Font Size: a A A

The Research Of Personal Privacy Information Security In The Era Of Big Date

Posted on:2019-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:J JiaFull Text:PDF
GTID:2416330596956202Subject:Public Management
Abstract/Summary:PDF Full Text Request
This article is forged base on the data collected both domestic and abroad.First,by using Conceptual Analysis Method,anatomy analysis is applied to the concept of big data and the concept of personal privacy,which acted as the directory for this study.Secondly,Experiential Summary Method is applied to analyze the series of incidents regarding private personal information leakage in recent years;and this article finds that,there exists under-development of key technologies for private personal information protection in this country.Thirdly,this country lacks the laws and regulations relating to the security of private personal information.Lastly,there are obvious deficiencies in the industry self-discipline and personal self-protection awareness,and yet to established a full range of personal privacy information protection system.Based on this,it is concluded that the government,enterprises and individuals are also inseparable as producers,collectors and users of personal privacy information,but the government as a supervisor and manager has unparalleled roles.On the one hand,the government needs to formulate Relevant laws and regulations,increase supervision,build a unified and standardized privacy platform and cultivate industry self-discipline,and provide a good environment and atmosphere for the protection of personal privacy information;on the other hand,the government should urge individuals to raise their awareness of self-protection and strengthen prevention.Understand relevant laws and systems to protect personal privacy information from the root.Based on the conclusions,the countermeasures and plans for the privacy of personal privacy information in the era of big data are proposed.
Keywords/Search Tags:big data, personal privacy information, information leakage, safety protection
PDF Full Text Request
Related items