Abstract
The utilization of big data by companies such as Facebook and Google is increasing, and the possibility of producing an unprecedented new service and system using such data is expected. However, the issue of privacy protection is a concern in the utilization of big data. Consequently, risk assessment in connection with the privacy protection is an important issue, especially the privacy of information literacy beginners (people less familiar with data security). This paper explores the issue of privacy protection of information literacy beginners in big data utilization. We first conducted a risk assessment in a qualitative analysis of privacy protection from a comprehensive viewpoint. As a result, 29 risk factors were extracted, and countermeasures were proposed. The important elements of the proposed measures were determined to be strengthening the security of terminals and thoroughly defining terminal use rules. Next, we described a quantitative evaluation of these risk factors obtained as a result of the qualitative analysis. Specifically, a risk value based on a formula was calculated for each risk factor. On the basis of the risk value, the effect of the countermeasures on the risks was then quantitatively evaluated. It was shown that the countermeasures can reduce their corresponding risk factors by about 49%. The results of this study are expected to contribute to the safe and secure use of big data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ryosuke Suzuki, The time of big data business, Shoeisha (2011) (in Japanese)
Motohashi, K.: The new business and the IT strategy of the big data age (in Japanese), http://www.hitachi-solutions.co.jp/forum/kansai/vol17/
Shiroguchi, Y.: Why did Mirogu result in the dismissal? (2012) (in Japanese), http://itpro.nikkeibp.co.jp/article/Interview/20120411/390605/?rt=nocnt
Yamada, Y.: “Big data” and privacy (2013) (in Japanese), http://www.nli-research.co.jp/report/detail/id=40814?site=nli
Some Twitter success or failure case of in Japan, http://airoplane.net/2009/09/20/twitter-case-study.html
About the future of marketing observed from the example of big data utilization? (in Japanese), http://o2o.abeja.asia/product/post-9969/
Ministry of Economy, Trade and Industry, The overseas trend on personal data (2012) (in Japanese) http://www.meti.go.jp/committee/kenkyukai/shoujo/it_yugo_forum_data_wg2/pdf/001_04_00.pdf
Komatsu and Kubota: Hidden big data utilization advanced company! DNA of the “kaizen” which holds a future key (in Japanese), http://bizjournal.jp/2015/07/post_10578.html
ITmediaNews (in Japanese), http://www.itmedia.co.jp/news/articles/1409/10/news143.html
Shimbun, N.K.: A damage pension mechanism publishes in 1,010,000 pension information outflows and all the all prefectures (in Japanese), http://www.nikkei.com/article/DGXLASFS22H7O_S5A620C1EE8000/
MOTEX, Information leakage of Japan Pension Service, what chances to one man may happen to all! Threat of targeted attack mail (in Japanese), http://www.motex.co.jp/nomore/casestudy/2879/
Ministry of Internal Affairs and Communications, The paradigm shift of the worldwide scale by ICT (in Japanese), http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h26/html/nc134020.html
Murakami, S.: About utilization of big data, and protection of privacy, IEICE, Communication society magazine, No. 29, Summer, pp. 52–58 (2014) (in Japanese), https://www.jstage.jst.go.jp/article/bplus/8/1/8_52/_pdf
Maughan, P.D.: Assessing Information Literacy among Undergraduates: A Discussion of the Literature and the University of California-Berkeley Assessment Experience, College & Research Libraries (2001), crl.acrl.org
Tang, Y., Tseng, H.W.: Distance learners’ self-efficacy and information literacy skills. J. Acad. Librarianship (2013). Elsevier
Ross, M., Perkins, H., Bodey, K.: Information literacy self-efficacy: the effect of juggling work and study. Libr. Inf. Sci. Res. (2013). Elsevier
Warschauer, M.: Information Literacy in the Laptop Classroom. Teachers College Record (2007). education.uci.edu
Hepworth, M.: A study of undergraduate information literacy and skills: the inclusion of information literacy and skills in the undergraduate curriculum (1999). ERIC
Smith, M., et al.: Big data privacy issues in public social media. In: IEEE 6th International Conference on Digital Ecosystems Technologies (DEST) (2012)
Katal, A., et al.: Big data: Issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409. IEEE (2013)
Bardi, M., et al.: Big data security and privacy: a review. China Commun. 11(14), 135–145 (2014)
Mehmood, A., et al.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016)
Noguchi, K.: Risk management - management technology which supports goal achievement. Japanese Standards Association (2009) (in Japanese)
Sasaki, R., et al.: Proposal for a social-MRC social consensus formation support system concerning IT risk countermeasures. In: 2010 6th International Conference on Advanced Information Management and Service (IMS), November 30, pp. 60–66 (2010)
Risk Breakdown Structure, http://www.justgetpmp.com/2011/12/risk-breakdown-structure-rbs.html
Cox’s risk matrix theorem and its implications for project risk management, http://eight2late.wordpress.com/2009/07/01/cox%E2%80%99s-risk-matrix-theorem-and-its-implications-for-project-risk-management/
Tanimoto, S., et al.: Risk assessment of BYOD: bring your own device. In: 2016 IEEE 5th Global Conference on Consumer Electronics (GCCE), pp. 511–514 (2016)
Toosarvandani, M.S., Modiri, N., Afzali, M.: The risk assessment and treatment approach in order to provide LAN security based on ISMS standard. Int. J. Found. Comput. Sci. Technol. (IJFCST) 2(6), 15–36 (2012)
Sato, H., Kasamatsu, T., Tamura, T., Kobayashi, Y.: Information security infrastructure. Kyoritsu Shuppan Co., Ltd. (2010) (in Japanese)
ISMS Risk Assessment Manual v1.4, https://www.igt.hscic.gov.uk/KnowledgeBaseNew/ISMS%20Risk%20Assessment%20Manual%20v1.4.pdf
Tanimoto, S., et al.: Risk assessment quantification in hybrid cloud configuration. In: ECURWARE 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies, pp. 1–6 (2015)
Acknowledgments
This work was supported by the Japan Society for the Promotion of Science (JSPS, KAKENHI Grant Number 15H02783).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Tanimoto, S., Totsuka, S., Iwashita, M., Seki, Y., Sato, H., Kanai, A. (2018). Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_66
Download citation
DOI: https://doi.org/10.1007/978-3-319-65521-5_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65520-8
Online ISBN: 978-3-319-65521-5
eBook Packages: EngineeringEngineering (R0)