All Title Author
Keywords Abstract

Research on Personal Privacy Protection of China in the Era of Big Data

DOI: 10.4236/jss.2017.56012, PP. 139-145

Keywords: Personal Data, Big Data, Privacy, Survey

Full-Text   Cite this paper   Add to My Lib


The purpose of this essay is to investigate the privacy concerns of Chinese, and to develop relevant protective measures. The groups are divided into two parts by gender and six parts by ages to analyze the different gender and different age groups of privacy concerns. The significance of this study is protecting personal data property. The data of personal information after finishing processing have economic value. These data once disclosed, will be not reversible, so it is important to study the personal privacy in the era of big data and to initiate and enforce legal and regulatory protection measures. Results show that Chinese’s privacy in public places for Internet records, friends dynamic and age’s awareness is insufficient; most people especially female lack privacy protection skills. Educators need to improve the relevant laws and regulations, promote privacy protection skills and strengthen the conception of privacy.


[1]  Warren, S.D. and Brandeis, L.D. (1973) The Right to Privacy. Harvard Law Review, 4, 193-220.
[2]  Prosser, W. (1960) Privacy. California Law Review, 48, 383-423.
[3]  Schmidt, R., Mohring, M., Maier, S., Pietsch, J. and Harting, R.C. (2014) Big Data as Strategic Enabler—Insights from Central European Enterprises. Lecture Notes in Business Information Processing, 176, 50-60.
[4]  Newell, B.C. (2013) Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information. Elsevier, Amsterdam.
[5]  Cavoukian, A. and Jonas, J. (2012) Privacy by Design in the Age of Big Data. Eurocontrol Int, 1-17.
[6]  Juels, A. (2008) Targeted Delivery of Informational Content with Privacy Protection. US Patent No. 7472093 B2.
[7]  Lazar, N. (2015) The Big Picture: Big Data and Privacy. Chance, 28, 39-42.
[8]  Brunozzi, S. (2012) Big Data and NoSQL with Amazon DynamoDB. Proceedings of the 2012 Workshop on Management of Big Data Systems, ACM, New York, 41-42.
[9]  Madden, S. (2012) From Databases to Big Data. IEEE Internet Computing, 16, 4-6.
[10]  Victor, J.M. (2013) The EU General Data Protection Regulation: Toward a Property Regime for Protecting Data Privacy. Social Science Electronic Publishing, 123, 513-528.
[11]  Glasgow, K. (2015) Chapter 4—Big Data and Law Enforcement: Advances, Implications, and Lessons from an Active Shooter Case Study. Application of Big Data for National Security, 39-54.
[12]  Tene, O. (2012) Privacy in the Age of Big Data: A Time for Big Decisions. Stanford Law Review Online, 64.
[13]  Weber, S. (2012) Big Data Privacy and Security Challenges. In: Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, ACM, New York, 1-2.
[14]  Feng, D.G., Zhang, M. and Hao, L.I. (2014) Big Data Security and Privacy Protection. Chinese Journal of Computers, 17-23.
[15]  Liu, Y. (2015) Privacy Protection Method in the Era of Cloud Computing and Big Data. MATEC Web of Conferences. EDP Sciences, 162-168.
[16]  Leonard, P. (2013) Customer Data Analytics: Privacy Settings for “Big Data” Business. International Data Privacy Law, 4, 53-68.
[17]  Smith, M., Szongott, C., Henne, B. and Von Voigt, G. (2012) Big Data Privacy Issues in Public Social Media. Digital Ecosystems Technologies (DEST). 6th IEEE International Conference on Digital Ecosystems Technologies, Campione d’Italia, 18-20 June 2012, 1-6.
[18]  Wang, Z. (2014) Research on Concern for Privacy of Personal Data in the Era of Big Data. Information Studies Theory & Application, 15-19.
[19]  Wilson, S. (2014) The Collision between Big Data and Privacy Law. Social Science Electronic Publishing, 2.


comments powered by Disqus