SWOT Matrix Enhancement For Online Protection of Personal Information
SWOT Matrix Enhancement For Online Protection of Personal Information
Information
Da-Yu Kao
Department of Information Management, Central Police University, Taiwan
No. 56, Shujen Rd., Takang Village, Kueishan Hsiang, Taoyuan County, 33304, Taiwan
[email protected]
Abstract
Rapid improvements in computing technologies have increased concerns about
information privacy. Protecting online information for many organizations may be an
impossible task. SWOT is as an acronym for strengths, weaknesses, opportunities, and
threats. Reviewing SWOT analyses and its matrix strategies gives a broad overview of the
legal and practical issues. The proposed privacy enhancement based on SWOT analysis and
its matrix development improves online information privacy. The following strategies are
applied to solving personal information processing problems: (1) plan new projects; (2)
deploy team leadership; (3) follow suitable procedures; and (4) apply new technologies.
Recommendations for privacy and security good practices for information managers are
provided. We have applied these strategies to Taiwan government agencies many times, and it
has been endured real testifying.
1. Introduction
Information technology is bringing together people from around the country and around
the world. Personal privacy is being increasingly eroded as modern technologies evolve [20].
In fact, many groups, individuals and firms feel that they are losing control over their own
information and information that refers to them.
1.1 An Online Change in Personal Information Privacy
Personal information is readily available on the internet. Common definitions for privacy
protection include being able to control release of information about oneself to others and
being free from intrusions or disturbances in one’s personal life [10]. Furthermore, the term
“privacy” has many meanings, each of which depends on the context in which it is used.
Among the many information technologies that increasingly impact privacy, the internet
offers many possibilities to collect, process, and distribute personal data. Privacy protection,
often a vague concept, is the ability to control the acquisition and use of one’s personal
information. Many countries recognize the right to privacy [7]. Unfortunately, many users are
oblivious about online privacy and accept the fact that their online privacy will be
1
2 SWOT Matrix Enhancement for Online Protection of Personal Information
compromised.
As human activities have migrated to the internet, the number of information systems is
increasing daily. Online shopping is becoming a major economic force; as such ecommerce
must strike a balance between privacy and security. Online activities, including electronic
cash and mobile payments, are proving superior to conventional monetary instruments [3].
However, significant security/privacy problems have emerged. The concern about the
collection of personal information in various contexts is widespread. Rapid improvements in
computing technologies have increased the concern about personal information privacy. Once
one shares personal information, control over this information is lost. Different parties may
have opposing interests and views about individual information. For many, online privacy is
related to human dignity, which can be compromised by the proliferation of personal
information.
1.2 An International Trend in Personal Information Protection
Many organizations collect massive amount of data about individuals. Media reports
show that citizens are increasingly concerned about information protection and their rights.
Privacy concerns have resulted in many laws and regulations. Dealing with potential privacy
invasions proactively could preclude government interventions that tighten controls over what
can be done with an individual’s personal data. Personal information incudes name, birthdate,
Identification card numbers, passport number, personal characteristics, fingerprints, marital
status, family composition, education, occupation, medical records, medical treatments,
genetic code, sexual practices, health examination findings, criminal records, financial status,
social activities and other information that may be used to identify a person, both directly and
indirectly [19]. Privacy rules differ markedly among countries, and these differences threaten
to hamper the ability of international organizations to engage in transactions on the internet
without risk of incurring penalties. In 1980, the Organization for Economic Co-operation and
Development (OECD), a global group, published guidelines to harmonize the collection and
use of personal information by governments and private organizations [10]. Widespread
concerns were the impetus for new legislation. In 1998, the U.S. Congress enacted the
Children’s Online Privacy Protection Act to regulate the online collection and use of personal
information about minors. Many interactions between consumers and organizations have
changed significantly [18]. The USA Federal Trade Commission released a report on a
preliminary framework for protecting consumer privacy; this framework had three major
elements: (1) organizations should integrate privacy concept into their regular operations; (2)
provide choices to consumers in a simpler, more streamlined manner; and (3) improve the
transparency of all data practices [9].
Widespread privacy concerns gave impetus to the development of new privacy
legislation. Laws and regulations in the USA, Australia, Canada, Hong Kong, or Taiwan have
been extended to protect consumer credit reports, electronic communications, agency records,
education records, bank records, cable subscriber information, video rental records, motor
vehicle records, health information, telecommunications subscriber information, and customer
Journal of Information, Technology and Society 3
financial information [17]. In 2010, Taiwan’s Personal Information Protection Act was
amended to cover the collection, process, use and transmission of personal information and
thereby protect personal privacy]. However, no comprehensive statute protects online
personal information. Online information privacy is important and people desire control over
their personal information and its collection, use, and transmission. Privacy protection relies
on both legislation and self-regulation [11]. An organization may have personal information
about individuals, and its collection and use must be for legitimate purposes. To balance the
rights of organizations to gather data with the rights of an individual, the process of handling
personal information should be regulated to protect personal data. The shift to a digital
environment has altered our understanding of privacy protection [6]. First, it alters our
understanding of the digital context in which incidents occur and the evidence where potential
artifacts are stored. Second, our understanding facilitates new criminal offenses. Third, our
understanding produces significant changes in managing online threats. Fourth, our
understanding presents new challenges to existing legal processes. This study discusses the
online protection of personal information based on SWOT analyses and its matrix strategies.
The internal/external factors of personal information protection are analyzed. The following
strategies are proposed and applied to solving personal information processing problems: (1)
plan new projects; (2) deploy team leadership; (3) follow suitable procedures; and (4) apply
new technologies. We have applied these strategies to Taiwan government agencies many
times, and it has been endured real testifying.
The remainder of the paper is organized as follows. The literature review is given in
Section 2. Section 3 presents a practical SWOT analysis on online privacy issues. The
multi-faceted SWOT analyses address strengths, weaknesses, opportunities, and threats.
Section 4 presents the SWOT matrix strategies for online privacy protection. Finally,
conclusions are provided in Section 5.
2. Reviews
Changes in individual privacy rights can be understood in the context of a balance
between government needs and civil liberties. Online researchers typically exploit digital data
to discover knowledge embedded in individual records. The following subsections discuss the
questions that are generally the most important to internet users.
2.1 Trust Relationship and Personal Information Protection
An organization can develop consumer trust and make investment decisions about
technology infrastructure using a well-designed information policy. The cyberspace
infrastructure facilitates easy and inexpensive collection of personal information. Effective
privacy professionals generally combine their instincts and sound processes to minimize
privacy breaches [18]. Many opinions and theories exist about privacy protection worldwide.
Some commentators have proposed that laws should grant individuals a property right to their
personal data [20]. Such a property right would enable individuals to trade and barter with
their personal information. The ability to gather information on individuals is largely due of
4 SWOT Matrix Enhancement for Online Protection of Personal Information
decisions that will create best tomorrow. Strengths can be anything that is favorable for an
organization [8, 15, 20]:
- Skilled or experienced staffs.
- Current or superior IT.
- Good or known reputation.
- Strong financial resources.
- Efficient or up to date equipment.
- Sufficient financial resources to fund any positive changes.
- A proper handling process in personal information protection.
(2) Weaknesses: Fail to Change Management Processes
Weaknesses may hinder problem solving capability. Weaknesses are core capabilities of
an organization where competitors have an advantage, which customers value. In addition to
technical factors, issues are related to budgets, managerial support, and staff. Privacy
invasions can be ubiquitous and invisible. Organizations should involve individuals in the use
of personal information and consent should be given before an individual’s data is collected,
processed, and used. Vulnerabilities can be eliminated or minimized by strengthening security.
Recognizing weaknesses requires that individuals are honest and realistic. The following is
list of example weaknesses [8, 15, 20]:
- Unskilled or inexperience staffs.
- Past or inferior IT.
- Bad or unknown reputation.
- Inefficient or outdated equipment.
- Insufficient financial resources to fund any positive changes.
- An improper handling process in personal information protection.
3.2 External Factor
While the internet plays a critical role, most users are not well informed about the
potential impact of collected personal data. Many organizations are reliant on information
about potential customers. Personal information is routinely collected for profiling, tracking
and targeting. When a user makes a purchase, browses the internet, or responds to a survey,
their identity is typically revealed. Consumers generally fear the loss of their financial data,
and websites fear break-ins. Websites and consumers must explore security vulnerabilities and
evaluate potential risks. Opportunities and threats are external factors. The external
environment also determines whether an organization can improve its performance and profits.
External factors of influencing any environments encompass competition (stable or
increasing), R&D (superior or inferior), innovative skills (low or high), internet service
(broadband or non- broadband), regulations (tight or loose), and relationships (good or poor)
[15, 16, 20].
(1) Opportunities: Take a Constructive Attitude
Constructive attitudes attract people, as poor attitudes repel them. Much can be achieved
with constructive attitude. If one decides on to concentrate on the positive, a good attitude is
Journal of Information, Technology and Society 7
likely. While the privacy and security of personal information remain concerns, several
technological approaches have been proposed to safeguard personal privacy. The on-line
identity of IT can be used to track and analyze vast amounts of data. Acquiring a technical
capability is becoming easier with increasingly sophisticated tools and available guidance.
Effective solutions should necessarily encourage people to have a constructive attitude
regarding long-term privacy and security. The implementation of broadband internet increases
the likelihood of instantaneous service. The external factors of a development plan must to be
addressed by an organization. Opportunities for an organization can be influenced to achieve
his success [15, 16, 20]:
- Stable competition
- Superior knowledge in R&D department.
- High innovative skills to fulfill customers’ needs.
- Broadband internet service.
- Tight regulations.
- Good relationships with customers, suppliers, and employees.
(2) Threats: Increased the Number of Potential Vulnerabilities
The amount of high-value information that stored and communicated in cyberspace is
increasing. Organizations generally use online systems that reduce costs and improve
efficiency and quality. However, the proliferation of information technologies increases the
number of potential vulnerabilities. Vast quantities of personal data in a system often become
available for mining valuable knowledge. This also enhances the incentive for cybercrime for
profit or political advantage. Because transferred data is not encrypted on the internet,
everything sent or received is in plain text. A hacker can gain unauthorized access to
computers, disable networks, intercept traffic packets or destroy information systems with
commonly available applications.. Weaknesses can be immediate threats. An online system
may be a vulnerably for an organization. Hackers may use inexhaustible programs to free-ride
on others’ computers. Programs that assist is online attacks include network scanners, packet
sniffers, password crackers, buffer overflows. Threats are typically the following weaknesses
[15, 16, 20]:
- Increasing competition.
- Inferior knowledge in R&D department.
- Low innovative skills to fulfill customers’ needs.
- Non-broadband internet service.
- Loose regulations.
- Poor relationships with customers, suppliers, and employees.
organizations manage consumer information responsibly, some treat recklessly and do not
adequately respect privacy. When designing policies that ensure privacy and enhance security,
the relative roles played by government versus private initiatives are often considered [3].
Organizations should adopt responsible approaches to protect themselves online. Security
policies must account for human behavior by keeping alternatives simple and cheap. When
problems are well defined, policy makers can craft effective laws. This section discusses the
necessary strategies in SWOT analysis needed to make appropriate decisions about specific
circumstances or business requirements. To develop workable strategies, SWOT factor
analyses can be constructed in Table 2 [8, 16]. In Figure 1, Strategists can use this matrix to
create and introduce the following four strategies on privacy enhancement: Strengths
Opportunities (SO), Weaknesses Opportunities (WO), Strengths Threats (ST), and
Weaknesses Threats (WT) strategies. An organization’s strategy should be evolving and
changing to keep pace with internal and external changes. A key skill for any online
protection enhancement tasks is the ability to help an organization clarify these strategies and
develop specialized services on a segmented basis as required.
Traditionally the SWOT Matrix strategies have recognized four key strategies: SO, ST,
WO and WT. These strategies construct a hierarchy management pyramid with geometric
proportions illustrating the strong interdependent relationship between these strategies. In
Figure 2, the privacy enhancement hierarchy of management pyramid is proposed and
discussed in the following perspectives: visionary policy, team collaboration, control
Journal of Information, Technology and Society 9
procedure, and daily work. It is a graphic aid to illustrate that the IT success of privacy
management is measured by the team's ability to manage the online system. The expected
results are produced while an organization can manage its strategies, processes and
perspectives. Figure 2 also explores a set of related actions that managers may take to increase
their organizations’ performance on privacy enhancement. This hierarchical structure can
promote developing employees as specialists. Employees may narrow their field of focus and
become experts in IT privacy protection.
4.1 SO Strategies
The SO strategies use strengths to take advantage of opportunities, and leverage internal
strengths to capitalize on external opportunities.
4.1.1 SO Strategies: Plan New Projects
Based on preliminary experience, the following guidelines were developed [7, 16]:
(1) Implement an Insurance Policy for Security
Effective security can eliminate the direct costs of lost productivity and indirect costs of
reputation loss.
(2) Retain Passion for Innovation
A security incident may provide opportunities to exchange views. To safeguard an
organization, one should question the protection ways and develop ways to explore issues.
(3) Prevent Data Misuse
Personal privacy is under siege online and offline. Government intervention has
increased the responsibilities of organizations collecting personal information, and should
prevent data misuse.
10 SWOT Matrix Enhancement for Online Protection of Personal Information
5. Conclusions
Privacy is should be ensured for individuals in all societies. The privacy violation on the
internet is a significant problem and internet users have a right to adequate privacy. This study
examines some efforts to protect personal information, and provides a brief SWOT analysis of
privacy enhancement via an innovative online service. Strong security measures require may
resources. This study addresses privacy violations while using the internet. It also explores the
concept of privacy protection. The internet has provoked much discussion about how to
investigate crime and enforce criminal law. It has led to an increasing emphasis on new
systems of law enforcement. Privacy is well worth fighting for since it a fundamental right in
a democratic society. The proposed solution attempts to meet and discuss developments in
online activities for practitioners and policy makers of organizations. We hope these analyses
will encourage the development of efficient privacy practices over time through aggressive
public and private participation.
Acknowledgements
This research was partially supported by the Ministry of Science and Technology of the
Republic of China under the Grants MOST 103-2221-E-015-003-.
14 SWOT Matrix Enhancement for Online Protection of Personal Information
Reference
[1] Australia Government (Department of Defense), “2014 Australian Government
Information Security Manual Principles”, 2014:
http://www.asd.gov.au/publications/Information_Security_Manual_2014_Principles.pdf
。
[2] Australian Law Reform Commission, “For Your Information: Australian Privacy Law
and Practice (ALRC Report 108),” 2014:
http://www.alrc.gov.au/publications/report-108。
[3] Baddeley, M., ”A Behavioral Analysis of Online Privacy and Security,” 2014:
http://www.econ.cam.ac.uk/dae/repec/cam/pdf/cwpe1147.pdf。
[4] Canada Minister of Justice, “Personal Information Protection and Electronic Documents
Act 2000,” 2014: http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html。
[5] Casey, E., Handbook of Digital Forensics and Investigation, Burlington, Academic Press,
2010.
[6] Cotter, A. M., Law Society of Ireland - Information Technology Law, Cavendish
Publishing Limited, 2004.
[7] Ekberg, A. G. S., "Invasion of Privacy: Spam - One Result of Bad Privacy Protection,"
2014: http://www.essays.se/essay/fe577888cf/。
[8] Farhangi, A. A., Far, M. S. and Danaei, A., “Development SWOT Matrix for Strategic
Planning in Media Organizations,” International Journal of Business and Commerce,
2012, 1, (5), pp.1-12.
[9] Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change: A
Proposed Framework for Businesses and Policymakers,” A Preliminary Federal Trade
Commission Staff Report, December 2010.
[10] Stevens, G., "Privacy Protections for Personal Information Online," Congressional
Research Service Report, April 2011.
[11] Gross, G., “FTC Sticks With Online Advertising Selfregulation,” IDG News Service,
Febrary 2009.
[12] Jewkes, Y. and Yar, M., Handbook of Internet Crime, Willan Publishing, 2010.
[13] Jonathan, C., Principles of Cybercrime, Cambridge, Cambridge University Press, 2010.
[14] Marcella, A. J., Cyber Forensics: A Field Manual for Collecting, Examining, and
Preserving Evidence of Computer Crimes, Auerbach Publisher, 2008
[15] National Institute of Justice, Investigations Involving the Internet and Computer
Networks, U.S. Department of Justice, 2007.
[16] Nikolaou, I. E. and Evangelinos, K.I., “A SWOT Analysis of Environmental
Management Practices in Greek Mining and Mineral Industry,” Resources Policy, 2010,
35, pp. 226-234.
[17] Stevens, G., "Privacy Protections for Personal Information Online," Congressional
Research Service Report, April 2011.
[18]Lenard T. M. and Rubin, P. H., "Privacy and the Commercial Use of Personal Information:
Journal of Information, Technology and Society 15