{"title":"An Analysis of Data Spillage in Korea: Focus on Framework Transition, 1984-2014","authors":"Eunmi Lee, H. Cho, Seo Hwa Jeong","doi":"10.1145/2912160.2912178","DOIUrl":null,"url":null,"abstract":"This article analyses the framework transition of data spillage in Korea from 1984 to 2014. To investigate this transition, newspaper article titles were collected and analyzed. This study adopted the classification, text network analysis (by co-occurrence symmetric matrix), and clustering techniques as part of its social network analysis. Using the definition of network centrality, it found a primary framework, which was divided into periods. As a result of the identified framework shifts, the accessibility of personal information has extended from the public sector to the private sector, and the boundary of data spillage has expanded overseas. Therefore, it is urgent to institutionalize the protection of personal information from a global perspective.","PeriodicalId":270321,"journal":{"name":"Proceedings of the 17th International Digital Government Research Conference on Digital Government Research","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th International Digital Government Research Conference on Digital Government Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2912160.2912178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article analyses the framework transition of data spillage in Korea from 1984 to 2014. To investigate this transition, newspaper article titles were collected and analyzed. This study adopted the classification, text network analysis (by co-occurrence symmetric matrix), and clustering techniques as part of its social network analysis. Using the definition of network centrality, it found a primary framework, which was divided into periods. As a result of the identified framework shifts, the accessibility of personal information has extended from the public sector to the private sector, and the boundary of data spillage has expanded overseas. Therefore, it is urgent to institutionalize the protection of personal information from a global perspective.