Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA

被引:24
|
作者
Posey, Clay [1 ]
Raja, Uzma [2 ]
Crossler, Robert E. [3 ]
Burns, A. J. [4 ]
机构
[1] Univ Cent Florida, Dept Management, Coll Business Adm, POB 161400, Orlando, FL 32816 USA
[2] Univ Alabama, Dept Informat Syst Stat & Management Sci, Culverhouse Coll Commerce, Tuscaloosa, AL 35487 USA
[3] Washington State Univ, Dept Management Informat Syst & Entrepreneurship, Carson Coll Business, Pullman, WA 99164 USA
[4] Univ Texas Tyler, Dept Comp Sci, Coll Business & Technol, Tyler, TX 75799 USA
关键词
personally identifiable information (PII); breach analysis; taxonomy development; privacy; confidentiality; SECURITY BREACH; SYSTEM SECURITY; TAXONOMY; CONSEQUENCES; DETERRENCE; ATTACKS; FUTURE; ISSUES; RISK;
D O I
10.1057/s41303-017-0065-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organisations create, store, or purchase information that links individuals' identities to other data. Termed personally identifiable information (PII), this information has become the lifeblood of many firms across the globe. As organisations accumulate their constituencies' PII (e.g. customers', students', patients', and employees' data), individuals' privacy will depend on the adequacy of organisations' information privacy safeguards. Despite existing protections, many breaches still occur. For example, US organisations reported around 4,500 PII-breach events between 2005 and 2015. With such a high number of breaches, determining all threats to PII within organisations proves a burdensome task. In light of this difficulty, we utilise text-mining and cluster analysis techniques to create a taxonomy of various organisational PII breaches, which will help drive targeted research towards organisational PII protection. From an organisational systematics perspective, our classification system provides a foundation to explain the diversity among the myriad of threats. We identify eight major PII-breach types and provide initial literature reviews for each type of breach. We detail how US organisations differ regarding their exposure to these breaches, as well as how the level of severity (i.e. number of records affected) differs among these PII breaches. Finally, we offer several paths for future research.
引用
收藏
页码:585 / 604
页数:20
相关论文
共 9 条
  • [1] THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION
    Schwartz, Paul M.
    Solove, Daniel J.
    [J]. NEW YORK UNIVERSITY LAW REVIEW, 2011, 86 (06) : 1814 - 1894
  • [2] Mismanagement of personally identifiable information and the reaction of interested parties to safeguarding privacy in South Korea
    Song, Dong Hyun
    Son, Chang Yong
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2017, 22 (04):
  • [3] General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management
    Al-Zaben, Nasr
    Onik, Md Mehedi Hassan
    Yang, Jinhong
    Lee, Nam-Yong
    Kim, Chul-Soo
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 77 - 82
  • [4] Information Security Threats and Taking Privacy Precausions in Social Networks
    Yavanoglu, Uraz
    Sagiroglu, Seref
    Colak, Ilhami
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2012, 15 (01): : 15 - 27
  • [5] Is personally identifiable information really more valuable? Evidence from consumers' willingness-to-accept valuation of their privacy information
    Liu, Huan
    Li, Kai
    Chen, Yan
    Luo, Xin
    [J]. DECISION SUPPORT SYSTEMS, 2023, 173
  • [6] Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information
    Chang, Kai Chih
    Zaeem, Razieh Nokhbeh
    Barber, K. Suzanne
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 256 - 262
  • [7] Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data
    Majeed, Abdul
    Ullah, Farman
    Lee, Sungchang
    [J]. SENSORS, 2017, 17 (05)
  • [8] Releasing individually identifiable microdata with privacy protection against Stochastic threat: An application to health information
    Garfinkel, Robert
    Gopal, Ram
    Thompson, Steven
    [J]. INFORMATION SYSTEMS RESEARCH, 2007, 18 (01) : 23 - 41
  • [9] Assessing data protection and governance in health information systems: a novel methodology of Privacy and Ethics Impact and Performance Assessment (PEIPA)
    Di Iorio, Concetta Tania
    Carinci, Fabrizio
    Oderkirk, Jillian
    Smith, David
    Siano, Manuela
    de Marco, Dorotea Alessandra
    de Lusignan, Simon
    Hamalainen, Paivi
    Benedetti, Massimo Massi
    [J]. JOURNAL OF MEDICAL ETHICS, 2021, 47 (12) : E23