DOI QR코드

DOI QR Code

빅데이터 분석을 통한 프라이버시 인식에 관한 연구

A Study on the Privacy Awareness through Bigdata Analysis

  • 이송이 (단국대학교 IT법학협동과정) ;
  • 김성원 (단국대학교 IT법학협동과정) ;
  • 이환수 (단국대학교 융합보안학과)
  • Lee, Song-Yi (Department of Information Technology and Law, Dankook University) ;
  • Kim, Sung-Won (Department of Information Technology and Law, Dankook University) ;
  • Lee, Hwan-Soo (Department of Convergence Security, Dankook University)
  • 투고 : 2019.07.18
  • 심사 : 2019.10.20
  • 발행 : 2019.10.28

초록

4차 산업혁명시대에 접어들면서 정보기술의 발전으로 인해 다양한 편익과 함께 프라이버시 이슈에 대한 사회적 관심 또한 증가해 왔다. 빅데이터를 통한 개인의 프라이버시 침해 위협 가능성이 높아지게 됨에 따라, 프라이버시에 대한 관리 및 보호에 대한 학술적 논의 또한 활발해지기 시작하였다. 전통적인 관점의 프라이버시는 기본적 인권으로 다양한 차원에서 정의된 반면, 최근의 연구 동향에 따르면 대부분 온라인상에서의 개인정보보호라는 정보 차원의 프라이버시에 대해서만 주로 논의하고 있다. 이러한 제한적 논의는 이론적 개념과 실제 인식 간의 왜곡을 초래할 뿐만 아니라 프라이버시 개념의 학술적 정의 및 사회적 합의를 더욱 어렵게 만드는 요인이 될 수 있다. 이에 본 연구에서는 최근 1년 동안 포탈 사이트 12,000건의 뉴스데이터를 바탕으로 온라인상에서 노출되는 프라이버시 개념을 분석하여 이론적 개념과 사회적으로 통용되는 개념의 차이를 비교 분석한다. 이러한 실증적 접근은 변화하고 있는 프라이버시 개념에 대한 이해와 국내 상황에 맞는 프라이버시 개념화를 위한 연구 방향을 제시할 수 있을 것으로 기대한다.

In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.

키워드

참고문헌

  1. K. Lee. (2009). Increased Internet privacy violation. The Science Times, https://www.sciencetimes.co.kr
  2. G. B. Kwon, H. J. Lee & I. Kim. (2018). The Study on Legislation Process of GDPR(General Data Protection Regulation) and Subsequent Trend in EU System, Studies on American Constitution, 29(1), 1-38.
  3. T. Oh & J. Yu. (2011). Change of privacy concept in social network service (SNS) environment, KISDI, 23(4), 26-42.
  4. J. L. Yu. (2011). Personal Information Protection in Digital Era - Reviewing Personal information protection Act, Journal of Digital Convergence, 9(6), 81-90. UCI : G704-002010.2011.9.6.022 https://doi.org/10.14400/JDPM.2011.9.6.081
  5. K. Lee. (2014). Privacy Protection in the Big Data Age, Company Ethics Briefs, 11, 1-26.
  6. M. Park. (2018). GDPR, Microsoft's commitment to privacy and customer data management, Microsoft, https://news.microsoft.com/ko-kr
  7. Y. Jung. (2001). Review of the Theory of Privacy in Modern Constitutional Law, Journal of Cybercommunication Academic Society, 7, 214-267.
  8. S. D. Warren & L. D. Brandeis (1890). The right to privacy, Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160
  9. A. F. Westin. (1967). Privacy and Freedom, Atheneum. York: Ig Publishing.
  10. E. J. Bloustein. (1964). Privacy as an Aspect of Human Dignity: An answer to Dean Prosser, New York University Law Review, 39, 962-1007.
  11. Y. H. Son. (2014). The Protection of Personal Information in the Era of Big Data, Business Law Review, 28(3), 355-393. UCI : G704-001299.2014.28.3.003
  12. G. Moon. (2019). Survive the privacy of the Internet, Security News, https://www.boannews.com
  13. S. Sung. (2004). Cyber space and privacy, KISDI.
  14. Supreme Court. (1998.7.24.). Sentence, 96Na42789 Judgement.
  15. T. M. Cooley. (1888). A Treatise on the Law of Torts or the Wrongs Which Arise Independently of Contract, Chicago : Callaghan and Company.
  16. K. Cho. (2005). Statutory Development of Privacy in the United States, Sungkyunkwan Law Review, 17(3), 75-113. UCI : G704-001437.2005.17.3.013
  17. A. Westin. (1970). Privacy and Freedom. (first edition 1967). Atheneum, New York.
  18. J. Kim & S. Kim. (2015). A Study on Privacy Paradox from the Behavioral Economics Perspective, Informatization Policy, 22(3), 16-35. DOI : 10.22693/NIAIP.2015.22.3.016
  19. J. B. Young. (1978). Privacy. Wiley, Chichester, UK, Cambridge University. DOI : https://doi.org/10.1017/S0047279400009223
  20. I. S. Ham. (2016). The Enactment of 2016 General Data Protection Regulation(GDPR) in the EU and its Implications, Chonnam Law Review, 36(3), 411-453. UCI : G704-002100.2016.36.3.018
  21. ITWorld. (2018). Chinese data confidentiality protection law came into effect similar to China's GDPR in May, http://www.itworld.co.kr
  22. M. Cho & H. Lee. (2017). Improvement Issues of Personal Information Protection Laws through Meta-Analysis, Journal of Digital Convergence, 15(9), 1-14. DOI : https://doi.org/10.14400/JDC.2017.15.9.1
  23. H. Jung. (2016). A Study on a Unique and Distinctive Culture(Law and Understanding) Regarding the Protections for Privacy in the U.S., Ilkam Law Review, 35, 277. DOI : 10.35148/ilsilr.2016..35.271
  24. B. C. Kim. (2014). A study on Utilization of Big Data Based on the Personal Information Protection Act, Journal of Digital Convergence, 12(12), 87-92. DOI : 10.14400/JDC.2014.12.12.87
  25. C. Chang. (2016). An Argument for Making Privacy a Working Constitutional Right - Referring to Daniel Solove's Pragmatic Theory -, Journal of Media Law, Ethics and Policy Research, 15(3), 1-30. UCI : G704-001997.2016.15.3.005
  26. C. W. Park & J. W. Kim. (2015). An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, 13(4), 219-225. DOI : http://dx.doi.org/10.14400/JDC.2015.13.4.219
  27. J. Kim & S. Kim. (2014). A Study on Privacy Paradox between Privacy Concern and Information Disclosure behavior: Focus on Privacy Calculus Theory, Entrue Journal of Information Technology, 13(3), 139-152. UCI : G704-001673.2014.13.3.007
  28. H. J. Smith, T. Dinev & H. Xu. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. DOI : 10.2307/41409970
  29. I. Altman. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Brooks/Cole Publishing Company, Monterey, California.
  30. S. Petronio. (2007). Translational research endeavors and the practices of communication privacy management. Journal of Applied Communication Research, 35(3), 218-222. DOI : https://doi.org/10.1080/00909880701422443
  31. W. Zhou & S. Piramuthu. (2015). Information Relevance Model of Customized Privacy for IoT. Journal of Business Ethics, 131(1), 19-30. DOI : 10.1007/s10551-014-2248-y
  32. A. Hotho, A. Nurnberger & G. Paass. (2005). A brief survey of text mining. In Ldv Forum, 20(1), 19-62.
  33. H. K. Kong & H. J. Jun & S. U. Yoon. (2018). A Study on the Privacy Policy of Behavioral Advertising, Journal of the Korea Convergence Society, 9(3), 231-240. https://doi.org/10.15207/JKCS.2018.9.3.231
  34. Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone, Journal of Convergence for Information Technology, 4(4), 13-18. https://doi.org/10.22156/CS4SMB.2014.4.4.013
  35. D. Lee. (2019). One year of GDPR implementation, a different change than expected, ITWorld, http://www.itworld.co.kr
  36. N. H. Sung, (2010). The Future of Digital Privacy. LG Economy Research Institute, http://www.lgeri.com/report/view.do?idx=16658
  37. K. A. Kim. (2018). A Rise on the Privacy Protection based on Secret Code : Focus on Homomorphic Encryption. Boannews, https://www.boannews.com/media/view.asp?idx=74664
  38. H. S. Lee. (2016). Personal Characteristics and Information Privacy Concerns. Asia-pacific Journal of Multimedia Service Convergent with Art, Humanities, and Sociology, 6(9), 267-276. http://dx.doi.org/10.14257/AJMAHS.2016.09.46
  39. J. W. Mun. (2013). Protection of Privacy : From myth to norm. A Policy Reports for the Improvement of Legal Protection System in Personal Information.