Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.2.391

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center  

Ko, Yu-Mi (Graduate School of Information, Yonsei University)
Choi, Jae-Won (Graduate School of Information, Yonsei University)
Kim, Beom-Soo (Graduate School of Information, Yonsei University)
Abstract
This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.
Keywords
personal data; private information; privacy; data breach; data breach information center; framework;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 권영준, 남재현, 조민정, "개인신용평가에서의 비금융정보의 경제적 효과." 한국경제연구 29(2),pp. 81-107, 2011년 4월.
2 김동진, 조성제, "국가 DB기반의 국내외 보안취약점 관리체계 분석." Internet and Information Security 1(2), pp.130-147, 2010년 11월.
3 김범수 외, 스마트 시대 정보보호 전략과 법제도 I, 한국학술정보, 2011년 12월.
4 방송통신위원회, 한국인터넷진흥원, 2011년 인터넷 이용실태조사, 2012년 1월.
5 방송통신위원회, 한국인터넷진흥원, 2010 정보보호 실태조사-개인편, 2011년 5월.
6 방송통신위원회, 행정안전부, 지식경제부, 2011 국가정보보호백서, pp.17-18, 2011년 5월.
7 방영석, 이동주, 배윤수, 안재현, "인터넷 사용자들의 아이디/패스워드 사용실태에 대한 실증적 연구." 한국경영정보학회 춘계학술대회 논문집 2009(1), pp. 859-864, 2009년 6월.
8 보안뉴스, "230만명 개인정보 해킹, 도박광고에 활용 일당 구속.", 2009년 4월 16일 http:// www.boannews.com/media/view.asp?id x=15506.
9 이근영, 박태형, 임종인, "스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할." 정보보호학회논문지 21(5),pp.109-127, 2011년 10월.
10 이충훈, 고유미, 김범수, "개인정보 유출 시 통지.신고 프레임워크 및 가이드라인." 정보보호학회논문지 21(5), pp.169-179, 2011년 10월.
11 한국금융연구원, "미국 은행들의 온라인 해킹범죄 공동대응 강화." 주간 금융브리프 21(5), 2012년 2월.
12 Alavi, M., and Tiwana, A., "Knowledge Integration in Virtual Teams: The potential Role of KMS." Journal of the American Society for Information Science and Technology, vol.53, no.12, pp.1029- 1037, Oct. 2002.   DOI   ScienceOn
13 Bélanger, F., and Crossler, R. E., "Privacy in the Digital Age: A review of Information Privacy Research in Information Systems." MIS Quarterly, vol.35, no.4, pp.1017-1041, Dec. 2011,
14 Bock, G. W., Zmud, R. W., and Kim, Y. G., "Behavioral Intention Formation in Knowledge Sharing: Examing the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate." MIS Quarterly, vol.29, no.1, pp.87-111, Mar. 2005.
15 Choi, S. Y., Lee, H., and Yoo, Y., "The Impact of Information Technology and Transactive Memory Systems on Knowledge Sharing, Application, and Team Performance: A Field Study." MIS Quarterly, vol.34, no.4, pp.855-870, Dec. 2010.
16 Davenport, T. H., and Prusak, L., Working Knowledge, 2nd Ed., Boston: Harvard Business School Press, May. 2000.
17 Hoffman, D. L., Novak, T. P., and Peralta, M., "Building Consumer Trust in Online Environments: The Case for Information Privacy." Communications of ACM, vol.42, no.4, pp.80-85, Apr. 1999.   DOI   ScienceOn
18 Otto, P. N., A. I. Anton, and D. L. Baumer, "The ChoicePoint dilemma - How data brokers should handle the privacy of personal information." IEEE Security & Privacy, vol.5, no.5, pp.15-23, Sept.-Oct. 2007.
19 Romanosky, S., R. Telang, et al., "Do Data Breach Disclosure Laws Reduce Identity Theft?" Journal of Policy Analysis and Management vol.30, no.2, pp.256-286, Mar. 2011.   DOI   ScienceOn
20 Pee, L. G., Kankanhalli, A., and Kim, H. W., "Knowledge Sharing in Information Systems Development: A Social Interdependence Perspective." Journal of the Association for Information systems, vol.11, no.10, pp.550-575, Nov. 2010.
21 Sheehan, K. B., and Hoy, M. G., "Dimensions of Privacy Concern among Online Consumers." Journal of Public Policy and Marketing, vol.19, no.1, pp.62-73, Spring. 2000.   DOI   ScienceOn
22 Wiant, T. L., "Information Security Policy's Impact on Reporting Security Incident." Computers and Security, 24, pp.448-459, Sep. 2005.   DOI   ScienceOn