情报科学 ›› 2022, Vol. 40 ›› Issue (11): 118-123.

• 业务研究 • 上一篇    下一篇

互联网多元治理模式下的个人信息共享风险及其保护对策 

  

  • 出版日期:2022-11-01 发布日期:2022-12-13

  • Online:2022-11-01 Published:2022-12-13

摘要: 【目的/意义】在网络时代下,个人信息共享风险不断提升,为降低共享风险,提升信息共享安全度,本文对
互联网多元治理模式下的个人信息共享风险及其保护对策进行研究。【方法
/过程】首先,从平台技术、国家政策、个
人等多个维度考虑,构建个人信息共享风险评估模型;然后,结合实际案例对所构建的模型进行验证,计算个人信
息共享风险模糊评价分值,对比评语集,明确个人信息共享风险程度。最后,基于互联网多元治理模式,从国家层
面、平台服务商层面以及用户层面等三个角度提出相应的解决措施。【结果
/结论】在国家层面可以通过完善法律法
规、建立个人信息泄露举报制度以及建立信息审查体系进行信息保护;在平台服务商层面,需要设置平台请求授予
权限,完善平台方实施用户访问控制和个人信息匿名及加密技术,提供信息保护技术基础;在用户层面需要促使用
户个人树立起个人信息保护意识,尊重他人隐私,自觉维护自己与他人的信息安全。【创新
/局限】但本研究所提出
的保护对策中,尚未针对各种保护技术的实施过程进行具体分析。因此在接下来的研究过程中,还应针对实施过
程进行细致分析,以期为网络时代的个人信息安全保护提供更加完善的借鉴参考。

Abstract: Purpose/significanceIn the Internet era, the risk of personal information sharing is constantly increasing. In order to re⁃duce the sharing risk and improve the security of information sharing, this paper studies the personal information sharing risk and its protection countermeasures under the Internet's multi-governance model.Method/processFirst, consider multiple dimensions such as platform technology, national policies, and individuals to build a risk assessment model for personal information sharing. Then, the constructed model is verified based on actual cases, the fuzzy evaluation score of personal information sharing risk is calculated, and the comment set is compared to clarify the risk degree of personal information sharing. Finally, based on the Internet multi-governance model, corresponding solutions are proposed from three perspectives: the national level, the platform service provider level and the user level.Result/conclusionAt the national level, information protection can be achieved by improving laws and regulations, estab⁃lishing a personal information leakage reporting system, and establishing an information review system; At the level of platform service providers, it is necessary to set the authorization of platform requests, improve the platform's implementation of user access control and personal information anonymity and encryption technology, and provide the technical basis for information protection; At the user level, it is necessary to urge users to establish awareness of personal information protection, respect the privacy of others, and con⁃sciously maintain the information security of themselves and others.Innovation/limitationHowever, among the protection counter⁃measures proposed in this study, the implementation process of various protection technologies has not been specifically analyzed.
Therefore, in the following research process, a detailed analysis of the implementation process should also be carried out. In order to provide a more complete reference for personal information security protection in the network era.