A comprehensive concept map for adequate protection and effective management of personal information in networked Chinese services

被引:5
|
作者
An, Xiaomi [1 ,2 ]
Bai, Wenlin [2 ]
Deng, Hepu [2 ,3 ]
Sun, Shuyang [2 ]
Dong, Yu [2 ]
Zhong, Wenrui [2 ]
Hu, Jufang [4 ]
机构
[1] Renmin Univ China, Minist Educ, Key Lab Data Engn & Knowledge Engn, Beijing, Peoples R China
[2] Renmin Univ China, Sch Informat Resources Management, Beijing, Peoples R China
[3] RMIT Univ, Sch Business Informat Technol & Logist, Melbourne, Vic, Australia
[4] Renmin Univ China, Univ Lib, Beijing, Peoples R China
来源
ELECTRONIC LIBRARY | 2015年 / 33卷 / 06期
关键词
China; Information resources management; Personal information protection; Networked services; E-GOVERNMENT; PRIVACY;
D O I
10.1108/EL-04-2014-0059
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China through comprehensively considering the multi-disciplinary perspective of personal information protection and management with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in today's networked environments. There arc different perspectives on what personal information protection and management is about, why and how personal information should be protected and managed in the literature. Little, however, is known about the relationships between these multiple perspectives and their implications to personal information protection and management in the real-world practice. Design/methodology/approach - A multi-methods approach is adopted in the study, including a comprehensive review of the related literature, a content analysis of the relevant laws, polices, standards, a multi cases study of the relevant network services providers and an online survey of the Chinese citizens who are the end-users of the networked services to adequately achieve the objective of this study. The concept map building technique is used as a tool for conducting the meta-synthesis of the findings from multiple data resources in the development of a comprehensive concept map for personal information protection and management. Findings - This study rationalizes the importance of the identification of personal information for adequate protection and effective management. It identifies five perspectives on personal information protection and management, namely, law, economics, sociology, information technology and information resources management for their applications at the organizational level. Five types of personal information are identified in the study for protection and management, namely, identifiable personal information, personal identity information, personal moral right information, personal civil right and interest information and personal business and transaction information. An integrated approach consisting of risk control, security control and users control is proposed for personal information protection and management in the provision of networked services in China. The study shows that not enough attention has been paid to the personal information protection and management from multi-disciplinary perspectives with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in the literature. There is a lack of understanding of What, why and how personal information is protected and managed in real-world practices in China. Practical implications - The investigation of the issues of personal information protection and management with respect to the relevant laws, polices, standards, networked services and organizations can lead to a better understanding of what, why and how personal information is protected and managed in real-world practices in China. The development of a comprehensive concept map for personal information protection and management can be used as an effective guideline for the formulation and implementation of appropriate strategies and policies in individual organizations for providing their stakeholders with quality-networked services in today's highly connected network environment in China. Originality/value - The paper is the first step of a comprehensive study on the protection and management of personal information for the provision of networked services in China. It provides a solid foundation for further research with respect to the personal information protection and management. It is the first of this kind of studies to answer the questions of what types of personal information needed to be protected, why and how they should be protected in conformity with laws, regulations, polices, standards and the needs of networked services and business activities of organizations.
引用
收藏
页码:1047 / 1064
页数:18
相关论文
共 50 条
  • [1] Legal Requirements for Effective Personal Information Protection through Information Resources Management for Chinese Public Services
    An, Xiao-Mi
    Bai, Wen-Lin
    Sun, Shu-Yang
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ECONOMIC MANAGEMENT AND TRADE COOPERATION, 2014, 107 : 427 - 432
  • [2] Using Internet Services for Personal Information Management
    Majid, Shaheen
    San, Myint Malar
    Tun, Saw Tin Naung
    Zar, Thu
    TECHNOLOGICAL CONVERGENCE AND SOCIAL NETWORKS IN INFORMATION MANAGEMENT, 2010, 96 : 110 - 119
  • [3] Applied Research on Personal Knowledge Management Based on the Concept Map
    Fu, Ke
    Jiang, Kewei
    Fu, Dan
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 2191 - 2196
  • [4] Information commons: Concept of disclosing public information in an era of personal privacy and information protection
    Enami, Toshihiro
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 159 - 167
  • [5] High performance networked computing in media, services and information management
    Kou, Gang
    JOURNAL OF SUPERCOMPUTING, 2013, 64 (03): : 830 - 834
  • [6] High performance networked computing in media, services and information management
    Gang Kou
    The Journal of Supercomputing, 2013, 64 : 830 - 834
  • [7] Personal information management using concept mapping software
    Tramullas, Jesus
    Sanchez-Casabon, Ana-I.
    Garrido-Picazo, Piedad
    PROFESIONAL DE LA INFORMACION, 2009, 18 (06): : 601 - 612
  • [8] A Study on Information Security Management with Personal Data Protection
    Huang, Chien-Cheng
    Farn, Kwo-Jean
    Lin, Frank Yeong-Sung
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 624 - 630
  • [9] The concept of "personal information" in the Protection of Personal Information Act 4 of 2013 - a comparative analysis from a European perspective
    Baumann, Jonas S.
    Ismail, Nazreen
    TYDSKRIF VIR DIE SUID-AFRIKAANSE REG, 2021, (04) : 718 - 753
  • [10] Privacy in Chinese iOS apps and impact of the personal information protection law
    Kollnig, Konrad
    Zhang, Lu
    Zhao, Jun
    Shadbolt, Nigel
    COMPUTER LAW & SECURITY REVIEW, 2024, 55