Font Size: a A A

Research On The Problems And Countermeasures Of Personal Information Security In Social

Posted on:2016-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:H N ZhangFull Text:PDF
GTID:2278330461987629Subject:Books intelligence
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and the continuous improvement of information infrastructure in recent years, the scale of China’s Internet users continues to grow, the impact of social networking sites by people’s lifestyles,social way to a certain extent. At the same time, personal information security of personal information in a social environment which has becomes more important. With the continuous development of information technology, personal information is collected and also more likely to leak. Therefore, whether from individual social network, or from merchant sites, should pay attention to the protection of personal information security. Accordingly, the study of social networking sites as well as the personal information of insecurity effective protection measures is a theoretical and practical significance. This paper studies the social networking site of personal information security issues. Firstly, this paper summarizes the existing research on the basis of academic achievement on the relevant personal information, personal information security is defined in the social network and its environment, and the expansion of the scope of the new features have been analyzed and summarized.Secondly, the analysis of the social networks of personal information disclosure reasons,charts to analyze all aspects of a specific network may bring information disclosure.Data obtained through questionnaires, focusing on the factors affecting the personal information security awareness made a further in-depth analysis. Thirdly, combined with the specific case, the authors analyzed the risk of the leakage of personal information. Finally, From the government level, enterprise level, user level on how to effectively protect individuals made recommendations.
Keywords/Search Tags:Social networks, Personal information, Information security
PDF Full Text Request
Related items