Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.10.015

An Analysis of Linguistic Characteristics of Information Protection Policies to Improve the Effectiveness of Information Protection in Cloud Computing Services  

Jeong, Eun-Han (Sysware Co., Ltd.)
Kim, Kyung-Ihl (Division of Convergence Management, Korea National University of Transportation)
Publication Information
Journal of Convergence for Information Technology / v.10, no.10, 2020 , pp. 15-23 More about this Journal
Abstract
It is a reality that users do not know well what kind of information protection policy the cloud service provider presents to consumers. The purpose of this study is to find a way to improve the effectiveness of information protection by analyzing the content and linguistic characteristics of information protection policies provided by cloud service providers. In order to achieve the purpose of this study, we investigate the contents of information protection policies of 47 companies that provide cloud services and analyze the influence of linguistic characteristics to come up with a plan to increase the efficiency of cloud services. The research results showed that low readability due to comprehensive expression of technical processing methods, etc., could lead to legal disputes and to hinder the spread of cloud services. The research results can increase the effectiveness of information protection by suggesting items to be provided to users.ing, Privacy, confidentiality, linguistic characteristics, Accounting Information.
Keywords
Clouding Computing; Privacy; Confidentiality; Linguistic characteristics; Accounting Information;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Pearson. (2009). Taking account of privacy when designng cloud computing services. In 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE. http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf
2 J. J. Collins. (2015). Online accounting systems: Accounting for cloud security. http://www.journalofaccountancy.com/issues/2015/sep/accounting-sytems-cloud-security.html
3 G. R. Miline & M. J. Culnan. (2004). Strategiesofr reducing online privacy risks: Why consumers read (or don't read) online privacy notices, Journal of Interactive marketing, 18(3), 15-29. DOI : 10.1002/dir.20009   DOI
4 P. Mell & T. Grance. (2011). The NIST definition of cloud computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
5 C. Rong, S. T. Nguyen & M. G. Jaatun. (2013). Beyonf lightning: A Survey on security challenges in cloud computing, Computers & Electrical Engineering, 39(1), 47-54. DOI: 10.1016/j.compeleceng.2012.04.015   DOI
6 E. McCallister, T. Grance & K. A. Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Vol. 800, No. 122). Diane Publishing. https://csrc.nist.gov/publication/nistpubs/800-122/sp800-122.pdf
7 A. K. VasanthaAzhagu & J. Gnanasekar. (2016). Cloud Computing Overview, Security Threats and Solutions-A Survey. Proceedings of the International Conference on Informatics and Analytics, Pondicherry, India, August 25-26.
8 H. Salcedo. (2014). Google Drive, Dropbox, Box and iCloud reach the top 5 cloud storage security breaches list, Hitachi http://psg.hitachi-solutions.com/credeon/blog/google-drive-droopbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list
9 N. Steinfield. (2016). "I agree to the terms and conditions": (How do users read privacy policies online? An eye-tracking experiment, Computers in Human Behavior, 55, 992-1000. DOI : 10.1016/j.chb.2015.09.038.   DOI
10 A. Seshagiri. (2013). Claims that Google violates Gmail user privacy, The NewYork Times (October 1). http://www.nytimes.com/interactive/2013/10/02/technology/google-email-case.html
11 H. N. Chua, A. Herbland, S. F. Wong & Y. Chang. (2017). Compliance to personal data protection principles: A Study of how organizations frame privacy policy notices, Telematics and Informatics, 34(4), 157-170. DOI : 10.1016/j.tele.2017.01.008.   DOI
12 K. W. Wu, S. Y. Huang, C. Yen & I. Popova. (2012). The effect of online privacy on consumer privacy concern and trust, Computers in Human Behavior, 28(3), 889-897. DOI : 10.1016/j.chb.2011.12.008   DOI
13 S. Bradshaw, C. Millard & I. Walden. (2011). Contracts of clouds : Comparisionand analysis of the Terms and Conditions of cloud computing services, International Journal of Law and Information Technology, 19(3), 187-223. DOI : 10.1093/ijlit/ear005   DOI
14 H. S. Asay, W. B. Elliott & K. Rennekamp. (2017). Disclosure readability and the sensitivity of invsetors' valuation judgements to outside information, The Accounting Review 92(4), 1-25. DOI : 10.2308/accr-51570.   DOI
15 S. Goel & J. Gangolly. (2012). Beyond the numbers: Mining the annual reports for hidden cues indicative of financial statement fraud, Intelligent Systems in Accounting, Finance & Management 19(2), 75-89. DOI : 10.1002/isaf.1326.   DOI
16 V. L. Rubin, E. D. Liddy & N. Kando. (2006). Certainty identification in texts: Categorixation model and manual tagging results. In Computing Attitude and Affect in Text: Theory and Applications, 61-76. Dordrecht, The Netherlands: Springer.
17 E. Henry. (2006). Market reaction to verval components of earnings press releases: Event study using a predictive algorithm, Journal of Emerging Technologies in Accounting 3(1), 1-19. DOI : 10.2308/jeta.2006.3.1.1.   DOI
18 R. Chun. (2017). How virtuous global firms say they are: A content analysis of ethical values, Journal of Business Ethics, 155(1), 57-73. DOI : 10.1007/s10551-017-3525-3.   DOI
19 F. Shajzad. (2014). State of the art survey on cloud computing security. Challenges, approaches and solutions. Procedia Computer Science, 37, 357-362. DOI: 10.1016/j.procs.2014.08.053   DOI
20 C. Modi, D. Patel, B. Borisaniya A. Patel & M. Rajarajan. (2013). A Survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, 62(2), 561-592. DOI : 10.1007/s11227-012-0831-5.
21 T. Loughran & B. McDonald. (2014). Measuring readability in financial disclosures, The Journal of Finance, 69(4), 1643-1671. DOI : 10.1111/jofi.12162.   DOI