Affiliation:
1. School of Law, Shanghai University of Finance and Economics, Shanghai 200433, China
Abstract
With the continuous development of network technology, the production and lifestyle of human beings are also quietly changing. People find that the network makes life faster and more convenient and also makes our life more “transparent.” The openness, sharing, and convenience of the network make it easier to infringe on the privacy rights of others, bringing an unprecedented impact on traditional privacy protection. This paper studied information security assurance-related algorithms and built an information security assurance model. Through this model, some privacy violation events existing in the network today were analyzed. Then, a corresponding questionnaire was constructed according to some of the problems of these events. The questionnaire is mainly used for research on people of all age groups, mainly to study their understanding of relevant legal knowledge and their views on the law. A total of 188 valid questionnaires were collected in this survey. Only 37.23% people knew a lot about the law. Most of them learned it from the Internet, and they rarely learned about it from relevant books. About 70% people believe that the law plays a big role in privacy protection, and they will choose legal help if they encounter privacy violations. However, this is inconsistent with some data obtained from the information security assurance model. Through analysis, it can be seen that although they want legal help, they lack the relevant knowledge of the law, and they do not know whether the privacy of individuals has been violated. Therefore, it is necessary to strengthen personal knowledge of privacy protection laws and improve the personal information legal protection and fair use system.
Subject
General Mathematics,General Medicine,General Neuroscience,General Computer Science
Reference21 articles.
1. Data privacy protection: a study on students awareness of personal data privacy protection in an E-health environment;A. Mohamed;Journal of Computational and Theoretical Nanoscience,2017
2. Statistical confidentiality as an element of the protection of the constitutional right to privacy;P. Zapadka;Wiadomości Statystyczne The Polish Statistician,2019
3. The right to privacy at work
4. Online Privacy Concerns and Privacy Management: A Meta-Analytical Review
5. PRivacy laws in the context of fintech industry in Mauritius: a comparative study;A. Beebeejaun;International Journal of Humanities and Social Science,2019