View analysis of personal information leakage and privacy protection in big data era-based on Q method

被引:9
|
作者
Huang, Lei [1 ]
Zhou, Jingyi [2 ]
Lin, Jiecong [1 ]
Deng, Shengli [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Wuhan Univ, Sch Informat Management, Wuhan, Peoples R China
关键词
Q method; Information leakage; Privacy protection; View; Subjectivity; SELF-DISCLOSURE; ONLINE PRIVACY; FACEBOOK; INTENTION; POLICY; PERSPECTIVES; ANTECEDENTS; STRATEGIES; PARADOX; SNS;
D O I
10.1108/AJIM-05-2021-0144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big data technology. Furthermore, people's views on personal information leakage and privacy protection are varied, playing an important role in the legal process of personal information protection. Therefore, this paper aims to propose a semi-qualitative method based framework to reveal the subjective patterns about information leakage and privacy protection and further provide practical implications for interested party. Design/methodology/approach Q method is a semi-qualitative methodology which is designed for identifying typologies of perspectives. In order to have a comprehensive understanding of users' viewpoints, this study incorporates LDA & TextRank method and other information extraction technologies to capture the statements from large-scale literature, app reviews, typical cases and survey interviews, which could be regarded as the resource of the viewpoints. Findings By adopting the Q method that aims for studying subjective thought patterns to identify users' potential views, the authors have identified three categories of stakeholders' subjectivities: macro-policy sensitive, trade-offs and personal information sensitive, each of which perceives different risk and affordance of information leakage and importance and urgency of privacy protection. All of the subjectivities of the respondents reflect the awareness of the issue of information leakage, that is, the interested parties like social network sites are unable to protect their full personal information, while reflecting varied resistance and susceptibility of disclosing personal information for big data technology applications. Originality/value The findings of this study provide an overview of the subjective patterns on the information leakage issue. Being the first to incorporate the Q method to study the views of personal information leakage and privacy protection, the research not only broadens the application field of the Q method but also enriches the research methods for personal information protection. Besides, the proposed LDA & TextRank method in this paper alleviates the limitation of statements resource in the Q method.
引用
收藏
页码:901 / 927
页数:27
相关论文
共 50 条
  • [21] Surveillance and privacy, in the context of big data and personal data: analysis of the production of Information Science in Brazil
    Lott, Yuri Monnerat
    Cianconi, Regina de Barros
    [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2018, 23 (04): : 117 - 132
  • [22] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [23] Research on Information Security and Privacy of Libraries in Big Data Era
    Sun, Ningning
    Ma, Lihua
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1934 - 1937
  • [24] Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
    Silva, Jesus
    Solano, Darwin
    Fernandez, Claudia
    Romero, Ligia
    Vargas Villa, Jesus
    [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1213 - 1218
  • [25] Based on the Technological Analysis of Big Data Security and Privacy Protection Technology
    Wang, Lei
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY (EMCS 2017), 2017, 61 : 603 - 606
  • [26] Research on the Protection of Network Privacy Rights of Citizens in the Big Data Era
    Lin, Jian
    Wu, Xiaodong
    Chen, Sixin
    Hu, Yubing
    Liang, Changlin
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 121 - 125
  • [27] Systematic Regulation of Personal Information Rights in the Era of Big Data
    Zhu, FangBing
    Song, Zongyu
    [J]. SAGE OPEN, 2022, 12 (01):
  • [28] Privacy trust crisis of personal data in China in the era of Big Data: The survey and countermeasures
    Wang, Zhong
    Yu, Qian
    [J]. COMPUTER LAW & SECURITY REVIEW, 2015, 31 (06) : 782 - 792
  • [29] Data structure and privacy protection analysis in big data environment based on blockchain technology
    Wang, Yu
    [J]. International Journal of Intelligent Networks, 2024, 5 : 120 - 132
  • [30] Privacy Protection Based Retrieval on WBAN Big Data
    Yao, Lan
    Gu, Jialiang
    Tang, Mengjiao
    [J]. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 876 - 882