Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

De-identification policy and risk distribution framework for securing personal information

Full metadata record
DC Field Value Language
dc.contributor.authorJoo, Moon-Ho-
dc.contributor.authorYoon, Sang-Pil-
dc.contributor.authorKwon, Hun-Yeong-
dc.contributor.authorLim, Jong-In-
dc.date.accessioned2021-09-02T21:29:03Z-
dc.date.available2021-09-02T21:29:03Z-
dc.date.created2021-06-16-
dc.date.issued2018-
dc.identifier.issn1570-1255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/81060-
dc.description.abstractIn the age of big data, many countries are implementing and establishing de-identification policies quite actively. There are many efforts to institutionalize de-identification of personal information to protect privacy and utilize the use of personal information. But even with such efforts, de-identification policy always has a potential risk that de-identified information can be re-identified by being combined with other information. Therefore, it is necessary to consider the management mechanism that manages these risks as well as a mechanism for distributing the responsibilities and liabilities in the event of incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information. On the other hand, there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. The purpose of this study is to compare the de-identification policies of the European Union, the United States, Japan, and Korea, all of which are now actively pursuing de-identification policies. Additionally, this study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk society and risk-liability theory. The constituencies of the de-identification policies are identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIOS PRESS-
dc.titleDe-identification policy and risk distribution framework for securing personal information-
dc.typeArticle-
dc.contributor.affiliatedAuthorKwon, Hun-Yeong-
dc.contributor.affiliatedAuthorLim, Jong-In-
dc.identifier.doi10.3233/IP-170057-
dc.identifier.scopusid2-s2.0-85049644065-
dc.identifier.wosid000457221500008-
dc.identifier.bibliographicCitationINFORMATION POLITY, v.23, no.2, pp.195 - 219-
dc.relation.isPartOfINFORMATION POLITY-
dc.citation.titleINFORMATION POLITY-
dc.citation.volume23-
dc.citation.number2-
dc.citation.startPage195-
dc.citation.endPage219-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaInformation Science & Library Science-
dc.relation.journalWebOfScienceCategoryInformation Science & Library Science-
dc.subject.keywordAuthorBig data-
dc.subject.keywordAuthorpersonal information-
dc.subject.keywordAuthorde-identification-
dc.subject.keywordAuthorre-identification-
dc.subject.keywordAuthorrisk-liability theory-
dc.subject.keywordAuthordistribution of responsibility-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE