pisco_log
banner

Research on Personal Information Security and Privacy Issues in the Network Environment

Xiaomei Tang, Xu Gong, Mengqiao Zhang, Peng Zhang, Hailong Li

Abstract


In todays digital age, we face the grave challenges of personal information security. Frequent hacker attacks, data breaches, social
engineering, and illegal information trading pose serious threats to user privacy. By comprehensively applying encryption technology, access
control, data desensitization, combined with improved laws and regulations and enhanced user security awareness, these challenges can be effectively addressed, which means, personal privacy can be protected, and a secure and trustworthy network environment can be built.

Keywords


Network Environment; Information Security; Privacy

Full Text:

PDF

Included Database


References


[1] Yan Xianglin. Analysis of personal information security and privacy in the network environment [J]. information science, 2002,

20(9):937-940.

[2] Yang Xiaowu, Xie Shunjun. Research on the legal protection of personal information under the network environment [J]. Chutian rule

of law, (23):0034-0036.

[3] Wang Yuwei. Research on personal information protection under the background of the Internet[J].????, 2024, 31(3):45-47.

[4] Chao Lu. Research on the security of computer personal information in the network environment [J]. Computer knowledge and technology2016, 12(10):29-30+35.

[5] Al-Charchafchi A, Manickam S, Alqattan Z N M. Threats against information privacy and security in social networks: A review[C]//

Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30August 1, 2019, Revised Selected

Papers 1. Springer Singapore, 2020: 358-372.

[6] Rahman H U, Rehman A U, Nazir S, et al. Privacy and securitylimits of personal information to minimize loss of privacy[C]//Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC),

Volume 2. Springer International Publishing, 2020: 964-974.




DOI: http://dx.doi.org/10.18686/frim.v2i5.4513

Refbacks

  • There are currently no refbacks.