Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.10.049

A Study on the Privacy Awareness through Bigdata Analysis  

Lee, Song-Yi (Department of Information Technology and Law, Dankook University)
Kim, Sung-Won (Department of Information Technology and Law, Dankook University)
Lee, Hwan-Soo (Department of Convergence Security, Dankook University)
Publication Information
Journal of Digital Convergence / v.17, no.10, 2019 , pp. 49-58 More about this Journal
Abstract
In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.
Keywords
Privacy; Awareness; Big data; Text-mining; News;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 G. B. Kwon, H. J. Lee & I. Kim. (2018). The Study on Legislation Process of GDPR(General Data Protection Regulation) and Subsequent Trend in EU System, Studies on American Constitution, 29(1), 1-38.
2 T. Oh & J. Yu. (2011). Change of privacy concept in social network service (SNS) environment, KISDI, 23(4), 26-42.
3 J. L. Yu. (2011). Personal Information Protection in Digital Era - Reviewing Personal information protection Act, Journal of Digital Convergence, 9(6), 81-90. UCI : G704-002010.2011.9.6.022   DOI
4 K. Lee. (2014). Privacy Protection in the Big Data Age, Company Ethics Briefs, 11, 1-26.
5 M. Park. (2018). GDPR, Microsoft's commitment to privacy and customer data management, Microsoft, https://news.microsoft.com/ko-kr
6 Y. Jung. (2001). Review of the Theory of Privacy in Modern Constitutional Law, Journal of Cybercommunication Academic Society, 7, 214-267.
7 S. D. Warren & L. D. Brandeis (1890). The right to privacy, Harvard Law Review, 4(5), 193-220.   DOI
8 A. F. Westin. (1967). Privacy and Freedom, Atheneum. York: Ig Publishing.
9 E. J. Bloustein. (1964). Privacy as an Aspect of Human Dignity: An answer to Dean Prosser, New York University Law Review, 39, 962-1007.
10 Y. H. Son. (2014). The Protection of Personal Information in the Era of Big Data, Business Law Review, 28(3), 355-393. UCI : G704-001299.2014.28.3.003
11 G. Moon. (2019). Survive the privacy of the Internet, Security News, https://www.boannews.com
12 S. Sung. (2004). Cyber space and privacy, KISDI.
13 Supreme Court. (1998.7.24.). Sentence, 96Na42789 Judgement.
14 T. M. Cooley. (1888). A Treatise on the Law of Torts or the Wrongs Which Arise Independently of Contract, Chicago : Callaghan and Company.
15 K. Cho. (2005). Statutory Development of Privacy in the United States, Sungkyunkwan Law Review, 17(3), 75-113. UCI : G704-001437.2005.17.3.013
16 A. Westin. (1970). Privacy and Freedom. (first edition 1967). Atheneum, New York.
17 ITWorld. (2018). Chinese data confidentiality protection law came into effect similar to China's GDPR in May, http://www.itworld.co.kr
18 J. Kim & S. Kim. (2015). A Study on Privacy Paradox from the Behavioral Economics Perspective, Informatization Policy, 22(3), 16-35. DOI : 10.22693/NIAIP.2015.22.3.016   DOI
19 J. B. Young. (1978). Privacy. Wiley, Chichester, UK, Cambridge University. DOI : https://doi.org/10.1017/S0047279400009223
20 I. S. Ham. (2016). The Enactment of 2016 General Data Protection Regulation(GDPR) in the EU and its Implications, Chonnam Law Review, 36(3), 411-453. UCI : G704-002100.2016.36.3.018
21 M. Cho & H. Lee. (2017). Improvement Issues of Personal Information Protection Laws through Meta-Analysis, Journal of Digital Convergence, 15(9), 1-14. DOI : https://doi.org/10.14400/JDC.2017.15.9.1   DOI
22 C. W. Park & J. W. Kim. (2015). An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, 13(4), 219-225. DOI : http://dx.doi.org/10.14400/JDC.2015.13.4.219   DOI
23 H. Jung. (2016). A Study on a Unique and Distinctive Culture(Law and Understanding) Regarding the Protections for Privacy in the U.S., Ilkam Law Review, 35, 277. DOI : 10.35148/ilsilr.2016..35.271   DOI
24 B. C. Kim. (2014). A study on Utilization of Big Data Based on the Personal Information Protection Act, Journal of Digital Convergence, 12(12), 87-92. DOI : 10.14400/JDC.2014.12.12.87   DOI
25 C. Chang. (2016). An Argument for Making Privacy a Working Constitutional Right - Referring to Daniel Solove's Pragmatic Theory -, Journal of Media Law, Ethics and Policy Research, 15(3), 1-30. UCI : G704-001997.2016.15.3.005
26 S. Petronio. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3), 218-222. DOI : https://doi.org/10.1080/00909880701422443   DOI
27 J. Kim & S. Kim. (2014). A Study on Privacy Paradox between Privacy Concern and Information Disclosure behavior: Focus on Privacy Calculus Theory, Entrue Journal of Information Technology, 13(3), 139-152. UCI : G704-001673.2014.13.3.007
28 H. J. Smith, T. Dinev & H. Xu. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. DOI : 10.2307/41409970   DOI
29 I. Altman. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Brooks/Cole Publishing Company, Monterey, California.
30 W. Zhou & S. Piramuthu. (2015). Information Relevance Model of Customized Privacy for IoT. Journal of Business Ethics, 131(1), 19-30. DOI : 10.1007/s10551-014-2248-y   DOI
31 H. S. Lee. (2016). Personal Characteristics and Information Privacy Concerns. Asia-pacific Journal of Multimedia Service Convergent with Art, Humanities, and Sociology, 6(9), 267-276. http://dx.doi.org/10.14257/AJMAHS.2016.09.46
32 K. Lee. (2009). Increased Internet privacy violation. The Science Times, https://www.sciencetimes.co.kr
33 A. Hotho, A. Nurnberger & G. Paass. (2005). A brief survey of text mining. In Ldv Forum, 20(1), 19-62.
34 H. K. Kong & H. J. Jun & S. U. Yoon. (2018). A Study on the Privacy Policy of Behavioral Advertising, Journal of the Korea Convergence Society, 9(3), 231-240. https://doi.org/10.15207/JKCS.2018.9.3.231   DOI
35 Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone, Journal of Convergence for Information Technology, 4(4), 13-18. https://doi.org/10.22156/CS4SMB.2014.4.4.013   DOI
36 D. Lee. (2019). One year of GDPR implementation, a different change than expected, ITWorld, http://www.itworld.co.kr
37 N. H. Sung, (2010). The Future of Digital Privacy. LG Economy Research Institute, http://www.lgeri.com/report/view.do?idx=16658
38 K. A. Kim. (2018). A Rise on the Privacy Protection based on Secret Code : Focus on Homomorphic Encryption. Boannews, https://www.boannews.com/media/view.asp?idx=74664
39 J. W. Mun. (2013). Protection of Privacy : From myth to norm. A Policy Reports for the Improvement of Legal Protection System in Personal Information.