In the era of big data, do users still have privacy?

Updated on technology 2024-06-15
25 answers
  1. Anonymous users2024-02-12

    Today we are talking about big data as an invasion of privacy.

    Big data invasion of privacy is also accompanied by big data push and big data killing, or even earlier.

    If you want to package these three, there is first big data to invade privacy, and then there is big data push and big data killing, and big data invasion of privacy can be regarded as the mother of big data killing and big data pushing.

    For example, everyone often shops online, for example, a photo frame is taken in a treasure, and then you will definitely click in to browse some more detailed information. I looked at you and found that it was not suitable, and then I went to search for the relevant photo frame and looked at it, and I felt that the choice was tired, so I quit a treasure. After that, you open it at any time, and a treasure will push your photo frame.

    This is not ruthless, even if you just searched for a photo frame in a certain treasure, but when you open other software, you may also receive a push about the photo frame. That's where the most annoying part is. Watching the news, you will see advertisements for photo frames; Swipe Tik Tok, and you will get a photo frame recommendation; Even if you swipe the space, the advertisement of the space may also be a photo frame.

    This means that you are labeled by big data, this person has the need to buy photo frames, and the probability of buying more ads for him is much greater.

    As a result, we are not only plagued by all kinds of advertising messages, but most importantly, our privacy is violated.

  2. Anonymous users2024-02-11

    There is privacy, as long as you don't browse some foreign **, you can protect privacy, and the country has a special privacy protection agency.

  3. Anonymous users2024-02-10

    Big data is to provide different convenience and data collection, and we should still have privacy and security.

  4. Anonymous users2024-02-09

    Don't easily leak your private information on the Internet, such as displaying geographical location on WeChat, ** and other confidential information; Do not register information lightly, even if you register, you should take the principle of minimization, and you should pay attention to whether there is a clear privacy policy statement and other information when registering. If allowed, try to adopt some anonymization methods, such as the name of the courier can be a nickname, the address can be selected as a public address, and the personal information can be removed when the courier packaging box is processed; Be cautious about allowing apps to have system permissions; Check whether the login is secure, see if the webpage has https or turn off the lock.

  5. Anonymous users2024-02-08

    If you want to protect personal privacy in the data era, don't just use some software, even if it is software, don't allow some personal privacy, so that you can protect personal privacy. It is recommended not to easily leak your private information on the Internet, such as displaying geographical location on WeChat, ** and other confidential information; Do not register information lightly, even if you register, you should take the principle of minimization, and you should pay attention to whether there is a clear privacy policy statement and other information when registering. If allowed, try to adopt some anonymization methods, such as the name of the courier can be a nickname, the address can be selected as a public address, and the personal information can be removed when the courier packaging box is processed; Be cautious about allowing apps to have system permissions; Check whether the login is secure, see if the webpage has https or turn off the lock.

  6. Anonymous users2024-02-07

    Answer: In the era of big data, it is very difficult for you to protect your personal privacy, such as your ID card and bank card. You'll need to use these things.

    It's best not to keep it in your phone. Especially ID cards, bank cards, household registration books, these things should not be stored in the mobile phone, and do not let others look at them casually. And.

    That is, when the unit is used, it must be paid attention to and strictly supervised.

  7. Anonymous users2024-02-06

    In the era of big data, it is difficult not to leak personal information, and you can only pay more attention to the protection of personal information in your usual life, and do not add WeChat or apps or the like, so that you can achieve your privacy and will not be leaked very seriously.

  8. Anonymous users2024-02-05

    Personally, it is recommended not to easily disclose your private information on the Internet, such as displaying geographical location on WeChat, ** and other confidential information; Do not register information lightly, even if you register, you should take the principle of minimization, and you should pay attention to whether there is a clear privacy policy statement and other information when registering. If allowed, try to adopt some anonymization methods, such as the name of the courier can be a nickname, the address can be selected as a public address, and the personal information can be removed when the courier packaging box is processed; Be cautious about allowing apps to have system permissions; Check whether the login is secure, see if the webpage has https or turn off the lock.

  9. Anonymous users2024-02-04

    In the era of big data, protect personal privacy, and do not easily leak your privacy information on the Internet, such as displaying geographical location on WeChat, ** and other confidential information; Do not register information lightly, even if you register, you should take the principle of minimization, and you should pay attention to whether there is a clear privacy policy statement and other information when registering. If allowed, try to adopt some anonymization methods, such as the name of the courier can be a nickname, the address can be selected as a public address, and the personal information can be removed when the courier packaging box is processed; Be cautious about allowing apps to have system permissions; Check whether the login is secure, see if the webpage has https or turn off the lock.

  10. Anonymous users2024-02-03

    Hello, it is already the era of big data, so it is still difficult to protect personal privacy.

  11. Anonymous users2024-02-02

    1. In the era of big data, we must first have a strong sense of protection, which makes us vigilant, which is very important.

    2. In the era of big data, we must protect our ID cards, which cannot be leaked to others casually and protect our privacy.

    3. We can't register our information to each ** casually, so as not to leak our own information and let others leave their own information.

    5. Be more careful with the mobile phone network, now there are many traps in the mobile phone, if you are not careful, our information will be obtained by others.

    In a word, we must be careful and careful, and then protect our privacy and let our own information be protected.

  12. Anonymous users2024-02-01

    Privacy can't be protected at all, because no matter what you do, your diet will be leaked, some are the kind of great privacy, including your personal ID information, personal account information, etc., some are more ordinary your buying tendencies, these things, sometimes big data is in other people's data.

  13. Anonymous users2024-01-31

    In fact, many personal privacy will be leaked out unintentionally, and the major platforms are in a dominant position in data, and individuals sometimes have no good way.

    What you can do is to control your desires, not take advantage of small advantages, reduce the curiosity mentality, and minimize the upload of personal information on the platform.

  14. Anonymous users2024-01-30

    First of all, the rapid expansion and diversity of the scope of personal privacy information make the legal regulation very complicated, how to type and regulate the complex personal private information such as identity information, biological information, activity information, etc., in different industries and fields, and how to clarify the qualifications of the collection subject and the scope of data use on the basis of typology, all of which need to be further studied.

    Second, in the era of big data, most of the acts infringing on privacy are slight, scattered, and hidden, and the victims' own motivation and ability to protect their rights are insufficient, and they cannot effectively restrain the infringers.

    In addition, the law enforcement profession in the high-tech industry is difficult and the difficulty of obtaining evidence is high, and the initiative and effectiveness of law enforcement will inevitably be hindered when various industry standards are not perfect.

    In reality, we should come up with solutions to these difficult problems as soon as possible and put them into action.

    Strengthen on-the-spot research and accelerate the legislative process. Focus on in-depth research on local legislation and practice in the Big Data Pilot Zone, and promote the resolution of specific legislative issues such as the subject of personal information collection, data rights, scope of use, and exit conditions.

  15. Anonymous users2024-01-29

    It is recommended not to easily leak your private information on the Internet, such as displaying geographical location on WeChat, ** and other confidential information; Do not register information lightly, even if you register, you should take the principle of minimization, and you should pay attention to whether there is a clear privacy policy statement and other information when registering.

    If allowed, try to adopt some anonymization methods, such as the name of the courier can be a nickname, the address can be selected as a public address, and the personal information can be removed when the courier packaging box is processed; Be cautious about allowing apps to have system permissions; Check whether the login is secure, see if the webpage has https or turn off the lock.

  16. Anonymous users2024-01-28

    In the era of big data, in fact, personal privacy cannot be protected at all, because no matter what you do, your diet will be leaked, and some are very private, including your personal ID card information, personal account information, etc., and some are relatively ordinary your buying tendencies, these things, sometimes big data are in other people's data.

  17. Anonymous users2024-01-27

    Manage items that contain privacy to prevent others from taking advantage of them.

    Don't give away your secrets to others, and don't give out your true information when you don't have to.

    Be alert to the behavior of others listening to and snooping on your privacy.

    Try not to participate in activities that involve personal privacy.

    Master the knowledge of network security operation to avoid personal privacy leakage.

    If you find that your computer is incompromised, you should disconnect the network cable as soon as possible, and then detect and fix it.

    Use search engines to search for your real name regularly. Focus on the content of the first three pages to see if there is any privacy information related to yourself, if you find that your personal privacy has been violated, if you know the leaker, contact and communicate as soon as possible, if you don't know, you can call the police in time, or ask the online platform to delete it.

  18. Anonymous users2024-01-26

    In the era of big data, if you want to protect personal privacy, it is indeed difficult, but identity information must be kept confidential, so you must usually do it, in terms of personal diet, you must be very careful, do not lend your ID card, do not want your ID number, and let others know

  19. Anonymous users2024-01-25

    It is very important and necessary to protect your privacy in the era of big data. Some of your information can be seen in the background of some WeChat, **, etc., so try not to expose all your information when you go to the Internet.

  20. Anonymous users2024-01-24

    In the era of big data Internet, we no longer have privacy at all, because we have to hand over everything to the operator's information, so our privacy is handed over to the operator, and there is no privacy at all.

  21. Anonymous users2024-01-23

    Of course, we don't have any privacy, because big data penetrates into every corner of people's lives, and people have nowhere to hide.

  22. Anonymous users2024-01-22

    We still have privacy, but a lot of privacy is already known to many companies.

  23. Anonymous users2024-01-21

    In the era of big data, personal privacy is very easy to leak, and we should avoid this situation, and we should try to do as little real-name authentication as possible on the Internet to ensure security before implementation.

  24. Anonymous users2024-01-20

    Nowadays, personal privacy is indeed very easy to be leaked, we should be very careful, do not casually scribble your own information on the Internet, and do not casually lend your ID card to others.

  25. Anonymous users2024-01-19

    Nowadays, the Internet is also very developed, many people will chat and do some other things on the Internet, but some people also pay more attention to their personal privacy, although the Internet era can make life more convenient, but it is also likely to lead to privacy leakage. In the era of big data, there is also personal privacy, and doing a good job of prevention can also reduce the leakage of information. If personal information is leaked, it can easily be used by criminals and cause adverse effects.

    When using the Internet, do not use your real name, ID number and home address, so as not to be used by criminals to commit fraud or threats. <>

    With the development of science and technology, many people can buy what they like without leaving home, which also proves the importance of online shopping. Some unscrupulous merchants may sell the information provided by consumers to the black industry chain, even if the other party is a conscientious seller, in the process of transportation, the express company may also leak the information. <>

    Whether it is playing games or logging in to some apps, it is necessary to carry out real-name system, but before carrying out real-name system, it is also necessary to understand whether these software are safe and reliable. In the process of online communication, WeChat is also inseparable from chatting, but personal information in WeChat is also very easy to leak. <>

    In many people's mobile phones, there will be micro-businesses and salesmen, even if they are familiar friends, there will be cheating, because most people prefer to post their lives in the circle of friends, which will also lead to the leakage of itinerary information. After receiving the scam**, it is not surprising that the other party can clearly say personal information.

Related questions
7 answers2024-06-15

In recent years, the market size and penetration rate of China's cloud computing industry have continued to grow, making China's public cloud market enter a new stage of development. In addition, driven by the development of 5G commercialization and AI and other technologies, the scale of China's public cloud market has always maintained a rapid growth trend, according to the statistics of the China Academy of Information and Communications Technology, in 2018, the size of China's public cloud market reached 100 million yuan, an increase from 2017. >>>More

6 answers2024-06-15

26- What big data can't do.

24 answers2024-06-15

Because a news about the higher delivery fee than before after netizens registered as a member, big data killing once attracted people's attention, so the incident of Meituan's big data killing has always been a topic of discussion. But after Meituan's simple response, there was no news. Now, users who have questioned Meituan's big data killing have spoken out again, how did Meituan respond to this question? >>>More

11 answers2024-06-15

In the era of digital economy, when traditional enterprises realize digitalization, they must pay attention to digital marketing as an important aspect, change marketing ideas, models and strategies that cannot meet the needs of the original, and realize new marketing methods. Along with digital management and manufacturing, digital marketing, as a hot spot, will become one of the three important components of digital enterprises. Generally speaking, in a fully competitive market, enterprises can only get normal profits, and if they want to get excess profits, they must innovate. >>>More

11 answers2024-06-15

There are two ways to improve your online credit.

1. Don't apply for online loans too often, so as not to cause your own online black index score to be low, thus becoming an online loan blacklist. >>>More