首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 484 毫秒
1.
针对社交网络隐私保护问题,本文提出一种新的隐私保护方法——k-subgraph划分算法,它通过对社交网络进行分割,通过泛化顶点标签和扰乱图的结构特征,来对社交网络进行匿名化处理,拟达到隐私保护的目的;仿真实验表明,该方法可以有效地保护社交网络中个体的隐私信息,同时保证了社交网络中匿名数据的可用性。  相似文献   

2.
伴随着数字化网络技术的发展和应用,许多社交网站被创建,使得关于个人的大量信息被收集和发布。为了能够安全地利用社交网站进行信息交流,社交网站在发布数据的同时也要对用户的个人隐私进行必要的保护,本文对社交网络发布的个人信息隐私保护进行了总结,阐述了个人隐私保护模型,指出了社交网络在数据发布时隐私保护存在的待解决的问题以及面临的挑战。  相似文献   

3.
秦渴  袁勤俭 《现代情报》2018,38(2):138-147
本文以博士学位论文为研究对象,通过共词分析、可视化等方法对国内外网络隐私的发文情况、研究热点与研究主题演化进行了对比分析。结果显示,国内外的发文情况存在较大的差异,国内有必要学习国外博士学位论文的研究角度不断地拓展网络隐私的研究视角;在研究热点与主题演化方面,国内外研究的相同点表现在:对网络隐私保护的技术研究和网络隐私与数据的研究较为重视,都呈现出对新兴技术带来的网络隐私问题较为关注的发展趋势等;相异点表现在:国外对信息分享中的隐私问题一直较为重视,而国内对位置服务中的网络隐私较为关注。  相似文献   

4.
针对社交网络隐私保护问题,本文提出一种新的隐私保护方法——k-subgraph划分算法,它通过对社交网络进行分割,通过泛化顶点标签和扰乱图的结构特征,来对社交网络进行匿名化处理,拟达到隐私保护的目的。仿真实验表明,该方法可以有效的保护社交网络中个体的隐私信息,同时保证了社交网络中匿名数据的可用性。  相似文献   

5.
信息通讯技术(ICT)的迅速发展使得人们可以通过微博、即时通信软件(IM)、手机终端应用及社交网络(SNS)来发布个人真实信息,网络将以往零散的碎片信息整合成完整的个体信息,造成隐私泄露现象日益严重。本文总结了个体隐私泄露的渠道和类别,通过访谈研究,分析了个体隐私感知风险以及个体隐私保护行为特征:个体特征差异(受教育水平、网络经验)导致隐私关注差异;信息关联及商业价值在不同程度上与隐私关注的变化相关;隐私关注对感知隐私风险产生影响;个体隐私保护行为(常规保护、技术保护)因隐私风险感知不同而发生变化。在此基础上,构建了个体隐私感知与保护行为模型。  相似文献   

6.
陆雪梅  古春生 《现代情报》2016,36(11):66-70
针对大数据环境下用户信息隐私泄露问题,论文首先分析当前用户信息隐私保护的现状与趋势,并指出当前用户信息隐私保护存在的问题;然后通过典型案例、统计分析和系统分析等手段,研究大数据环境下用户信息隐私泄露的发生机制和成因;最后聚焦用户信息隐私泄露的成因,分析研究用户信息隐私保护的关键社会方法与技术方法,并构建用户信息隐私保护的社会技术模型以及优化策略。  相似文献   

7.
李学国  冯刚 《科技通报》2013,(1):128-131
针对社交网络大量隐私数据保护问题,提出基于有损分解保护隐私数据的策略。通过对数据进行有损分解和特征重构,对数据进行垂直分散存储;利用K匿名算法,对数据进行异构重组,进而实现了对社交网络隐私保护的关联规则数据挖掘。实验结果表明:有损分解隐私数据保护算法,能有效防止数据受到安全性威胁,并且不会造成挖掘准确性的损失。  相似文献   

8.
网络隐私问题研究综述   总被引:2,自引:0,他引:2  
随着计算机的广泛使用和网络技术的不断进步,在网络交易过程中收集、利用和出售个人隐私数据的现象十分普遍.网络隐私的侵犯问题已成为信息社会的最大困扰之一,如何有效地保护个人的网络隐私成为亟待解决的问题.本文首先介绍了网络隐私保护的出现及其发展;其次,对网络隐私的价值问题以及电子商务中的信任问题进行讨论,重点探讨了目前网络隐私保护的4种方式;最后给出了网络隐私问题未来的研究方向.  相似文献   

9.
李雪  许晓东 《现代情报》2015,35(6):166-171
随着信息社会化不断深入,网络隐私的侵犯与保护问题成为人们探讨的焦点。本文以SSCI收录的网络隐私问题研究型论文为研究对象,采用文献计量法从文献来源情况、被引情况、关键词等角度分析了目前网络隐私问题国际研究特点;并采用内容分析法对文章内容进行分析,总结出目前该领域的4个热点研究主题:隐私概念争议与发展、隐私关注量表体系、网络隐私观形成前因和社交平台中的隐私问题。以期引起国内学界的注意,为我国学者深入研究网络隐私问题提供参考。  相似文献   

10.
[目的/意义]构建社交媒体APP隐私政策评价指标体系,对我国社交媒体APP隐私政策进行科学评价,为后续社交媒体APP隐私政策制定和完善提供理论与实践上的指导。[方法/过程]采用文献调研法和层次分析法,根据国内外相关法律法规及已有研究成果,从隐私政策基本情况、个人信息收集与存储、个人信息使用与共享、个人信息安全控制、用户个人权利保障5个维度构建社交媒体APP隐私政策评价指标体系,并选取IOS系统APP Store中48款社交媒体APP的隐私政策文本进行实证分析。[结果/结论]社交媒体APP隐私政策的整体评分基本合格,隐私政策在完整性和可操作性方面还存在一些问题。为了进一步完善和正确实施隐私政策,应提高用户对隐私政策的阅读意愿,优化隐私政策文本内容,构建社交媒体隐私保护治理体系。  相似文献   

11.
Although there is near consensus on the need for privacy, the reality is that people's attitude toward their personal information privacy is complex. For instance, even when people claim that they value their information privacy, they often trade their personal information for tangible or intangible benefits. In this article, the research on different ways in which people respond to risks to privacy is examined. They include information seeking to reduce uncertainty, the withholding of information, and the provision of fabricated information. The impact of trust and inducements on Internet users’ willingness to share personal information is also examined. Thereafter, important postulates from theories in communication, social psychology, and sociology are synthesized into a comprehensive theoretical framework for personal information-related behaviors in the online environment.  相似文献   

12.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

13.
[目的/意义]健康信息风险和用户隐私保护是健康大数据和移动健康时代的重要议题,从信息隐私和隐私计算视角,探究移动健康管理服务使用意愿的影响因素具有重要意义。[方法/过程]本文在分析移动健康管理服务特殊性和回顾相关研究的基础上,从信息隐私和隐私计算的视角,通过模型构建、问卷调查和假设验证等实证分析过程,重点探究信息隐私等相关因素对移动健康管理服务用户行为意向的影响。[结果/结论]研究表明:显著影响移动健康管理服务使用意愿的因素有感知收益和信任;隐私顾虑对使用意愿的影响并不显著,但并不意味着用户隐私保护不重要;此外,感知隐私控制是重要的心理要素,正向影响感知收益,负向影响隐私顾虑。对移动健康管理服务商来说,应该从信息隐私保护、感知收益提升、个人隐私控制强化以及用户信任建设等方面着手,从而促进移动健康管理服务的用户使用。  相似文献   

14.
In the analysis of the ethicalproblems of online research, there is much tobe learned from the work that has already beendone on research ethics in the socialsciences and the humanities. I discuss thestructure of norms in the Norwegian ethicalguidelines for research in the social scienceswith respect to their relevance for the ethicalissues of Internet research. A four-stepprocedure for the ethical evaluation ofresearch is suggested. I argue that eventhough, at one level, the problems of onlineresearch are very similar to those we find intraditional areas of social scientificresearch, there still are some issues that areunique to research online. A general model forthe analysis of privacy and data protection issuggested. This model is then used tocharacterize the special problems pertaining tothe protection of privacy in online contexts,and to argue that one cannot assume a simpledistinction between the private and the publicwhen researching in such contexts.  相似文献   

15.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

16.
《The Information Society》2007,23(5):383-389
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

17.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

18.
Video conferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications. Although VC apps offer myriad benefits, it has caught much media attention owing to concerns of privacy infringements. This study examines the key determinants of professionals’ attitude and intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modeling is used to empirically test the model using data collected from 484 professionals. The study offers insights regarding the trade-offs that professionals are willing to make in the face of information privacy concerns associated with VC apps. Based on the findings, the study emphasizes the promotion of privacy protection at the organizational level, control mechanisms that motivate employees to actively engage in privacy protection behavior, and a multi-faceted approach for data transparency within the VC app platforms.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号