Browse > Article
http://dx.doi.org/10.13088/jiis.2014.20.1.177

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective  

Kim, Minsu (Graduate School of Information, Yonsei University)
Choi, Jaewon (Department of Business Administration, Global Business School, Soonchunhyang University)
Kim, Hyun Jin (National Information Society Agency)
Publication Information
Journal of Intelligence and Information Systems / v.20, no.1, 2014 , pp. 177-193 More about this Journal
Abstract
Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.
Keywords
Co-authored Network; Social Network Analysis; Personal Privacy; Expert Network;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Bozeman, B. and E. Corley, "Scientists collaboration strategies: implications for scientific and technical human capital," Research Policy, Vol.33, No. 4(2004), 599-616.   DOI   ScienceOn
2 Bradford, S. C., "Sources of information on specific subjects," Journal of Information Science, Vol.10, No. 4(1985), 173-180.   DOI
3 Cho, E. S. and J. D. Song, "What kinds of articles are cited more in Korea?," Korean Marketing Association, Vol.28, No. 4(2013), 33-56.
4 Cho, M. H. and L. S. Kim, "Study on Development of Capability Diagnosis Model and Indicators for Research Organizations," Government and policy, Vol.2, No. 2(2010), 77-107.
5 Cohen, J., P. Cohen, S. G. West, and L. S. Aiken, Applied multiple regression/ correlation analysis for the behavioral sciences, 3rd edition., Hillsdale, NJ: Erlbaum, 2003.
6 Dannefer, D., "Cumulative advantage/disadvantage and the life course: cross- fertilizing age and social science theory," Journals of Gerontology Series B Psychological Sciences and Social Sciences, Vol.58, No.6 (2003), 327-337.   DOI
7 Hilbe, J. M., Negative binomial regression, Cambridge, New York: Cambridge University Press, 2007.
8 Kim, Y. H., J. R. Yoon, H. S. Cho, and Y. J. Kim, "Structure of Collaboration Network among Korean Scientists - 'Small World' and Position Effect," Korean journal of sociology, Vol. 41, No. 4(2007), 68-103.
9 Huang, M. H., J. H. Ahn and J. J. Jahng, "Patterns of Collaboration Networks : Co- authorship Analysis of MIS Quarterly from 1996 to 2004," Journal of Society for e-Business Studies, Vol.13, No.4(2008), 193-207.
10 Kadushin, C., Understanding Social Networks: Theories, Concepts, and Finding, Oxford University Press, 2012.
11 Kim, Y. H., Y. J. Kim, and Y. S. Kim, "The Structure of Production and Diffusion of Knowledge in Korean Communication Studies," Korean journal of journalism & communication studies, Vol.52, No.1(2008), 117-140.
12 Kim, Y. H., Social Network Analysis, Pakyoungsa, 2011.
13 Lee, W. H., Y. C. Seok and J. C. Park, "Detecting Emerging Technology to Use Social Network Analysis: Focusing on Mobile Telecommunication," Journal of information systems, Vol.21, No. 4(2012), 109-132.   DOI   ScienceOn
14 Lim, H. S. and T. W. Chang, "A Study on Co-authorship Network in the Journals of a Branch of Logistics", IE Interface, Vol.25, No. 4(2012), 458-471.   DOI   ScienceOn
15 Lee, C. G., M. J. Sung, and Y. B. Lee, "Discovering Customer Service Cool Trends in e-Commerce: Using Social Network Analysis with NodeXL," Information Systems Review, Vol. 13, No. 1(2011), 75-96.
16 Lee, C. M., S. G. Lee, and B. S. Lee, "A Study of the Intelligent Researcher Connection Network Build-up that Merges the Recommendation System and Social Network," Journal of information management, Vol.40, No.1(2009), 199-215.   DOI   ScienceOn
17 Leem, B. H., "An Effect of Co-authorship Network on Research Performance: Focusing on Co-authoring of Logos Management Review," Logos management review, Vol.10, No. 1(2011), 1-20.
18 Lomax, K. S., "Business failures. Another example of the analysis of failure data", Journal of the American Statistical Association, Vol. 49 (1954), 847-852.   DOI
19 Lotka, A. J., "The frequency distribution of scientific productivity," Journal of the Washington Academy of Sciences, Vol.16, No. 12(1926), 317-324.
20 Namn, S. H. and S. S. Seol, "Co-authorship Analysis of Innovation Studies in Korea: A Social Network Perspective," Journal of Korea technology innovation society, Vol.10, No.4(2007), 605-628.
21 Nordstrom, L. O., "Bradford's law and relationship between ecology and biogeography," Scientometrics, Vol.18, No. 3-4(1990) 193-203.   DOI
22 Park, S. W., E. J. Choi, M. S. Park, J. G. Kim, E. S. Seo, and Y. T. Park, "An Expert Recommendation System using Ontologybased Social Network Analysis," Journal of KIISE, Vol.15, No. 5(2009), 390-394.
23 Wade, J. B., J. F. Porac and T. G. Pollock, "Worth, words and the justification of executive pay," Journal of Organizational Behavior, Vol.18, No. 7(1997), 641-664.   DOI
24 Park, Y. S., Y. J. Cho, and J. H. Cheong, "A Study on Architectural Expert Network using Social Network Analysis - Focused on Researcher Network in the Field of BIM Technology," Review of architecture and building science, Vol. 26, No. 10(2010), 147-154.
25 Park, H. W., "International Scientific and Scholarly Communication Networks on World Wide Web," Journal of the Korean Society for Library and Information Science, Vol.37, No. 2(2003), 153-168.   DOI   ScienceOn
26 Sohn, D. W., Social Network Analysis, Kyungmoon publishers, 2008.
27 Watts, D. J, "Networks, Dynamics, and the Small-World Phenomenon," American Journal of Sociology, Vol.105, No. 2(1999), 493-527.   DOI   ScienceOn
28 Wi, C. K., H. J. Kim and S. J. Lee, "A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis," Journal of the Korean Institute of Information Security and Cryptology, Vol. 22, No. 4(2012), 851-868.