Font Size: a A A

The Research On Privacy Protection Of Subscribers Of Shandong CMCC

Posted on:2014-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:G D ZhangFull Text:PDF
GTID:2248330395999785Subject:Business administration
Abstract/Summary:PDF Full Text Request
Subscriber information is an important content of Personal Privacy. With the development of economy and society, especially the on-coming information times, increasingly importance has been attached to the protection of personal privacy. But there are also many privacy leakage cases. In2009, CCTV exposed the fact that some employees had the personal privacy of subscribers leaked, such caused the attention of the society.The article first makes an outline of personal privacy leak and Shandong CMCC, then focus on the theory of privacy and the right of privacy and information security of enterprise, including the origin, contents, protection of privacy and privacy right, the influencing factors and ways of information security of enterprise. Then the article analyzes the society inducements that cause personal privacy leakage, including the situation of privacy leakage in information society, the ways and characters of privacy leakage, mainly mentions the cause of privacy leakage:interest driving, moral issues, technology issues, personal issues. Following this, the article analyzes the organization inducements of personal privacy leakage; briefly describes the current situation of Shandong CMCC, ways of privacy leakage. Then analyzes the causes of privacy leakage through fishbone diagram, management factors, technology factors, personal factors are included. Using structured analysis method, the article makes the improvement plans:in the aspect of management, to improve organization structure, to improve management mechanism, to enhance management on the third party, to carry out monitoring, in the aspect of technology, to be on guard against hacker, to research on new technology, in the aspect of employees, to make training.The article also analyzes the implementation effect of the above-mentioned matter, introduces the improvement in management mechanism, employees training, technology structure. At last, the article evaluates the implementation effects and makes a contrast.
Keywords/Search Tags:Privacy Protection, Information Management, Privacy leakage, Information Technology
PDF Full Text Request
Related items