期刊文献+

大数据时代个人隐私泄露问题及对策研究

Research on Personal Privacy Leakage in the Era of Big Data and Its Countermeasures
下载PDF
导出
摘要 信息技术的高速发展,诞生了大数据技术。大数据技术一方面给人们的生活带来便利,另一方面也带来或加剧了身份困境、隐私边界、数据权利等许多伦理道德问题,其中个人隐私泄露问题最受公民大众普遍关注。个人隐私泄露问题始终贯穿在大数据技术的发展和使用过程中,平衡好保护与发展的关系是使大数据技术真正成为社会发展的抓手、每个个人真切的享受大数据时代带来的红利的关键。本文以政府、运营商和个人为对象,深入剖析三方在个人隐私保护中存在的问题,并针对各方的问题提出对策,以期为个人隐私保护提供参考。The rapid development of information technology has given birth to big data technology. On the one hand, big data technology has brought convenience to people’s lives, but on the other hand, it has also brought or exacerbated many ethical and moral issues, such as identity dilemma, privacy boundaries, and data rights, among which the problem of personal privacy leakage is the most concerned by citizens. The problem of personal privacy leakage has always run through the development and use of big data technology, and balancing the relationship between protection and development is the key to making big data technology truly the starting point of social development and every individual truly enjoying the dividends brought by the big data era. The government, operators and individuals are the important objects of the personal privacy protection process. Based on this, this paper deeply analyzes the problems existing in the protection of personal privacy among the three parties, and then puts forward specific suggestions, in order to provide reference for personal privacy protection.
作者 王殿琦
出处 《社会科学前沿》 2024年第9期391-396,共6页 Advances in Social Sciences
  • 相关文献

参考文献6

二级参考文献55

  • 1金元浦.大数据时代个人隐私数据泄露的调研与分析报告[J].清华大学学报(哲学社会科学版),2021(1):191-201. 被引量:51
  • 2杨建国.大数据时代隐私保护伦理困境的形成机理及其治理[J].江苏社会科学,2021(1):142-150. 被引量:37
  • 3王利明.公众人物人格权的限制和保护[J].中州学刊,2005(2):92-98. 被引量:157
  • 4National Science Foundation, "Core Techniques and Technolo- gies for Advancing Big Data Science & Engineering", http.// www. nsf. gov/pubs/2012/nsf12499/nsf12499, pdf (accessed May 5, 2015).
  • 5President' s Council of Advisors on Science and Technology, "Big Data and Privacy . A Technological Perspective", https .// www. whitebouse, gov/sites/default/files/microsites/ostp/ PCAST/peast big_data_and_privacy_ - _may_2014. pdf( access- ed May5, 2015).
  • 6Nathan Eagle and Alex Pentland, " Reality Mining. Sensing Complex Social Systems', Personal and Ubiquitous Computing 10(2006) . 255 -268.
  • 7Nicholas Negroponte, Being Digitaz,New York. Knopf, 1996.
  • 8Meglena Kuneva, "Keynote Speech ( March 31,2009)", http.// europa, eu/rapid/press - release_SPEECH - 09 - 156_en. htm (accessed May 5, 2015).
  • 9Eyder Peralta, "Reports . There' s No Way To Keep iPhone From Collecting Location Data", http.//www, npr. org/sections/thet- wo - way/2011/04/25/135712946/reports - theres - no - way - to - keep - iphone - from - collecting - location - data ( ac- cessed 28 April, 2015).
  • 10Yves - Alexandre de Montjoye et al. , "Unique in the Crowd. The privacy bounds of human mobility", http.//www, nature. com/srep/2013/130325/srop01376/full/srep01376, html? ial = 1 (aceessed 28 April, 2015).

共引文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部