Ethical Boundary Between Network Security and Personal Privacy in the Era of Big Data

被引:0
作者
Xu, Tieguang [1 ]
机构
[1] Nanxun Rnnovation Research Institute, Zhejiang University of Water Resources and Electric Power
关键词
Big Data; Ethical Boundary; Network Security; Personal Privacy;
D O I
10.4018/IJISP.384489
中图分类号
学科分类号
摘要
In the era of big data, the balance between network security and personal privacy has become a key issue. This paper analyzes the new connotation and threat of network security, and discusses the ethical conflict between network security and personal privacy. Then it puts forward four principles to determine the ethical boundary. Finally, the guarantee mechanism is constructed from the aspects of perfecting laws and regulations, applying technological innovation, enhancing the awareness of ethical education, and self-discipline supervision and management in the industry. Taking the new power tram enterprises as an example, it is emphasized that enterprises should pay attention to balance and establish a standardized mechanism to eliminate the risk of conflict and realize the harmonious development of digital society. © 2025 IGI Global. All rights reserved.
引用
收藏
相关论文
共 31 条
[1]  
Abu-Salih B., Wongthongtham P., Zhu D., Chan K. Y., Rudra A., Social big data analytics, (2021)
[2]  
Boppiniti S. T., Real-time data analytics with AI: Leveraging stream processing for dynamic decision support, International Journal of Management Education for Sustainable Development, 4, 4, (2021)
[3]  
Fallatah K. U., Barhamgi M., Perera C., Personal data stores (PDS): A review, Sensors (Basel), 23, 3, (2023)
[4]  
Ferretti A., Ienca M., Velarde M. R., Hurst S., Vayena E., The challenges of big data for research ethics committees: A qualitative Swiss study, Journal of Empirical Research on Human Research Ethics
[5]  
JERHRE, 17, 1–2, pp. 129-143, (2022)
[6]  
Han J., Rational Planning of Educational Resources Based on Big Data Fusion. [IJWLTT], International Journal of Web-Based Learning and Teaching Technologies, 18, 2, pp. 1-12, (2023)
[7]  
Hassan M., Awan F. M., Naz A., deAndres-Galiana E. J., Alvarez O., Cernea A., Fernandez-Brillet L., Fernandez-Martinez J. L., Kloczkowski A., Innovations in genomics and big data analytics for personalized medicine and health care: A review, International Journal of Molecular Sciences, 23, 9, (2022)
[8]  
Jain A. K., Sahoo S. R., Kaubiyal J., Online social networks security and privacy: Comprehensive review and analysis, Complex & Intelligent Systems, 7, 5, pp. 2157-2177, (2021)
[9]  
Jamal H., Algeelani N. A., Al-Sammarraie N., Safeguarding data privacy: Strategies to counteract internal and external hacking threats, Computer Science and Information Technology, 5, 1, pp. 46-54, (2024)
[10]  
Ji S., Li Q., Cao W., Zhang P., Muccini H., Quality assurance technologies of big data applications: A systematic literature review, Applied Sciences (Basel, Switzerland), 10, 22, (2020)