pisco_log
banner

Research on Personal Information Security Protection Strategies in the Era of Social Media

Xiaolong Ouyang

Abstract


In today's digital wave sweeping the world, social media has become a core domain for individuals to engage in social connections, access information, and express themselves. However, behind its convenience and openness lie severe challenges to personal
information security. Every click, every share, and every interaction a user makes on these platforms generates vast amounts of digital
footprints. This paper systematically reviews multiple risk sources within the social media environment, delving into three main leakage
pathsuser proactive sharing, platform-based systematic collection, and external malicious theftalong with their complex interrelationships. Building on this, the paper innovatively constructs an integrated proactive protection strategy framework that covers four levels:
"Technical Reinforcement, Settings Optimization, Behavior Modification, and Awareness Enhancement." This framework emphasizes the
user's role as the primary responsible party for information security, advocating a shift from passive risk acceptance to active management
implementation. Finally, the article looks ahead to the challenges posed by new technologies such as artificial intelligence and deepfakes,
pointing out that building a multi-dimensional protection ecosystem based on user awareness, platform accountability, and legal safeguards
is the necessary path to address future challenges.

Keywords


Social Media; Personal Information Security; Privacy Protection; Data Breach; User Behavior; Proactive Protection

Full Text:

PDF

Included Database


References


[1] Acquisti A, Brandimarte L, Loewenstein G. Privacy and human behavior in the age of information[J]. Science, 2015, 347(6221): 509-

514.

[2] Hargittai E, Boyd D. Facebook privacy settings: Who cares?[J]. First Monday, 2010, 15(8).

[3] Debatin B, Lovejoy J P, Horn A K, et al. Facebook and online privacy: Attitudes, behaviors, and unintended consequences[J]. Journal of

Computer-Mediated Communication, 2009, 15(1): 83-108.

[4] Marwick A E, Boyd D. Networked privacy: How teenagers negotiate context in social media[J]. New Media & Society, 2014, 16(7):

1051-1067.

[5] Zhang Xinbao. On the Basis of Rights for Personal Information Protection[J]. Chinese Journal of Law, 2020, (4): 145-166.

[6] Solove D J. A taxonomy of privacy[J]. University of Pennsylvania Law Review, 2006, 154(3): 477-564.

[7] Zhou Hanhua. The Legal Positioning and Institutional Construction of Personal Information Protection[J]. Social Sciences in China,

2022, (4): 102-123.




DOI: http://dx.doi.org/10.70711/aitr.v3i7.8878

Refbacks

  • There are currently no refbacks.