-
860
-
781
-
456
-
446
-
445
Research on Residents' Willingness to Protect Privacy in the Context of the Personal Information Protection Law: A Survey Based on Foshan Residents' Data
DOI:
https://doi.org/10.30564/jsbe.v6i3.5840Abstract
The Personal Information Protection Law, as the frst law on personal information protection in China, hits the people’s most concerned, realistic and direct privacy and information security issues, and plays an extremely important role in promoting the development of the digital economy, the legalization of socialism with Chinese characteristics and social public security, and marks a new historical development stage in the protection of personal information in China. However, the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak. Based on the literature review and in-depth understanding of current legal regulations, this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of “privacy information protection willingness—privacy information protection behavior”. Taking the residents of Foshan City as an example, this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law, analyzes the factors infuencing their willingness to protect their privacy and their behaviors, and explores the mechanisms of their infuencing variables, to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
Keywords:
Personal Information Protection Law; Privacy security; Privacy protection willReferences
[1] Malandrino, D., Scarano, V., 2013. Privacy leakage on the Web: Diffusion and countermeasures. Computer Networks. 57(14), 2833-2855.
[2] Baruh, L., Secinti, E., Cemalcilar, Z., 2017. Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication. 67(1), 26-53.
[3] Long, W.Q., 2021. “Ge ren xin xi bao hu fa” de ji ben fa ding wei yu bao hu gong neng—ji yu xin fa ti xi xing cheng ji qi zhan kai de fen xi (Chinese) [The basic law positioning and protection function of the Personal Information Protection Law: An analysis based on the formation and development of the new law system]. Modern Law. 43(5), 84-104.
[4] Guo, F., Chen, L.Y., Jia, Y.H., 2022. “Ge ren xin xi bao hu fa” ju ti shi yong zhong de ruo gan wen ti tan tao—ji yu “min fa dian” yu “ge ren xin xi bao hu fa” guan lian de shi jiao (Chinese) [Discussion on some problems in the specific application of the Personal Information Protection Law—Based on the perspective of the relationship between the Civil Code and the Personal Information Protection Law]. Journal of Applicable Law. (1), 12-22.
[5] Gao, X.P., Ye, D., 2021. Ge ren xin xi bao hu, hu lian wang qi ye zhun bei hao le ma? (Chinese) [Are Internet companies ready for personal information protection?]. Nanfang Daily. (16), 26-27.
[6] Wu, L.F., 2002. “Ge ren xin xi bao hu fa” shi shi xia de yi liao shu ju guan li he ying yong tan tao (Chinese) [Discussion on medical data management and application under the implementation of Personal Information Protection Law]. Soft Sciences of Health. 36(1), 5-7.
[7] Zhang, K., 2021. “Ge ren xin xi bao hu fa” dui bao xian hang ye de ying xiang yu ying dui jian yi (Chinese) [The impact of the Personal Information Protection Law on the insurance industry and countermeasures]. Tsinghua Financial Review. (12), 88-92.
[8] Jia, R.N., Wang, X.W., Fan, X.Ch., 2001. She jiao wang luo yong hu ge ren xin xi an quan yin si bao hu xing wei ying xiang yin su yan jiu (Chinese) [Research on influencing factors of personal information security and privacy protection behavior of social network users]. Modern Information. 41(9), 105-114+143.
[9] Chen, Q., 2021. Yi dong duan shi pin ying yong zhong de gong min yin si quan bao hu yan jiu (Chinese) [Research on the protection of citizens’ privacy in mobile short video applications] [Master’s thesis]. Nanchang: Jiangxi University of Finance and Economics.
[10] Wang, L.M., Ding, X.D., 2021. Lun “ge ren xin xi bao hu fa” de liang dian, te se yu shi yong (Chinese) [On the highlights, characteristics and application of Personal Information Protection Law]. Jurist. (6), 1-16+191.
[11] Xiong, C.L., Tong, Y.Q., 2021. Bian jie yu ping heng: ge ren yin si xin xi bao hu zhong de shu ju zhi li lu jing yu si kao (Chinese) [Boundary and balance: The path and reflection of data governance in personal privacy information protection]. Science and Technology Communication. 13(24), 64-68.
[12] Wu, S.X., 2022. Da shu ju bei jing xia ge ren yin si bao hu de fa lü gui zhi. (Chinese) [Legal regulation of Personal Privacy Protection in the background of big Data]. Regional governance, 20, 0093-0096.
[13] Zhu, G., Li, F.J., Shen, Y.M., et al., 2022. She jiao mei ti yin si zheng ce de yue du yi yuan yan jiu—ji yu TAM mo xing yu zi wo xiao neng li lun shi jiao (Chinese) [A study on reading intention of social media privacy policy—based on TAM model and self-efficacy theory perspective]. Modern Intelligence. 42(1), 150-166.
[14] Zheng, Y., Shi, S., 2022. Chang jing qu dong : ge ren yin si bao hu sheng ji. (Chinese) [Scene-driven: personal privacy protection upgrade]. Intelligent Connected Vehicle, 2,62-67.
[15] Gao, Sh.Ch., 2000. Zi wo xiao neng li lun ping shu (Chinese) [A review of self-efficacy theory]. Psychological Development and Education. (1), 60-63.
[16] Yuan, X.L., Niu, J., 2021. She jiao mei ti yin si zheng ce yu yong hu zi wo biao lu de shi zheng yan jiu: yi ge bei tiao jie de zhong jie mo xing (Chinese) [An empirical study of social media privacy policies and user self-representation: A moderated mediation model]. Journal of Information Resource Management. 11(1), 49-58.
[17] Zhang, J.D., Jiang, L.P., 2021. Rong ru yong hu qun ti xing wei de yi dong she jiao wang luo yu qing chuan bo dong tai yan hua mo xing yan jiu (Chinese) [A dynamic evolutionary model of mobile social network opinion dissemination incorporating user group behavior]. Modern Intelligence. 41(5), 159-166+177.
[18] Tan, F., Yang, Y., Zhuo, Y.L., et al., 2021. Wang luo yin si zheng yi shi jian zhong yong hu yin si guan zhu ji qing gan dui bi yan jiu (Chinese) [A comparative study of users’ privacy concerns and emotions in online privacy controversies]. Library and Information Work. 65(2), 87-97.
[19] Bandura, A., 1982. Self-efficacy mechanism in human agency. American Psychologist. 37(2), 122.
[20] Yang, X.W., 2009. Wang luo xin xi fu wu guo cheng zhong de ge ren yin si bao hu wen ti chu tan (Chinese) [A preliminary study on the protection of personal privacy in the process of network information service]. Inner Mongolia Science and Technology and Economy. (7), 445+449.
Downloads
How to Cite
Issue
Article Type
License
Copyright © 2023 Xiying Huang, Qizhao Xie, Xunxun Jiang, Zhihang Zhou, Xiao Zhang, Yiyuan Cheng, Yu’nan Wang, Chien Chi Chu
This is an open access article under the Creative Commons Attribution 4.0 International License.