Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on the Privacy Protection of Social Media Users in China through the Personal Information LeakageAffair of Facebook Users
nstitute of Information Sciences, ShanghaiAcademy of Social Sciences
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The rapid development of information technology has promoted the popularization of social media applications. Social me- dia has become a platform for users to search for real-time information and communicate and interact. Privacy protection is an im- portant symbol of the progress of human modern civilization. While enjoying the benefits brought by social media, human rights al- so face unprecedented challenges. Therefore, the protection of privacy highlights its importance. This paper analyzes the information leakage of Facebook users in order to discover the various risks faced by the privacy protection of social media users. Then it re- views the user privacy protection measures of major social media platforms at home and abroad. Finally, it is recommended that the government level should speed up the improvement of the social media platform user privacy supervision system, the enterprise lev- el should strengthen the implementation of the social media platform user privacy protection subject responsibility, and the user must improve personal information security literacy and protect personal information and privacy together.
Key wordssocial media      personal information      right of privacy      privacy setting     
Published: 27 November 2020

Cite this article:

LUO Li. Research on the Privacy Protection of Social Media Users in China through the Personal Information LeakageAffair of Facebook Users. Computer & Telecommunication, 2020, 1(8): 23-26.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2020/V1/I8/23

[1] WAN Qiang. Personal Data Security Management in Insurance Enterprises[J]. 电脑与电信, 2019, 1(5): 40-44.
[2] Feng Xiaomei. Discussion on Mobile Security[J]. 电脑与电信, 2016, 1(9): 84-86.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd