Who is the most popular social software to protect users ' privacy?

Source: Internet
Author: User
Keywords People already for function
Tags big data data enterprise function information information theft internet internet +
Summary: Introduction: The Prism gate incident exposure, has completely demolished the people and the internet between that symbolic trust the ruins. With the wave of the internet swept, people frequent contact with the Internet, inadvertently left a lot of personal information online, but it is this

Lead: "Prism door" incident, the exposure of the people and the Internet has completely overturned the symbolic trust between the ruins. With the wave of the internet swept, people frequent contact with the Internet, inadvertently left a large number of personal information on the Internet, but these are left with the clues to become the enterprise's "wealth."

Big Data, LBS, friends Circle, guess you like ... These features and terminology that we often see on the Internet are based on the reading of user data, in fact, we are talking about the "theft of user privacy", only read the user's behavior, in order to "guess you like", only to track the location of users "LBS", Only collecting users ' data to analyze the so-called "big Data" is based on the user's personal information generated.

Personal information about the user, some of the reading is to better the user interested in the display of things in front of the user, and improve the user experience, while some of the reading has been deducted "steal", "surveillance" and other violations of the legal bottom of the hat, and how to reconcile the balance between the two to become an Internet enterprise, Reluctant to talk about.

User privacy in the spotlight

Liu

The word "stealing user's privacy" is not unfamiliar to netizens, it seems that "stealing user's privacy" has become a common means for internet companies to crack down on rivals, especially social networking sites, and the theft of personal information from users has reached blatant proportions.

Especially in the mobile internet today, people's social use of mobile terminals, such as micro-letters, Weibo, everyone and foreign Facebook, Google +, linkde in and so on, has become dependent on the degree, It has attracted users to actively upload their own information and geographic location in their social networks.

At the start of the year, two of cases of personal information collected by social networking sites have been watched abroad, and the US private social network, PATH, has paid 800,000 of dollars to federal regulators to settle allegations of improper collection of personal information from users. The United States Court of Appeals for the Nineth Circuit upheld the decision by the Northern California district Court to violate Facebook's privacy by 3.6 million of users.

Some analysts believe that in the United States, the relevant laws are so perfect, social networking sites to users of personal information theft is still unscrupulous, not to mention in the relevant laws and regulations are still imperfect domestic.

And in the last year online QQ Circle, in the beginning of the line because users can use it to find a long time did not contact the primary school students, as well as the former girlfriend, can even automatically organize groups for users, even users themselves are difficult to identify a friend by net name, and QQ Circle know who is who, and clearly grouped, so that users of this recognition function of the powerful, Feel shocked and frightened.

The recent "micro-letter three-point positioning method" to really make users feel creepy, it is understood that the so-called "micro-letter three-point positioning method" is through the micro-letter "Nearby people" function, continuous transformation 3 times above the location, supplemented by electronic map, can locate other micro-trust users where. Social positioning has caused panic among users.

And the use of mobile social tools, according to the location of the crime of murder, in May this year, a gangster using micro-letters to view the function of the nearby, master a 23-Year-old girl's geographical location and appearance, followed and killed the case shocked society, but this is not a coincidence, The use of social tools to track the geographical location, causing users to be violated cases occur.

With the rapid development of mobile internet, social software is built with the ability to find people around the location, in addition, navigation, sharing, even games, will open the application is to ask "whether to allow the use of geographical location", providing geographical information has become the standard mobile applications.

Obviously, the disclosure of user privacy is not only a kind of information theft, but also to the user's personal property security exposure, for the relevant management department, it is time to take a certain management system, clean up the user's personal information security is not leaked.




Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.