TY - GEN
T1 - Research on the security of personal information in the era of big data
AU - Chi, Cheng
AU - Liu, Tengyu
AU - Yu, Xiaochen
AU - Zhang, Shuo
AU - Shi, Shuo
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019 Published by Springer Nature Switzerland AG 2019. All Rights Reserved.
PY - 2019
Y1 - 2019
N2 - The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal information security is one of them. In the big data era, massive amounts of personal information are continuously input, simultaneously, the means of illegally acquiring, disseminating, and applying personal information are emerging in endlessly, Raising human thinking about information security. Therefore, the personal information security problem caused by big data should not be underestimated. Firstly, it introduces the related concepts of personal information, discusses the sources of risks faced by personal information in the process of implantation, dissemination and application. Secondly, it discusses the existing problems and solutions in China. Finally, the application difficulties and coping strategies of information security technology are analyzed, which provides theoretical support for personal information security in the era of big data.
AB - The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal information security is one of them. In the big data era, massive amounts of personal information are continuously input, simultaneously, the means of illegally acquiring, disseminating, and applying personal information are emerging in endlessly, Raising human thinking about information security. Therefore, the personal information security problem caused by big data should not be underestimated. Firstly, it introduces the related concepts of personal information, discusses the sources of risks faced by personal information in the process of implantation, dissemination and application. Secondly, it discusses the existing problems and solutions in China. Finally, the application difficulties and coping strategies of information security technology are analyzed, which provides theoretical support for personal information security in the era of big data.
KW - Information security technology
KW - Legal protection
KW - Personal information security
KW - Source of risk
UR - http://www.scopus.com/inward/record.url?scp=85069181772&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-22971-9_9
DO - 10.1007/978-3-030-22971-9_9
M3 - Conference contribution
AN - SCOPUS:85069181772
SN - 9783030229702
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 107
EP - 114
BT - Artificial Intelligence for Communications and Networks - 1st EAI International Conference, AICON 2019, Proceedings
A2 - Han, Shuai
A2 - Ye, Liang
A2 - Meng, Weixiao
PB - Springer Verlag
T2 - 1st EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019
Y2 - 25 May 2019 through 26 May 2019
ER -