Privacy and Protection Measures in the Digital Age Essay Example
Privacy and Protection Measures in the Digital Age Essay Example

Privacy and Protection Measures in the Digital Age Essay Example

Available Only on StudyHippo
  • Pages: 3 (672 words)
  • Published: August 25, 2021
View Entire Sample
Text preview

The Internet has brought about a major change in the way human society operates.

As Internet technology becomes more popular and widely used, people's lives, work, and study are increasingly connected to the network. This integration has both benefited individuals and made them vulnerable to privacy theft (Wei Zhang, 2012). It is essential to address this issue by effectively protecting privacy rights online and promoting the internet industry's healthy growth. In June 2013, Snowden, a former CIA staff member, disclosed a report from the National Security Agency (NSA) to the media.

The implementation of the Prism Plan (PRISM) has introduced the electronic monitoring program. This plan consists of two covert surveillance programs. One program involves monitoring and tracking the call records of individuals' phones, while the other program involves monitoring individuals' online activities (Li Yunlong, 2014). The Prism Plan not only extensively m

...

onitors internet users within the United States, but also severely violates the sovereignty, freedom, and privacy rights of other nations and individuals. Cambridge Analysts, a company, leaked personal information data of Facebook's 50 million users. This leak also implicated deeply controversial political conspiracies such as the 2016 US presidential election and the "Brexit" incident in Britain.

CNN, the CND News Network, reported that Facebook's business model involves gathering users' data and selling it to software developers and advertisers for profit. During the China Development High-Level Forum in 2018, Baidu's chairman and CEO, Li Yanhong, noted that Chinese people prioritize convenience over privacy, sparking a discussion about citizens' awareness of privacy's importance. Contrary to the belief that citizens are not aware of its significance, studies have shown that social media profiles may unknowingly reveal users' implicit motives

View entire sample
Join StudyHippo to see entire essay

to both themselves and their peers. (Michael Dufner1 Ruben C.)

In the context of the right to use, users are required to grant privacy, as convenience is obtained at the cost of privacy not as an active choice, but as a passive acceptance (Arslan2 Jaap J. A. Denissen3.2018).

To safeguard personal data security from various perspectives, it is crucial to establish better principles for the utilization of big data, as the regulations pertaining to digital life lag far behind. The protection of privacy in the network environment should not only comply with the requirements of the rule of law to fully safeguard personal rights but also guarantee the growth of e-commerce. Firstly, it is necessary to develop a protection model founded on legal regulation and supplemented by industry self-regulation. Additionally, legislation should be improved to enhance the legal protection of privacy rights in the Internet environment (Xu Bin, 2011). Furthermore, we should strive for scientific and technological advancements to strengthen our privacy protection capabilities. Finding a balance between demands for anonymity and changes is essential, and this is referred to as the optimization trade-off problem. In this study, we propose a -Strawman privacy-preserving scheme in weighted social networks to address these challenges.

To address the problem of consistency matching, a greedy algorithm based on a user trade-off metric is proposed (Jing Chen1,2 *, Bowen Zhang1, Min Chen3, Quan Yuan4 and Ruiying Du1,2,2017). Given the age of the Internet, data has become a defining factor in a person's network rather than worldly possessions.

Reference List

  1. Wei Zhang.TO DISCUSS THE PROTECTION OF PRIVACY UNDER NETWORK ENVIROMENT FROM THE DEBATE OF 3Q [D].BEIJING.China University

of political Science and Law,2012:1-47.

  • Li Yunlong.America ' s ' prism program ' that wanton abuses of human rights[N], Guangming Daily, 2014 . March . 2 . Rev . 008.international news
  • Michael Dufner1 • Ruben C. Arslan2 • Jaap J. A. Denissen3.The unconscious side of Facebook: Do online social network profiles leak cues to users’ implicit motive dispositions?Motivation and Emotion (2018) 42:79–89 https://doi.org/10.1007/s11031-017-9663-1
  • Xu Bin.On the legal Protection of Internet Privacy.[D]Shanghai: East China University of Political Science and Law ,2011:1-39
  • Jing Chen1,2 *, Bowen Zhang1, Min Chen3, Quan Yuan4 and Ruiying Du1,2.A -Strawman privacy-preserving scheme in weighted social networks.[J]SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5625–5638 Published online 19 January 2017 in Wiley Online Library (wileyonlinelibrary.com).
  • The DOI is 10.1002/sec.1722.

    Get an explanation on any task
    Get unstuck with the help of our AI assistant in seconds
    New