View analysis of personal information leakage and privacy protection in big data era-based on Q method

被引:9
|
作者
Huang, Lei [1 ]
Zhou, Jingyi [2 ]
Lin, Jiecong [1 ]
Deng, Shengli [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Wuhan Univ, Sch Informat Management, Wuhan, Peoples R China
关键词
Q method; Information leakage; Privacy protection; View; Subjectivity; SELF-DISCLOSURE; ONLINE PRIVACY; FACEBOOK; INTENTION; POLICY; PERSPECTIVES; ANTECEDENTS; STRATEGIES; PARADOX; SNS;
D O I
10.1108/AJIM-05-2021-0144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big data technology. Furthermore, people's views on personal information leakage and privacy protection are varied, playing an important role in the legal process of personal information protection. Therefore, this paper aims to propose a semi-qualitative method based framework to reveal the subjective patterns about information leakage and privacy protection and further provide practical implications for interested party. Design/methodology/approach Q method is a semi-qualitative methodology which is designed for identifying typologies of perspectives. In order to have a comprehensive understanding of users' viewpoints, this study incorporates LDA & TextRank method and other information extraction technologies to capture the statements from large-scale literature, app reviews, typical cases and survey interviews, which could be regarded as the resource of the viewpoints. Findings By adopting the Q method that aims for studying subjective thought patterns to identify users' potential views, the authors have identified three categories of stakeholders' subjectivities: macro-policy sensitive, trade-offs and personal information sensitive, each of which perceives different risk and affordance of information leakage and importance and urgency of privacy protection. All of the subjectivities of the respondents reflect the awareness of the issue of information leakage, that is, the interested parties like social network sites are unable to protect their full personal information, while reflecting varied resistance and susceptibility of disclosing personal information for big data technology applications. Originality/value The findings of this study provide an overview of the subjective patterns on the information leakage issue. Being the first to incorporate the Q method to study the views of personal information leakage and privacy protection, the research not only broadens the application field of the Q method but also enriches the research methods for personal information protection. Besides, the proposed LDA & TextRank method in this paper alleviates the limitation of statements resource in the Q method.
引用
收藏
页码:901 / 927
页数:27
相关论文
共 50 条
  • [1] Research on the Protection of Personal Privacy of Tourism Consumers in the Era of Big Data
    Wang, Chunyan
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2018), 2018, : 428 - 431
  • [2] Administrative law protection of personal information in the big data era
    Zhang, Shan
    Song, Yunfei
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 211 - 211
  • [3] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    [J]. INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22
  • [4] Network Information Security Privacy Protection System in Big Data Era
    Ma, Lei
    Kang, Ying-jian
    Liu, Jian-ping
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 65 - 73
  • [5] Privacy Cost Analysis and Privacy Protection Based on Big Data
    周蔷
    岳开旭
    段垚
    [J]. Journal of Donghua University(English Edition), 2019, 36 (01) : 96 - 105
  • [6] Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era
    Tanimoto, Shigeaki
    Totsuka, Shun
    Iwashita, Motoi
    Seki, Yoshiaki
    Sato, Hiroyuki
    Kanai, Atsushi
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 737 - 749
  • [7] Research on Location Information and Privacy Protection Based on Big Data
    Yu, Juan
    [J]. 2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 226 - 229
  • [8] Big data privacy: The datafication of personal information
    Mai, Jens-Erik
    [J]. INFORMATION SOCIETY, 2016, 32 (03): : 192 - 199
  • [9] Personal big data pricing method based on differential privacy
    Shen, Yuncheng
    Guo, Bing
    Shen, Yan
    Duan, Xuliang
    Dong, Xiangqian
    Zhang, Hong
    Zhang, Chuanwu
    Jiang, Yuming
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [10] DATA PROTECTION IN AN ERA OF BIG DATA: THE CHALLENGES POSED BY BIG PERSONAL DATA
    Paterson, Moira
    McDonagh, Maeve
    [J]. MONASH UNIVERSITY LAW REVIEW, 2018, 44 (01): : 1 - 31