Font Size: a A A

Study On Privacy Issues Of Internet Technology

Posted on:2015-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiFull Text:PDF
GTID:2266330428977645Subject:Philosophy of science and technology
Abstract/Summary:PDF Full Text Request
The swift development of network technology makes the fields such as science and technology, economy, culture, education and the politics of society have occured deep change to human life and has brought, is maximum and convenient. However, network brings the prosperous, convenient time and space limit of having at the same time also broken traditional conceal right protective screen to mankind, gives people way of life with viewpoint of value think of to bring maximum impact. Network can not only make use and the free inquiry of people net the information owned, can still trail, record and stock everybody the various campaigns on net. The openness of network, is easy to peep steal sex and unreliability make the conceal of people expose very easily in world, make personal information encounter improperly collect, propagate and use, the life with peaceful people encounter serious puzzle. Under network technical background intrude personal conceal right incident occur again and again, and recover to develop recover strong, people have to be overcautious. It does not be intruded by other person that network society protects personal conceal, it is the matter that need to now solve urgently.This paper has first listed network conceal right to get the present situation that hurt, then starts with from phenomenon, goes deep into analysis for its source. First, network technology is that mankind has opened up limitlessly wide vivosphere, it can be more healthy, more free to link up and exchange if people pass through network technology, but because of people the technology for network use improperly, for the transitional pursue of network freedom, is want is, have brought unprecedented impact and challenge to personal conceal, make network technology occur alienation. Secondly, technology is created by mankind, technology utilize grasp in human self on hand, is for it "good" or " is bad " utilize rely on the value orientaton of human self completely, however morals standard have decided human value orientaton. In now network society, network main value standard arises deviation, network social morals standard system is short of to lose as well as huge commercial benefit urge, is the morals of network main part lose Fan, conceal right suffers the source that hurt. Final, government for network superintendency do not perfect, especially our country still has a lot of defects in the aspect of network superintendency, for instance, in network superintendency technical aspect the legal regulations of protective network conceal right aspect, as well as the conducted machinemade aspect of network superintendency do not perfect, also make network conceal right get to intrude very easily.Article final, have put forward the related countermeasure of the protective perfect network conceal right of our country. First, will perfect the technical system of protective network conceal right, develop more advanced network technology, increase the safety of network, offer powerful technology backing to protect network conceal right. However technology do not be all-purpose, protect network conceal right, need to strengthen the morals restraint of network society, raise the morals mastery of network main part, train netizen from law consciousness. Besides, in our country, need to still strengthen profession from law construction, strengthen the legal rule system of government for network superintendency, strengthen international cooperation, all-directional much angle at the same time adopt measure, carry out " synthesize to administer ". Only so, network conceal right problem then can solve thoroughly, internet just can dynasty positive upward, the direction development of harmonious health.
Keywords/Search Tags:Network technology, Personal conceal, Network conceal, Network conceal right
PDF Full Text Request
Related items