Cargando…
Privacy Law Protection Based on the Information Security Assurance Algorithm
With the continuous development of network technology, the production and lifestyle of human beings are also quietly changing. People find that the network makes life faster and more convenient and also makes our life more “transparent.” The openness, sharing, and convenience of the network make it...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9481317/ https://www.ncbi.nlm.nih.gov/pubmed/36120696 http://dx.doi.org/10.1155/2022/8006605 |
_version_ | 1784791237801279488 |
---|---|
author | Wang, Zhanjiang Yue, Qifeng |
author_facet | Wang, Zhanjiang Yue, Qifeng |
author_sort | Wang, Zhanjiang |
collection | PubMed |
description | With the continuous development of network technology, the production and lifestyle of human beings are also quietly changing. People find that the network makes life faster and more convenient and also makes our life more “transparent.” The openness, sharing, and convenience of the network make it easier to infringe on the privacy rights of others, bringing an unprecedented impact on traditional privacy protection. This paper studied information security assurance-related algorithms and built an information security assurance model. Through this model, some privacy violation events existing in the network today were analyzed. Then, a corresponding questionnaire was constructed according to some of the problems of these events. The questionnaire is mainly used for research on people of all age groups, mainly to study their understanding of relevant legal knowledge and their views on the law. A total of 188 valid questionnaires were collected in this survey. Only 37.23% people knew a lot about the law. Most of them learned it from the Internet, and they rarely learned about it from relevant books. About 70% people believe that the law plays a big role in privacy protection, and they will choose legal help if they encounter privacy violations. However, this is inconsistent with some data obtained from the information security assurance model. Through analysis, it can be seen that although they want legal help, they lack the relevant knowledge of the law, and they do not know whether the privacy of individuals has been violated. Therefore, it is necessary to strengthen personal knowledge of privacy protection laws and improve the personal information legal protection and fair use system. |
format | Online Article Text |
id | pubmed-9481317 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-94813172022-09-17 Privacy Law Protection Based on the Information Security Assurance Algorithm Wang, Zhanjiang Yue, Qifeng Comput Intell Neurosci Research Article With the continuous development of network technology, the production and lifestyle of human beings are also quietly changing. People find that the network makes life faster and more convenient and also makes our life more “transparent.” The openness, sharing, and convenience of the network make it easier to infringe on the privacy rights of others, bringing an unprecedented impact on traditional privacy protection. This paper studied information security assurance-related algorithms and built an information security assurance model. Through this model, some privacy violation events existing in the network today were analyzed. Then, a corresponding questionnaire was constructed according to some of the problems of these events. The questionnaire is mainly used for research on people of all age groups, mainly to study their understanding of relevant legal knowledge and their views on the law. A total of 188 valid questionnaires were collected in this survey. Only 37.23% people knew a lot about the law. Most of them learned it from the Internet, and they rarely learned about it from relevant books. About 70% people believe that the law plays a big role in privacy protection, and they will choose legal help if they encounter privacy violations. However, this is inconsistent with some data obtained from the information security assurance model. Through analysis, it can be seen that although they want legal help, they lack the relevant knowledge of the law, and they do not know whether the privacy of individuals has been violated. Therefore, it is necessary to strengthen personal knowledge of privacy protection laws and improve the personal information legal protection and fair use system. Hindawi 2022-09-09 /pmc/articles/PMC9481317/ /pubmed/36120696 http://dx.doi.org/10.1155/2022/8006605 Text en Copyright © 2022 Zhanjiang Wang and Qifeng Yue. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Wang, Zhanjiang Yue, Qifeng Privacy Law Protection Based on the Information Security Assurance Algorithm |
title | Privacy Law Protection Based on the Information Security Assurance Algorithm |
title_full | Privacy Law Protection Based on the Information Security Assurance Algorithm |
title_fullStr | Privacy Law Protection Based on the Information Security Assurance Algorithm |
title_full_unstemmed | Privacy Law Protection Based on the Information Security Assurance Algorithm |
title_short | Privacy Law Protection Based on the Information Security Assurance Algorithm |
title_sort | privacy law protection based on the information security assurance algorithm |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9481317/ https://www.ncbi.nlm.nih.gov/pubmed/36120696 http://dx.doi.org/10.1155/2022/8006605 |
work_keys_str_mv | AT wangzhanjiang privacylawprotectionbasedontheinformationsecurityassurancealgorithm AT yueqifeng privacylawprotectionbasedontheinformationsecurityassurancealgorithm |