Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

De-identification policy and risk distribution framework for securing personal information

Authors
Joo, Moon-HoYoon, Sang-PilKwon, Hun-YeongLim, Jong-In
Issue Date
2018
Publisher
IOS PRESS
Keywords
Big data; personal information; de-identification; re-identification; risk-liability theory; distribution of responsibility
Citation
INFORMATION POLITY, v.23, no.2, pp.195 - 219
Indexed
SCOPUS
Journal Title
INFORMATION POLITY
Volume
23
Number
2
Start Page
195
End Page
219
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/81060
DOI
10.3233/IP-170057
ISSN
1570-1255
Abstract
In the age of big data, many countries are implementing and establishing de-identification policies quite actively. There are many efforts to institutionalize de-identification of personal information to protect privacy and utilize the use of personal information. But even with such efforts, de-identification policy always has a potential risk that de-identified information can be re-identified by being combined with other information. Therefore, it is necessary to consider the management mechanism that manages these risks as well as a mechanism for distributing the responsibilities and liabilities in the event of incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information. On the other hand, there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. The purpose of this study is to compare the de-identification policies of the European Union, the United States, Japan, and Korea, all of which are now actively pursuing de-identification policies. Additionally, this study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk society and risk-liability theory. The constituencies of the de-identification policies are identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE