Font Size: a A A

The Security Research Of The Personal Information Based On Mobile Internet

Posted on:2014-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:X GongFull Text:PDF
GTID:2268330422465078Subject:Press and Communication
Abstract/Summary:PDF Full Text Request
In the mobile Internet era, the value of the user’s personal information has beenunprecedented highlighted. The commercial value of "big data" will lead to a huge change.However, the user’s personal information has become a profit means in the process ofcommercialization. Excessive collection of information, data transaction, hacker invasionand malicious programs bring great threats to protect personal information.This article aims to clarify the personal information security status and informationdisclosure channels in the mobile internet environment. First, this article idea is to explainthe new connotation of personal information based on mobile internet, which includes themobile identity information, the mobile behavior information, mobile social networkinginformation and the mobile terminal information. Second, it tries to analyze the status ofpersonal information security from the point of view of users and Internet companies.The survey of personal information protection for college students has explain the users’awareness of information and Internet security behavior in an objective view. Besides, thispaper also analyze internet service provider’s attitude and behavior for personalinformation protection. Third, it summarizes the four main factors of the informationdisclosure, which includes the excessive collection of personal information, maliciousprograms and fake applications, the illegal data transactions chain, and platformmanagement security vulnerabilities.The study shows that the current situation of the mobile internet personal informationsecurity is not optimistic, and information disclosure is serious. But It doesn’t exist anabsolute contradiction between the information exchange and protection, the mostimportant is to build a series of reasonable operation rules, so I consider that the key ofprotecting personal information is to control the irrational spreading of personalinformation, including source control and path control. The essence of the informationprotection is keeping balance between information protection and information exchange,and according to this, the article gives some relevant suggestions.
Keywords/Search Tags:Mobile internet, Big data, Personal information security, Information protection
PDF Full Text Request
Related items