Network access conditions require the integrity of user information, and the basic information such as gender, name, occupation and contact information of users constitute the identity of each user browsing through the network. With the popularity of new media, users are willing to speak freely, and a large number of users actively participate in the generation, forwarding and comment of information, eager to generate new information through the secondary processing of existing information. These data information can be easily obtained by enterprises with ulterior motives, and accurately analyze user portraits through algorithms for accurate consumption. Luo Zhenyu pointed out in his big data speech that the quality of products received depends on the level of online consumption. Big data is based on data collection, utilization, analysis and decision-making, which brings many data ethics problems.
With the rapid and efficient operation of the network and the growing demand for media by the public, users are willing to give up some private information in exchange for convenient services provided by commercial platforms. Many users always have no patience to read obscure legal provisions when registering new accounts or downloading new applications, and often choose without consideration? Do you agree Option, let some of your basic information and other people's information appear in the address book and be leaked. The disclosure of this part of private information can be regarded as the user voluntarily giving up ownership. However, users, as providers of private information, are not users of information.
When users think that their privacy has been leaked and misused, the transmitted data provides enterprises with the opportunity to monitor their lives. Business entity should be the recorder of user data, but it has become the user of user information. Abuse of user data and the use of user data to achieve their own profits are undoubtedly violations of user privacy. Many users don't know that their privacy is enjoyed on the network platform after downloading new applications. Unscrupulous commercial entities resell user information for personal gain, and computer hackers illegally use data, which not only threatens the personal safety of users, but also threatens the safety of companies and countries.