison of Estonia and the United States. Telematics and Informatics, 34(2), 569-582. https://doi.org/10.1016/j.tele.2016.09.006 
  32. Rumbold, J. M., and Pierscionek, B. K. J. B. d. r. (2018). What are data? A categorization of the data sensitivity spectrum. Big Data Research, 12, 49-59. https://doi.org/10.1016/j.bdr.2017.11.001 
  33. Russo, F. (2018). Digital technologies, ethical questions, and the need of an informational framework. Philosophy & Technology, 31(4), 655-667. https://doi.org/10.1007/s13347-018-0326-2 
  34. Shibchurn, J., and Yan, X. (2015). Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective. Computers in Human Behavior, 44, 103-117. https://doi.org/10.1016/j.chb.2014.10.059 
  35. Simone, C., Cerquetti, M., and La Sala, A. (2021). Museums in the Infosphere: Reshaping value creation. Museum Management and Curatorship, 36(4), 322-341. https://doi.org/10.1080/09647775.2021.1914140 
  36. Xie, E., Teo, H. H., and Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing letters, 17(1), 61-74. https://doi.org/10.1007/s11002-006-4147-1 
  37. Xu, L., Jiang, C., Wang, J., Yuan, J., and Ren, Y. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176. https://doi.org/10.1109/ACCESS.2014.2362522 
  38. Zastow, M. (2020). South Korea is reporting intimate details of COVID-19 cases: has it helped? Retrieved from https://www.nature.com/articles/d41586-020-00740-y