Skip to main content
Top

2018 | OriginalPaper | Chapter

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era

Authors : Shigeaki Tanimoto, Shun Totsuka, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai

Published in: Advances in Network-Based Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The utilization of big data by companies such as Facebook and Google is increasing, and the possibility of producing an unprecedented new service and system using such data is expected. However, the issue of privacy protection is a concern in the utilization of big data. Consequently, risk assessment in connection with the privacy protection is an important issue, especially the privacy of information literacy beginners (people less familiar with data security). This paper explores the issue of privacy protection of information literacy beginners in big data utilization. We first conducted a risk assessment in a qualitative analysis of privacy protection from a comprehensive viewpoint. As a result, 29 risk factors were extracted, and countermeasures were proposed. The important elements of the proposed measures were determined to be strengthening the security of terminals and thoroughly defining terminal use rules. Next, we described a quantitative evaluation of these risk factors obtained as a result of the qualitative analysis. Specifically, a risk value based on a formula was calculated for each risk factor. On the basis of the risk value, the effect of the countermeasures on the risks was then quantitatively evaluated. It was shown that the countermeasures can reduce their corresponding risk factors by about 49%. The results of this study are expected to contribute to the safe and secure use of big data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ryosuke Suzuki, The time of big data business, Shoeisha (2011) (in Japanese) Ryosuke Suzuki, The time of big data business, Shoeisha (2011) (in Japanese)
14.
go back to reference Maughan, P.D.: Assessing Information Literacy among Undergraduates: A Discussion of the Literature and the University of California-Berkeley Assessment Experience, College & Research Libraries (2001), crl.acrl.org Maughan, P.D.: Assessing Information Literacy among Undergraduates: A Discussion of the Literature and the University of California-Berkeley Assessment Experience, College & Research Libraries (2001), crl.​acrl.​org
15.
go back to reference Tang, Y., Tseng, H.W.: Distance learners’ self-efficacy and information literacy skills. J. Acad. Librarianship (2013). Elsevier Tang, Y., Tseng, H.W.: Distance learners’ self-efficacy and information literacy skills. J. Acad. Librarianship (2013). Elsevier
16.
go back to reference Ross, M., Perkins, H., Bodey, K.: Information literacy self-efficacy: the effect of juggling work and study. Libr. Inf. Sci. Res. (2013). Elsevier Ross, M., Perkins, H., Bodey, K.: Information literacy self-efficacy: the effect of juggling work and study. Libr. Inf. Sci. Res. (2013). Elsevier
18.
go back to reference Hepworth, M.: A study of undergraduate information literacy and skills: the inclusion of information literacy and skills in the undergraduate curriculum (1999). ERIC Hepworth, M.: A study of undergraduate information literacy and skills: the inclusion of information literacy and skills in the undergraduate curriculum (1999). ERIC
19.
go back to reference Smith, M., et al.: Big data privacy issues in public social media. In: IEEE 6th International Conference on Digital Ecosystems Technologies (DEST) (2012) Smith, M., et al.: Big data privacy issues in public social media. In: IEEE 6th International Conference on Digital Ecosystems Technologies (DEST) (2012)
20.
go back to reference Katal, A., et al.: Big data: Issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409. IEEE (2013) Katal, A., et al.: Big data: Issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409. IEEE (2013)
21.
go back to reference Bardi, M., et al.: Big data security and privacy: a review. China Commun. 11(14), 135–145 (2014)CrossRef Bardi, M., et al.: Big data security and privacy: a review. China Commun. 11(14), 135–145 (2014)CrossRef
22.
go back to reference Mehmood, A., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016) Mehmood, A., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)
23.
go back to reference Noguchi, K.: Risk management - management technology which supports goal achievement. Japanese Standards Association (2009) (in Japanese) Noguchi, K.: Risk management - management technology which supports goal achievement. Japanese Standards Association (2009) (in Japanese)
24.
go back to reference Sasaki, R., et al.: Proposal for a social-MRC social consensus formation support system concerning IT risk countermeasures. In: 2010 6th International Conference on Advanced Information Management and Service (IMS), November 30, pp. 60–66 (2010) Sasaki, R., et al.: Proposal for a social-MRC social consensus formation support system concerning IT risk countermeasures. In: 2010 6th International Conference on Advanced Information Management and Service (IMS), November 30, pp. 60–66 (2010)
27.
go back to reference Tanimoto, S., et al.: Risk assessment of BYOD: bring your own device. In: 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), pp. 511–514 (2016) Tanimoto, S., et al.: Risk assessment of BYOD: bring your own device. In: 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), pp. 511–514 (2016)
28.
go back to reference Toosarvandani, M.S., Modiri, N., Afzali, M.: The risk assessment and treatment approach in order to provide LAN security based on ISMS standard. Int. J. Found. Comput. Sci. Technol. (IJFCST) 2(6), 15–36 (2012) Toosarvandani, M.S., Modiri, N., Afzali, M.: The risk assessment and treatment approach in order to provide LAN security based on ISMS standard. Int. J. Found. Comput. Sci. Technol. (IJFCST) 2(6), 15–36 (2012)
29.
go back to reference Sato, H., Kasamatsu, T., Tamura, T., Kobayashi, Y.: Information security infrastructure. Kyoritsu Shuppan Co., Ltd. (2010) (in Japanese) Sato, H., Kasamatsu, T., Tamura, T., Kobayashi, Y.: Information security infrastructure. Kyoritsu Shuppan Co., Ltd. (2010) (in Japanese)
31.
go back to reference Tanimoto, S., et al.: Risk assessment quantification in hybrid cloud configuration. In: ECURWARE 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies, pp. 1–6 (2015) Tanimoto, S., et al.: Risk assessment quantification in hybrid cloud configuration. In: ECURWARE 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies, pp. 1–6 (2015)
Metadata
Title
Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era
Authors
Shigeaki Tanimoto
Shun Totsuka
Motoi Iwashita
Yoshiaki Seki
Hiroyuki Sato
Atsushi Kanai
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-65521-5_66

Premium Partner