View analysis of personal information leakage and privacy protection in big data era-based on Q method

被引:9
|
作者
Huang, Lei [1 ]
Zhou, Jingyi [2 ]
Lin, Jiecong [1 ]
Deng, Shengli [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Wuhan Univ, Sch Informat Management, Wuhan, Peoples R China
关键词
Q method; Information leakage; Privacy protection; View; Subjectivity; SELF-DISCLOSURE; ONLINE PRIVACY; FACEBOOK; INTENTION; POLICY; PERSPECTIVES; ANTECEDENTS; STRATEGIES; PARADOX; SNS;
D O I
10.1108/AJIM-05-2021-0144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big data technology. Furthermore, people's views on personal information leakage and privacy protection are varied, playing an important role in the legal process of personal information protection. Therefore, this paper aims to propose a semi-qualitative method based framework to reveal the subjective patterns about information leakage and privacy protection and further provide practical implications for interested party. Design/methodology/approach Q method is a semi-qualitative methodology which is designed for identifying typologies of perspectives. In order to have a comprehensive understanding of users' viewpoints, this study incorporates LDA & TextRank method and other information extraction technologies to capture the statements from large-scale literature, app reviews, typical cases and survey interviews, which could be regarded as the resource of the viewpoints. Findings By adopting the Q method that aims for studying subjective thought patterns to identify users' potential views, the authors have identified three categories of stakeholders' subjectivities: macro-policy sensitive, trade-offs and personal information sensitive, each of which perceives different risk and affordance of information leakage and importance and urgency of privacy protection. All of the subjectivities of the respondents reflect the awareness of the issue of information leakage, that is, the interested parties like social network sites are unable to protect their full personal information, while reflecting varied resistance and susceptibility of disclosing personal information for big data technology applications. Originality/value The findings of this study provide an overview of the subjective patterns on the information leakage issue. Being the first to incorporate the Q method to study the views of personal information leakage and privacy protection, the research not only broadens the application field of the Q method but also enriches the research methods for personal information protection. Besides, the proposed LDA & TextRank method in this paper alleviates the limitation of statements resource in the Q method.
引用
收藏
页码:901 / 927
页数:27
相关论文
共 50 条
  • [41] Information using and the International intellectual property Protection in Big data era
    Gang, Wang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 478 - +
  • [42] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209
  • [43] Suggestion for Public Privacy Protection in Policing Based on Big Data
    Xiong, Jian-Ying
    Zhou, Ying
    [J]. THEORETICAL AND METHODOLOGICAL APPROACHES TO SOCIAL SCIENCE, ECONOMICS AND MANAGEMENT SCIENCE, 2015, : 64 - 68
  • [44] System proposal and CRS model design applying personal Information protection for BIG DATA analysis
    Lim, Jong-ho
    Kim, Il Kon
    Bae, Sungchul
    Lee, Sung-Hyun
    [J]. 2014 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2014, : 231 - 234
  • [45] RETRACTED: Analysis of Legal Issues of Personal Information Protection in the Field of Big Data (Retracted Article)
    Wang, Chuyun
    Guo, Feifei
    Ji, Mengxuan
    [J]. JOURNAL OF ENVIRONMENTAL AND PUBLIC HEALTH, 2022, 2022
  • [46] Protection of genomic data and the Australian Privacy Act: when are genomic data 'personal information'?
    Paltiel, Minna
    Taylor, Mark
    Newson, Ainsley
    [J]. INTERNATIONAL DATA PRIVACY LAW, 2023, 13 (01) : 47 - 62
  • [47] Information entropy differential privacy: A differential privacy protection data method based on rough set theory
    Li, Xianxian
    Luo, Chunfeng
    Liu, Peng
    Wang, Li-E
    [J]. IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 918 - 923
  • [48] Analysis of Computer Information Technology in the Era of Big Data
    Zhang, Xu
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 164 - 168
  • [49] Privacy Protection in the Big Data Era: Judicial Renewal of the Right to be Forgotten Institution of PRC
    Sun, Cong
    [J]. INTERNATIONAL JOURNAL OF MULTIPHYSICS, 2024, 18 (03) : 25 - 37
  • [50] A privacy protection method for health care big data management based on risk access control
    Mingyue Shi
    Rong Jiang
    Xiaohan Hu
    Jingwei Shang
    [J]. Health Care Management Science, 2020, 23 : 427 - 442