Font Size: a A A

Research On Personal Information Security Ecosystem

Posted on:2012-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:M MaFull Text:PDF
GTID:2218330371452811Subject:Information economy
Abstract/Summary:PDF Full Text Request
After entering the 21st century information age, along with the development of information technology, people's living habits, living status, and inner world etc. had appeared dramatic change, particularly, the appearance of various network services makes lots of personal information stored in network. In various network specifications were not perfect case, the personal information is being disseminated in the network and facing serious security threat.Facing the threat of personal information security, people began to do personal information security research. At present, scholars'study is concentrated in the establishment of sound mechanism for protection of personal information and personal information protection system, civil protection of personal information and personal information protection law, etc., especially the research on legal protection of personal information. Scholars who are from various countries have studied the legislation model of personal information security protection; besides, they have studied China's laws which give direct and indirect protection to personal information, administrator of personal information for self-regulatory mechanism and industry self-regulatory mechanism have been studied too. According to the research, although there are many Chinese laws and regulations protecting personal information, the number is little and the scope is relatively narrow, there is no specific Personal Information Protection Act which can be used by all industry, many scholars are committed to develop our country's personal information protection law.Personal information is important community resource, we must make a balance between its reasonable use and security protection, do not move towards two extremes. We mustn't prevent its reasonable flow in order to protect it and mustn't damage information owners'legitimate interests owing to its circulation. We must achieve the ecological balance between personal information use and sustainable development of information resources. Now, in terms of small, the problem of personal information security, has threaten the peace of people's lives, more seriously, has impeded lots of enterprise's development in the international trade. The personal information protection is imminent, we need to construct a personal information security ecological system, and this article is to discuss this issue.In this paper, I did personal information security research using related theory of ecological system. In the process of research, I mainly used literature research method, comparative research method, combination of theory and examples, interpretation of analogical study method. According to the research scope of this paper, its structure is divided into five sections. First is preface which puts forward the research content and introduces the literature review of personal information safety protection, research purpose and meaning, research background and so on. Next is the basic theory of personal information protection which analyzed the composition of personal information, characteristics and why protect personal information. The third section analyzed and studied the basic content of personal information security, which contains what personal information security is, risks that personal information security faces and harm which personal information security problems bring. The fourth chapter introduced ecological system theory, including the concept of ecosystem, composition and ecosystem theory application fields.Chapter 5 is the establishment of personal information security ecological system. First, this chapter analyzed the ecological theory of personal information security, telling what information ecosystem and personal information security system are, then analyzed and studied the basic elements of ecological personal information security ecosystem and the relationship between the elements.Through the study, I summarized the structure model of personal information security ecosystem, and introduced how to build personal information security ecological system through the environment construction analysis, personal information safety knowledge popularization and the set of behavior standard.In chapter 6, I make a summary on the whole paper and prospect the personal information security ecological system in the future.The innovative points of this paper, first is using ecosystem theory to do personal information security research. I deduced the concept of personal information security ecosystem according to the concept of natural ecological system, and designed the structure model of personal information security ecological system through the analysis of ecological system elements and their relationship. At the same time, according to concept of the food chain in the natural ecological system, I analogized what personal information ecology chain is, the personal information's flow among information owner, managers, handlers and post-processing personnel. Second, when analyzing the basic norms and principles which should be followed by personal information collectors, processers and users, I didn't only tell the concept of them, but analyzed which principles should be focused on and how to follow these principles.Because my knowledge is limited, this paper has many insufficient places, for example, I can't give further analysis to the relationship among the component elements of the personal information security ecosystem. I hope teachers give me more criticisms and suggestions...
Keywords/Search Tags:personal information, ecosystem, information security, personal information ecology chain
PDF Full Text Request
Related items