Font Size: a A A

Research On Personal Information Leakage Causes And Countermeasures Of Smart Device User

Posted on:2018-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:M L TaoFull Text:PDF
GTID:2348330512963089Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
In the era of mobile Internet,the number of smart device users increased rapidly.The user's personal information leakage problem also gradually increased.Firstly,smart device system and some applications,website potential vulnerability easily attacked by virus,Trojan,and malicious programs.Secondly,the mandatory provisions of operators and unauthorized collection of personal information behavior allows the user to your personal information is in a state of out of control;Thirdly,ghosts and other criminals in firms with rich and convenient communication and data exchange functions under the interests,increase personal information leakage of adverse consequences.As a result,smart device users are faced with the threat of imperfect internal systems and external operating platforms.Once the user encounters personal information leakage problems,mobile phone fraud,spam messages,sales of telephone and other forms of harassment will go hand in hand,it brings varying degree damage to the user.Therefore,the research on the leakage of personal information of smart device users is very important.Based on the status of smart device users personal information leakage,this paper mainly research on the causes of personal information leakage of smart device users,and puts forward the corresponding countermeasures,it has obtained the following research results:First of all,by reviewing the related literature,gives a more comprehensive information about personal safety,the research status of related issues,such as mobile intelligent terminal security,and put forward views.At the same time,this paper briefly introduces the related concepts of smart device users personal information leakage and characteristics,this paper introduces the management control theory to build a theoretical basis for later study of the leakage reason and protective mechanism.Secondly,it analyzes the current situation of personal information leakage of smart device users,and finds out that the present situation presents diversity,severity,universality and extensive characteristics.And with the method of questionnaire survey combined with depth interview research in smart phone users as the research object,and using SPSS software to analysis data,the research results founded that the user is facing serious personal information leakage problem,prevention,and the user presents the status of the protection consciousness,lack of the cognition of personal information.Thirdly,on the basis of social management control theory,from the macroscopic level,the author analyzes the reasons of end user personal information leakage.By analyzing theproblems existing in the control system,it is concluded that the end user personal information leakage reason is the conclusion of diversification,it contains personal information leakage protective consciousness,lack of user experience and knowledge,operations management and technology of the existence of loopholes,lack of legislation,the lack of industry standards,electricity for their own interests of the mandatory terms and conditions and other factors.At the same time,analysis the influence of mobile intelligent terminal users personal information leakage,economic losses and spiritual damage and personal safety threat,etc.Then,combining the typical users' personal information leak from micro-level analysis of specific cases terminal users' personal information leakage,to verify the results of macro analysis.Finally,the paper analyzes the problems existing in the protection of personal information leakage,and find a "bucket theory","motion and static" protection way,and builds a systematic and dynamic protection mechanism based on the theory of management control.On the basis of feed forward control,field control,feed back control protection countermeasures are put forward.
Keywords/Search Tags:smart device users, personal information leakage, the management control theory, leakage causes, protective countermeasures
PDF Full Text Request
Related items