In the mobile Internet era, the value of the user’s personal information has beenunprecedented highlighted. The commercial value of "big data" will lead to a huge change.However, the user’s personal information has become a profit means in the process ofcommercialization. Excessive collection of information, data transaction, hacker invasionand malicious programs bring great threats to protect personal information.This article aims to clarify the personal information security status and informationdisclosure channels in the mobile internet environment. First, this article idea is to explainthe new connotation of personal information based on mobile internet, which includes themobile identity information, the mobile behavior information, mobile social networkinginformation and the mobile terminal information. Second, it tries to analyze the status ofpersonal information security from the point of view of users and Internet companies.The survey of personal information protection for college students has explain the users’awareness of information and Internet security behavior in an objective view. Besides, thispaper also analyze internet service provider’s attitude and behavior for personalinformation protection. Third, it summarizes the four main factors of the informationdisclosure, which includes the excessive collection of personal information, maliciousprograms and fake applications, the illegal data transactions chain, and platformmanagement security vulnerabilities.The study shows that the current situation of the mobile internet personal informationsecurity is not optimistic, and information disclosure is serious. But It doesn’t exist anabsolute contradiction between the information exchange and protection, the mostimportant is to build a series of reasonable operation rules, so I consider that the key ofprotecting personal information is to control the irrational spreading of personalinformation, including source control and path control. The essence of the informationprotection is keeping balance between information protection and information exchange,and according to this, the article gives some relevant suggestions. |