IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v22y2020i1d10.1007_s10796-020-09984-5.html
   My bibliography  Save this article

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach

Author

Listed:
  • Jae Kyu Lee

    (Xi’an Jiaotong University
    College of Business, KAIST)

  • Younghoon Chang

    (Beijing Institute of Technology)

  • Hun Yeong Kwon

    (Korea University)

  • Beopyeon Kim

    (Korea University)

Abstract

The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research proposes to design the Internet infrastructure using the preventive cybersecurity measures of the Bright Internet, namely preventive cybersecurity protocol and identifiable anonymity protocol, and ten privacy rights derived from Europe’s General Data Protection Regulations (GDPR). We then analyze the legitimacy of the five steps of the preventive cybersecurity protocol and the four features of the identifiable anonymity protocol from the perspectives of ten privacy rights. We address the legitimacy from the perspective of potential victims’ self-defense rights. Finally, we discuss four potential risks that may occur to the innocent senders and proposed resilient recovery procedures.

Suggested Citation

  • Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
  • Handle: RePEc:spr:infosf:v:22:y:2020:i:1:d:10.1007_s10796-020-09984-5
    DOI: 10.1007/s10796-020-09984-5
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-020-09984-5
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-020-09984-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
    2. Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh, 0. "Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework," Information Systems Frontiers, Springer, vol. 0, pages 1-15.
    3. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    4. Jingguo Wang & Nan Xiao & H. Raghav Rao, 2015. "Research Note—An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior," Information Systems Research, INFORMS, vol. 26(3), pages 619-633, September.
    5. Paul John Steinbart & Mark J. Keith & Jeffry Babb, 2016. "Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication," Information Systems Research, INFORMS, vol. 27(2), pages 219-239, June.
    6. Mousa Albashrawi & Luvai Motiwalla, 2019. "Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective," Information Systems Frontiers, Springer, vol. 21(5), pages 1031-1043, October.
    7. I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.
    8. Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind, 2019. "How Data Protection Regulation Affects Startup Innovation," Information Systems Frontiers, Springer, vol. 21(6), pages 1307-1324, December.
    9. Ravi Inder Singh & Manasa Sumeeth & James Miller, 2011. "A user-centric evaluation of the readability of privacy policies in popular web sites," Information Systems Frontiers, Springer, vol. 13(4), pages 501-514, September.
    10. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    11. Jae Kyu Lee, 2016. "Invited Commentary—Reflections on ICT-enabled Bright Society Research," Information Systems Research, INFORMS, vol. 27(1), pages 1-5, March.
    12. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
    13. Nong Ye & Toni Farley & Deepak Lakshminarasimhan, 2006. "An attack-norm separation approach for detecting cyber attacks," Information Systems Frontiers, Springer, vol. 8(3), pages 163-177, July.
    14. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    15. MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
    16. Eytan Adar & Rajan Lukose & Caesar Sengupta & Josh Tyler & Nathaniel Good, 2003. "Shock: Aggregating Information While Preserving Privacy," Information Systems Frontiers, Springer, vol. 5(1), pages 15-28, January.
    17. Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh, 2017. "Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework," Information Systems Frontiers, Springer, vol. 19(4), pages 753-767, August.
    18. Athanasios Loukas & Dimitrios Damopoulos & Sofia A. Menesidou & Maria E. Skarkala & Georgios Kambourakis & Stefanos Gritzalis, 2012. "MILC: A secure and privacy-preserving mobile instant locator with chatting," Information Systems Frontiers, Springer, vol. 14(3), pages 481-497, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Dan J. Kim & Indranil Bose & Arunabha Mukhopadhyay, 2023. "Special Issue on Bright Information and Communication Technologies in the 21st Century," Information Systems Frontiers, Springer, vol. 25(5), pages 1661-1665, October.
    2. Jae Yeon Kim & Jaeung Sim & Daegon Cho, 2023. "Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why," Information Systems Frontiers, Springer, vol. 25(5), pages 1683-1694, October.
    3. Paras Bhatt & Naga Vemprala & Rohit Valecha & Govind Hariharan & H. Raghav Rao, 2023. "User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse," Information Systems Frontiers, Springer, vol. 25(5), pages 1667-1682, October.
    4. R. Ramesh & H. R. Rao, 2020. "ISF Editorial 2020," Information Systems Frontiers, Springer, vol. 22(1), pages 1-9, February.
    5. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    6. Supunmali Ahangama, 2023. "Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis," Information Systems Frontiers, Springer, vol. 25(5), pages 1695-1711, October.
    7. Ben Krishna & Satish Krishnan & M. P. Sebastian, 2023. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers, Springer, vol. 25(5), pages 1713-1741, October.
    8. Antonia Russo & Gianluca Lax & Baptiste Dromard & Menad Mezred, 2022. "A System to Access Online Services with Minimal Personal Information Disclosure," Information Systems Frontiers, Springer, vol. 24(5), pages 1563-1575, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Alraja, Mansour, 2022. "Frontline healthcare providers’ behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
    3. Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind, 2019. "How Data Protection Regulation Affects Startup Innovation," Information Systems Frontiers, Springer, vol. 21(6), pages 1307-1324, December.
    4. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    5. Gregor Dorfleitner & Lars Hornuf & Julia Kreppmeier, 2021. "Promise not Fulfilled: FinTech Data Privacy, and the GDPR," CESifo Working Paper Series 9359, CESifo.
    6. Gregor Dorfleitner & Lars Hornuf & Julia Kreppmeier, 2023. "Promise not fulfilled: FinTech, data privacy, and the GDPR," Electronic Markets, Springer;IIM University of St. Gallen, vol. 33(1), pages 1-29, December.
    7. Warut Khern-am-nuai & Matthew J. Hashim & Alain Pinsonneault & Weining Yang & Ninghui Li, 2023. "Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments," Information Systems Research, INFORMS, vol. 34(1), pages 157-177, March.
    8. Robert E. Crossler & France Bélanger & Dustin Ormond, 2019. "The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats," Information Systems Frontiers, Springer, vol. 21(2), pages 343-357, April.
    9. Kasim, Kabir O. & Winter, Scott R. & Liu, Dahai & Keebler, Joseph R. & Spence, Tyler B., 2021. "Passengers’ perceptions on the use of biometrics at airports: A statistical model of the extended theory of planned behavior," Technology in Society, Elsevier, vol. 67(C).
    10. Chulmo Koo & Francesco Ricci & Cihan Cobanoglu & Fevzi Okumus, 2017. "Special issue on smart, connected hospitality and tourism," Information Systems Frontiers, Springer, vol. 19(4), pages 699-703, August.
    11. Linyuan Liu & Haibin Zhu & Shenglei Chen, 2022. "Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition," Mathematics, MDPI, vol. 10(10), pages 1-33, May.
    12. Yunxiang Zhang & Xianmin Song & Pengfei Tao & Haitao Li & Tianshu Zhan & Qian Cao, 2023. "Investigating Factors for Travelers’ Parking Behavior Intentions in Changchun, China, under the Influence of Smart Parking Systems," Sustainability, MDPI, vol. 15(15), pages 1-16, July.
    13. Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
    14. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    15. Anupriya Khan & Satish Krishnan & Jithesh Arayankalam, 2022. "The Role of ICT Laws and National Culture in Determining ICT Diffusion and Well-Being: A Cross-Country Examination," Information Systems Frontiers, Springer, vol. 24(2), pages 415-440, April.
    16. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
    17. Sophie Cockcroft & Saphira Rekker, 2016. "The relationship between culture and information privacy policy," Electronic Markets, Springer;IIM University of St. Gallen, vol. 26(1), pages 55-72, February.
    18. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    19. Andrea North-Samardzic, 2020. "Biometric Technology and Ethics: Beyond Security Applications," Journal of Business Ethics, Springer, vol. 167(3), pages 433-450, December.
    20. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:22:y:2020:i:1:d:10.1007_s10796-020-09984-5. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.