DOI QR코드

DOI QR Code

An Analysis of Linguistic Characteristics of Information Protection Policies to Improve the Effectiveness of Information Protection in Cloud Computing Services

클라우드 컴퓨팅 서비스의 정보보호 실효성 증진을 위한 정보보호 정책의 언어적 특성 분석

  • Received : 2020.09.02
  • Accepted : 2020.10.20
  • Published : 2020.10.28

Abstract

It is a reality that users do not know well what kind of information protection policy the cloud service provider presents to consumers. The purpose of this study is to find a way to improve the effectiveness of information protection by analyzing the content and linguistic characteristics of information protection policies provided by cloud service providers. In order to achieve the purpose of this study, we investigate the contents of information protection policies of 47 companies that provide cloud services and analyze the influence of linguistic characteristics to come up with a plan to increase the efficiency of cloud services. The research results showed that low readability due to comprehensive expression of technical processing methods, etc., could lead to legal disputes and to hinder the spread of cloud services. The research results can increase the effectiveness of information protection by suggesting items to be provided to users.ing, Privacy, confidentiality, linguistic characteristics, Accounting Information.

클라우드 서비스 제공자가 어떠한 정보보호정책을 소비자에게 제시하고 있는지 이용자는 잘 모르고 있는 것이 현실이다. 클라우드 서비스 공급자가 제공하는 정보보호 정책의 내용과 언어적 특성을 분석하여 정보보호의 실효성을 향상시킬 수 있는 방안을 찾고자 함이 본 연구의 목적이다. 연구 목적 달성을 위하여 클라우드 서비스를 제공하는 47개사의 정보보호 정책의 내용을 조사하고 언어적 특성이 미치는 영향을 분석하여 클라우드 서비스의 효율성을 높일 수 있는 있는 방안을 마련하고자 한다. 연구결과를 통해 기술적 처리방법의 포괄적 표현 등으로 인한 낮은 가독성이 법적 분쟁의 소지는 물론 클라우드 서비스의 확산에 방해가 될 수 있는 요인으로 나타났다. 연구결과는 이용자들에게 제공하여야 할 사항들을 제언함으로써 정보보호의 실효성을 높일 수 있을 것이다.

Keywords

References

  1. C. Modi, D. Patel, B. Borisaniya A. Patel & M. Rajarajan. (2013). A Survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, 62(2), 561-592. DOI : 10.1007/s11227-012-0831-5.
  2. F. Shajzad. (2014). State of the art survey on cloud computing security. Challenges, approaches and solutions. Procedia Computer Science, 37, 357-362. DOI: 10.1016/j.procs.2014.08.053
  3. S. Pearson. (2009). Taking account of privacy when designng cloud computing services. In 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE. http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf
  4. J. J. Collins. (2015). Online accounting systems: Accounting for cloud security. http://www.journalofaccountancy.com/issues/2015/sep/accounting-sytems-cloud-security.html
  5. G. R. Miline & M. J. Culnan. (2004). Strategiesofr reducing online privacy risks: Why consumers read (or don't read) online privacy notices, Journal of Interactive marketing, 18(3), 15-29. DOI : 10.1002/dir.20009
  6. P. Mell & T. Grance. (2011). The NIST definition of cloud computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
  7. C. Rong, S. T. Nguyen & M. G. Jaatun. (2013). Beyonf lightning: A Survey on security challenges in cloud computing, Computers & Electrical Engineering, 39(1), 47-54. DOI: 10.1016/j.compeleceng.2012.04.015
  8. E. McCallister, T. Grance & K. A. Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Vol. 800, No. 122). Diane Publishing. https://csrc.nist.gov/publication/nistpubs/800-122/sp800-122.pdf
  9. A. K. VasanthaAzhagu & J. Gnanasekar. (2016). Cloud Computing Overview, Security Threats and Solutions-A Survey. Proceedings of the International Conference on Informatics and Analytics, Pondicherry, India, August 25-26.
  10. H. Salcedo. (2014). Google Drive, Dropbox, Box and iCloud reach the top 5 cloud storage security breaches list, Hitachi http://psg.hitachi-solutions.com/credeon/blog/google-drive-droopbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list
  11. N. Steinfield. (2016). "I agree to the terms and conditions": (How do users read privacy policies online? An eye-tracking experiment, Computers in Human Behavior, 55, 992-1000. DOI : 10.1016/j.chb.2015.09.038.
  12. A. Seshagiri. (2013). Claims that Google violates Gmail user privacy, The NewYork Times (October 1). http://www.nytimes.com/interactive/2013/10/02/technology/google-email-case.html
  13. H. N. Chua, A. Herbland, S. F. Wong & Y. Chang. (2017). Compliance to personal data protection principles: A Study of how organizations frame privacy policy notices, Telematics and Informatics, 34(4), 157-170. DOI : 10.1016/j.tele.2017.01.008.
  14. K. W. Wu, S. Y. Huang, C. Yen & I. Popova. (2012). The effect of online privacy on consumer privacy concern and trust, Computers in Human Behavior, 28(3), 889-897. DOI : 10.1016/j.chb.2011.12.008
  15. S. Bradshaw, C. Millard & I. Walden. (2011). Contracts of clouds : Comparisionand analysis of the Terms and Conditions of cloud computing services, International Journal of Law and Information Technology, 19(3), 187-223. DOI : 10.1093/ijlit/ear005
  16. S. Goel & J. Gangolly. (2012). Beyond the numbers: Mining the annual reports for hidden cues indicative of financial statement fraud, Intelligent Systems in Accounting, Finance & Management 19(2), 75-89. DOI : 10.1002/isaf.1326.
  17. V. L. Rubin, E. D. Liddy & N. Kando. (2006). Certainty identification in texts: Categorixation model and manual tagging results. In Computing Attitude and Affect in Text: Theory and Applications, 61-76. Dordrecht, The Netherlands: Springer.
  18. E. Henry. (2006). Market reaction to verval components of earnings press releases: Event study using a predictive algorithm, Journal of Emerging Technologies in Accounting 3(1), 1-19. DOI : 10.2308/jeta.2006.3.1.1.
  19. H. S. Asay, W. B. Elliott & K. Rennekamp. (2017). Disclosure readability and the sensitivity of invsetors' valuation judgements to outside information, The Accounting Review 92(4), 1-25. DOI : 10.2308/accr-51570.
  20. R. Chun. (2017). How virtuous global firms say they are: A content analysis of ethical values, Journal of Business Ethics, 155(1), 57-73. DOI : 10.1007/s10551-017-3525-3.
  21. T. Loughran & B. McDonald. (2014). Measuring readability in financial disclosures, The Journal of Finance, 69(4), 1643-1671. DOI : 10.1111/jofi.12162.