DOI QR코드

DOI QR Code

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective

개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로

  • Kim, Minsu (Graduate School of Information, Yonsei University) ;
  • Choi, Jaewon (Department of Business Administration, Global Business School, Soonchunhyang University) ;
  • Kim, Hyun Jin (National Information Society Agency)
  • Received : 2014.01.31
  • Accepted : 2014.03.05
  • Published : 2014.03.28

Abstract

Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

개인정보 분야에서의 다양한 정보 보안 이슈가 발생함에 따라 해당 분야의 전문가를 확인하기 위한 프레임워크는 매우 중요한 영역이 되었다. 전문가 탐색과정은 주로 연구 업적 등을 통한 주관적인 평가가 일반적이지만 보다 객관적인 방식을 통한 선정이 매우 중요하다. 소셜 네트워크 분석기법의 응용이 다양한 영역에서 활용됨에 따라 본 연구는 개인정보보호분야의 전문가를 확인하고 해당 전문가들의 연구실적을 판단하기 위한 분석 프레임워크를 제시하고자 하였다. 본 연구는 연구 목적에 따라 개인정보보호 연구영역의 연구성과 자료를 바탕으로 소셜 네트워크 분석을 실시하고 핵심연구자의 성과를 분석하였다. 수집된 데이터는 연구의 공저자, 발행기관, 소속기관 등의 네트워크 구성에 활용되어 핵심전문가 집단을 관리하기 위한 프레임워크를 제시하였다. 본 연구는 NDSL에서 최근 5년 동안 발표된 논문들을 중심으로 자료를 수집하였다. 연구자들이 학술 정보를 교환하는 정기 간행물인 학술지를 바탕으로 연구 네트워크를 형성하는 네트워크 자료를 수집함으로써 연구활동에 대한 정보를 분석할 수 있었다. 일반적으로 연구자들은 연구 결과를 논문으로 발표하고, 발표된 논문들이 다수의 관련 분야 전문가들에게 공유된다는 점에서 학술연구지는 연구자들의 지식관련 의사소통 공간이며 지식의 구조화에 핵심적인 역할을 수행한다. 그에 따라 본 연구의 연구 대상 분야로 설정한 개인정보보호 분야의 연구 구조를 이해하기 위해 국내에서 발표된 관련 분야의 논문들을 연구 대상으로 자료가 수집되었다. 특히 자료의 선별 기준은 국내 최대의 데이터베이스를 보유하고 있는 NDSL에서 개인정보보호 관련 키워드를 보유한 논문 데이터를 수집 및 정제하여 분석 자료로 사용하였다. 2005년부터 2013년까지 약 2,000개의 연구결과 중 주제 관련성, 공저자 추출 등을 수집하였다. 데이터 수집 이후 연구 분석을 위한 데이터 처리를 통하여 통해 총 784개의 논문을 선정하고 분석대상으로 확정하였다. 분석 결과, 개인정보보호 연구영역의 전문가 집단을 이용한 연구논문 성과에 대한 분석은 핵심 연구자들을 추출해내고 전문가 집단을 관리하는 데 도움을 제공할 수 있다. 특히 소속집단 및 연구논문 발행기관을 분석함으로써 개인정보보호 연구영역에서 확인되지 않았던 연구자들의 연구 논문 게재의 공저자 네트워크가 매우 밀접함을 확인할 수 있다. 또한 연구논문의 발행기관 및 소속집단의 특성을 추출함으로써 개인정보보호 영역의 전문가 평가지표로서 소셜 네트워크 지표들의 활용가능성을 확인하였다.

Keywords

References

  1. Bozeman, B. and E. Corley, "Scientists collaboration strategies: implications for scientific and technical human capital," Research Policy, Vol.33, No. 4(2004), 599-616. https://doi.org/10.1016/j.respol.2004.01.008
  2. Bradford, S. C., "Sources of information on specific subjects," Journal of Information Science, Vol.10, No. 4(1985), 173-180. https://doi.org/10.1177/016555158501000406
  3. Cho, E. S. and J. D. Song, "What kinds of articles are cited more in Korea?," Korean Marketing Association, Vol.28, No. 4(2013), 33-56.
  4. Cho, M. H. and L. S. Kim, "Study on Development of Capability Diagnosis Model and Indicators for Research Organizations," Government and policy, Vol.2, No. 2(2010), 77-107.
  5. Cohen, J., P. Cohen, S. G. West, and L. S. Aiken, Applied multiple regression/ correlation analysis for the behavioral sciences, 3rd edition., Hillsdale, NJ: Erlbaum, 2003.
  6. Dannefer, D., "Cumulative advantage/disadvantage and the life course: cross- fertilizing age and social science theory," Journals of Gerontology Series B Psychological Sciences and Social Sciences, Vol.58, No.6 (2003), 327-337. https://doi.org/10.1093/geronb/58.6.S327
  7. Hilbe, J. M., Negative binomial regression, Cambridge, New York: Cambridge University Press, 2007.
  8. Huang, M. H., J. H. Ahn and J. J. Jahng, "Patterns of Collaboration Networks : Co- authorship Analysis of MIS Quarterly from 1996 to 2004," Journal of Society for e-Business Studies, Vol.13, No.4(2008), 193-207.
  9. Kadushin, C., Understanding Social Networks: Theories, Concepts, and Finding, Oxford University Press, 2012.
  10. Kim, Y. H., Y. J. Kim, and Y. S. Kim, "The Structure of Production and Diffusion of Knowledge in Korean Communication Studies," Korean journal of journalism & communication studies, Vol.52, No.1(2008), 117-140.
  11. Kim, Y. H., J. R. Yoon, H. S. Cho, and Y. J. Kim, "Structure of Collaboration Network among Korean Scientists - 'Small World' and Position Effect," Korean journal of sociology, Vol. 41, No. 4(2007), 68-103.
  12. Kim, Y. H., Social Network Analysis, Pakyoungsa, 2011.
  13. Lee, W. H., Y. C. Seok and J. C. Park, "Detecting Emerging Technology to Use Social Network Analysis: Focusing on Mobile Telecommunication," Journal of information systems, Vol.21, No. 4(2012), 109-132. https://doi.org/10.5859/KAIS.2012.21.4.109
  14. Lee, C. G., M. J. Sung, and Y. B. Lee, "Discovering Customer Service Cool Trends in e-Commerce: Using Social Network Analysis with NodeXL," Information Systems Review, Vol. 13, No. 1(2011), 75-96.
  15. Lee, C. M., S. G. Lee, and B. S. Lee, "A Study of the Intelligent Researcher Connection Network Build-up that Merges the Recommendation System and Social Network," Journal of information management, Vol.40, No.1(2009), 199-215. https://doi.org/10.1633/JIM.2009.40.1.199
  16. Leem, B. H., "An Effect of Co-authorship Network on Research Performance: Focusing on Co-authoring of Logos Management Review," Logos management review, Vol.10, No. 1(2011), 1-20.
  17. Lim, H. S. and T. W. Chang, "A Study on Co-authorship Network in the Journals of a Branch of Logistics", IE Interface, Vol.25, No. 4(2012), 458-471. https://doi.org/10.7232/IEIF.2012.25.4.458
  18. Lomax, K. S., "Business failures. Another example of the analysis of failure data", Journal of the American Statistical Association, Vol. 49 (1954), 847-852. https://doi.org/10.1080/01621459.1954.10501239
  19. Lotka, A. J., "The frequency distribution of scientific productivity," Journal of the Washington Academy of Sciences, Vol.16, No. 12(1926), 317-324.
  20. Namn, S. H. and S. S. Seol, "Co-authorship Analysis of Innovation Studies in Korea: A Social Network Perspective," Journal of Korea technology innovation society, Vol.10, No.4(2007), 605-628.
  21. Nordstrom, L. O., "Bradford's law and relationship between ecology and biogeography," Scientometrics, Vol.18, No. 3-4(1990) 193-203. https://doi.org/10.1007/BF02017761
  22. Park, S. W., E. J. Choi, M. S. Park, J. G. Kim, E. S. Seo, and Y. T. Park, "An Expert Recommendation System using Ontologybased Social Network Analysis," Journal of KIISE, Vol.15, No. 5(2009), 390-394.
  23. Park, Y. S., Y. J. Cho, and J. H. Cheong, "A Study on Architectural Expert Network using Social Network Analysis - Focused on Researcher Network in the Field of BIM Technology," Review of architecture and building science, Vol. 26, No. 10(2010), 147-154.
  24. Park, H. W., "International Scientific and Scholarly Communication Networks on World Wide Web," Journal of the Korean Society for Library and Information Science, Vol.37, No. 2(2003), 153-168. https://doi.org/10.4275/KSLIS.2003.37.2.153
  25. Sohn, D. W., Social Network Analysis, Kyungmoon publishers, 2008.
  26. Wade, J. B., J. F. Porac and T. G. Pollock, "Worth, words and the justification of executive pay," Journal of Organizational Behavior, Vol.18, No. 7(1997), 641-664. https://doi.org/10.1002/(SICI)1099-1379(199711)18:1+<641::AID-JOB910>3.0.CO;2-M
  27. Watts, D. J, "Networks, Dynamics, and the Small-World Phenomenon," American Journal of Sociology, Vol.105, No. 2(1999), 493-527. https://doi.org/10.1086/210318
  28. Wi, C. K., H. J. Kim and S. J. Lee, "A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis," Journal of the Korean Institute of Information Security and Cryptology, Vol. 22, No. 4(2012), 851-868.

Cited by

  1. The Analyses of Research Productivity and Review Efficiency for IT Related Journal vol.13, pp.4, 2014, https://doi.org/10.9716/KITS.2014.13.4.093
  2. A Case Analysis on Safety Researcher Relationship during 2011-2013 vol.16, pp.4, 2014, https://doi.org/10.12812/ksms.2014.16.4.247
  3. 19 Years after the Launch of Korean Strategic Management Society Information vol.21, pp.2, 2018, https://doi.org/10.17786/jsm.2018.21.2.001