Research on distribution of responsibility for de-identification policy of personal information

Moon Ho Joo, Sang Pil Yoon, Sahng Yoon Kim, Hun-Yeong Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the coming of the age of big data, efforts to institutionalize de-identification of personal information to protect privacy but also at the same time, to allow the use of personal information, have been actively carried out and already, many countries are in the stage of implementing and establishing de-identification policies quite actively. But even with such efforts to protect and use personal information at the same time, the danger posed by re- identification based on de-identified information is real enough to warrant serious consideration for a management mechanism of such risks as well as a mechanism for distributing the responsibilities and liabilities that follow these risks in the event of accidents and incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information; in fact, it seems that there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. This study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk-liability theory. Also, the constituencies of the de-identification policies will be identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.

Original languageEnglish
Title of host publicationDG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research
Subtitle of host publicationInnovations and Transformations in Government
EditorsCharles C. Hinnant, Adegboyega Ojo
PublisherAssociation for Computing Machinery
Pages74-83
Number of pages10
ISBN (Electronic)9781450353175
DOIs
Publication statusPublished - 2017 Jun 7
Event18th Annual International Conference on Digital Government Research, DG.O 2017 - Staten Island, United States
Duration: 2017 Jun 72017 Jun 9

Publication series

NameACM International Conference Proceeding Series
VolumePart F128275

Conference

Conference18th Annual International Conference on Digital Government Research, DG.O 2017
CountryUnited States
CityStaten Island
Period17/6/717/6/9

Fingerprint

Accidents
Big data

Keywords

  • Big data
  • De-identification
  • Distribution of burden
  • Personal information
  • Re-identification
  • Risk-liability theory

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Joo, M. H., Yoon, S. P., Kim, S. Y., & Kwon, H-Y. (2017). Research on distribution of responsibility for de-identification policy of personal information. In C. C. Hinnant, & A. Ojo (Eds.), DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government (pp. 74-83). (ACM International Conference Proceeding Series; Vol. Part F128275). Association for Computing Machinery. https://doi.org/10.1145/3085228.3085243

Research on distribution of responsibility for de-identification policy of personal information. / Joo, Moon Ho; Yoon, Sang Pil; Kim, Sahng Yoon; Kwon, Hun-Yeong.

DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. ed. / Charles C. Hinnant; Adegboyega Ojo. Association for Computing Machinery, 2017. p. 74-83 (ACM International Conference Proceeding Series; Vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joo, MH, Yoon, SP, Kim, SY & Kwon, H-Y 2017, Research on distribution of responsibility for de-identification policy of personal information. in CC Hinnant & A Ojo (eds), DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. ACM International Conference Proceeding Series, vol. Part F128275, Association for Computing Machinery, pp. 74-83, 18th Annual International Conference on Digital Government Research, DG.O 2017, Staten Island, United States, 17/6/7. https://doi.org/10.1145/3085228.3085243
Joo MH, Yoon SP, Kim SY, Kwon H-Y. Research on distribution of responsibility for de-identification policy of personal information. In Hinnant CC, Ojo A, editors, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Association for Computing Machinery. 2017. p. 74-83. (ACM International Conference Proceeding Series). https://doi.org/10.1145/3085228.3085243
Joo, Moon Ho ; Yoon, Sang Pil ; Kim, Sahng Yoon ; Kwon, Hun-Yeong. / Research on distribution of responsibility for de-identification policy of personal information. DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. editor / Charles C. Hinnant ; Adegboyega Ojo. Association for Computing Machinery, 2017. pp. 74-83 (ACM International Conference Proceeding Series).
@inproceedings{449e7f4cc55c4621b5e4eb2796d688f5,
title = "Research on distribution of responsibility for de-identification policy of personal information",
abstract = "With the coming of the age of big data, efforts to institutionalize de-identification of personal information to protect privacy but also at the same time, to allow the use of personal information, have been actively carried out and already, many countries are in the stage of implementing and establishing de-identification policies quite actively. But even with such efforts to protect and use personal information at the same time, the danger posed by re- identification based on de-identified information is real enough to warrant serious consideration for a management mechanism of such risks as well as a mechanism for distributing the responsibilities and liabilities that follow these risks in the event of accidents and incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information; in fact, it seems that there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. This study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk-liability theory. Also, the constituencies of the de-identification policies will be identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.",
keywords = "Big data, De-identification, Distribution of burden, Personal information, Re-identification, Risk-liability theory",
author = "Joo, {Moon Ho} and Yoon, {Sang Pil} and Kim, {Sahng Yoon} and Hun-Yeong Kwon",
year = "2017",
month = "6",
day = "7",
doi = "10.1145/3085228.3085243",
language = "English",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
pages = "74--83",
editor = "Hinnant, {Charles C.} and Adegboyega Ojo",
booktitle = "DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research",

}

TY - GEN

T1 - Research on distribution of responsibility for de-identification policy of personal information

AU - Joo, Moon Ho

AU - Yoon, Sang Pil

AU - Kim, Sahng Yoon

AU - Kwon, Hun-Yeong

PY - 2017/6/7

Y1 - 2017/6/7

N2 - With the coming of the age of big data, efforts to institutionalize de-identification of personal information to protect privacy but also at the same time, to allow the use of personal information, have been actively carried out and already, many countries are in the stage of implementing and establishing de-identification policies quite actively. But even with such efforts to protect and use personal information at the same time, the danger posed by re- identification based on de-identified information is real enough to warrant serious consideration for a management mechanism of such risks as well as a mechanism for distributing the responsibilities and liabilities that follow these risks in the event of accidents and incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information; in fact, it seems that there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. This study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk-liability theory. Also, the constituencies of the de-identification policies will be identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.

AB - With the coming of the age of big data, efforts to institutionalize de-identification of personal information to protect privacy but also at the same time, to allow the use of personal information, have been actively carried out and already, many countries are in the stage of implementing and establishing de-identification policies quite actively. But even with such efforts to protect and use personal information at the same time, the danger posed by re- identification based on de-identified information is real enough to warrant serious consideration for a management mechanism of such risks as well as a mechanism for distributing the responsibilities and liabilities that follow these risks in the event of accidents and incidents involving the invasion of privacy. So far, most countries implementing the de-identification policies are focusing on defining what de-identification is and the exemption requirements to allow free use of de-identified personal information; in fact, it seems that there is a lack of discussion and consideration on how to distribute the responsibility of the risks and liabilities involved in the process of de-identification of personal information. This study proposes to take a look at the various de-identification policies worldwide and contemplate on these policies in the perspective of risk-liability theory. Also, the constituencies of the de-identification policies will be identified in order to analyze the roles and responsibilities of each of these constituencies thereby providing the theoretical basis on which to initiate the discussions on the distribution of burden and responsibilities arising from the de-identification policies.

KW - Big data

KW - De-identification

KW - Distribution of burden

KW - Personal information

KW - Re-identification

KW - Risk-liability theory

UR - http://www.scopus.com/inward/record.url?scp=85023643519&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85023643519&partnerID=8YFLogxK

U2 - 10.1145/3085228.3085243

DO - 10.1145/3085228.3085243

M3 - Conference contribution

T3 - ACM International Conference Proceeding Series

SP - 74

EP - 83

BT - DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research

A2 - Hinnant, Charles C.

A2 - Ojo, Adegboyega

PB - Association for Computing Machinery

ER -