Abstract:This article summarizes the types of incidents of personal information leakage in big data enterprises through multiple case studies.Subsequently,the root cause analysis method was introduced into the problem research,and tools such as flowcharts,affinity diagrams,fishbone diagrams and Pareto diagrams were used.Finally,the reasons for the personal information leakage of 80% of big data enterprises are analyzed,and policy recommendations are made based on the research results.The study found that weak personal information protection awareness,corporate management loopholes,inadequate legislation and external attacks are the first issues that need to be addressed.Therefore,it is recommended that the state should improve personal information protection legislation;The government should increase citizens' awareness of information protection by strengthening publicity;Enterprises should improve information management mechanisms and strengthen information platform defense.
刘姣姣, 毛子骏, 徐晓林. 基于根因分析法的大数据企业个人信息泄露案例研究[J]. 中国科技论坛, 2020(11): 110-119.
Liu Jiaojiao, Mao Zijun, Xu Xiaolin. Case Study of Personal Information Leakage in Big Data EnterprisesBased on Root Cause Analysis. , 2020(11): 110-119.
[1] 涂萌,张绵伟.第三方支付用户个人信息安全风险及对策研究[J].情报理论与实践,2018,41(12):70-75. [2] 韩秋明.基于信息生态理论的个人数据保护策略研究——由英国下议院《网络安全:个人在线数据保护》报告说开去[J].图书情报知识,2017(2):94-104. [3] 郝文江,武捷,李思其.互联网用户信息泄露事件探究[J].信息网络安全,2012(8):22-25. [4] 罗力.我国移动互联网用户个人信息安全风险和治理研究[J].图书馆学研究,2016(13):37-41. [5] 严贝妮,叶宗勇,段梦丽.快递用户个人信息安全隐患成因解析——基于用户角度的调查研究[J].现代情报,2018,38(2):91-95. [6] 刘雅琦.大数据环境下个人信息的保障性开发利用现状分析及对策研究[J].图书馆学研究,2015(15):67-76. [7] CARMAGNOLA F,OSBORNE F,TORRE I.Escaping the big brother:an empirical study on factors influencing identification and information leakage on the web[J].Journal of information science,2014,40(2):180-197. [8] 李宁,李卫东.移动阅读APP用户个人信息安全研究——基于10款移动阅读APP的调查分析[J].图书馆学研究,2019(21):48-56. [9] 田波,郑羽莎,刘鹏远,等.移动APP用户隐私信息泄露风险评价指标及实证研究[J].图书情报工作,2018,62(19):101-110. [10] 王晰巍,王雷,贾若男,等.社交网络中个人信息安全行为影响因素的实证研究[J].图书情报工作,2018,62(18):24-33. [11] RONI S.Root Cause Analysis Webinar-FAQs[EB/OL].(2014-05-12)[2020-02-12].https://ies.ed.gov/ncee/edlabs/regions/midatlantic/app/Docs/technicalassistance/RootCauseAnalysisWebinarFAQs_2014-05-12.pdf. [12] SWEIS R,MOAREFI A,AMIRI M H,et al.Causes of delay in Iranian oil and gas projects:a root cause analysis[J].International journal of energy sector management,2018,13(3):630-650. [13] REES C A,LEE L K,FLEEGLER E W,et al.Mass school shootings in the United States:a novel root cause analysis using lay press reports[J].Clinical pediatrics,2019,58(13):1423-1428. [14] LUNDBERG A,DANGEL R F.Using root cause analysis and occupational safety research to prevent child sexual abuse in schools[J].Journal of child sexual abuse,2019,28(2):187-199. [15] GANGIDI P.A systematic approach to root cause analysis using 3×5 why's technique[J].International journal of lean six Sigma,2019,10(1):295-310. [16] HELLESEN N,TORRES H,WANGEN G.Empirical case studies of the root cause analysis method in information security[J].International journal on advances in security,2018,11(1):60-79. [17] PATRICK R.How to use the Swiss cheese accident causation model[EB/OL].(2018-03-02)[2020-02-13].http://blog.enterprisetraining.com/swiss-cheese-accident-causation-model/. [18] 罗云,江虹.根据“海因里希法则”科学理解和有效落实“双重预防机制”[J].中国安全生产,2019,14(10):36-38. [19] GRAHAM-HARRISON E,CADWALLADR C.Revealed:50 million Facebook profiles harvested for Cambridge Analytica in major data breach[N/OL].The Guardian,2018-03-18[2019-12-24].http://freestudio21.com/wp-content/uploads/2018/04/50-million-fb-profiles-harvested-by-cambridge-analitica.pdf. [20] 何渊.大数据战争:人工智能时代不能不说的事[M].北京:北京大学出版社,2019. [21] The New York Time.Marriott Hacking Exposes Data of Up to 500 Million Guests[EB/OL].(2018-11-30)[2020-01-02].https://www.nytimes.com/2018/11/30/business/marriott-data-breach.html. [22] 新浪科技.5亿用户数据遭泄露,你中招了吗?应该怎样补救[EB/OL].(2018-12-02)[2020-01-02].https://tech.sina.com.cn/i/2018-12-02/doc-ihmutuec5276075.shtml. [23] Marriott International.Marriott Provides Update on Starwood Database Security Incident[EB/OL].(2019-01-04)[2020-01-02].https://news.marriott.com/news/2019/01/04/marriott-provides-update-on-starwood-database-security-incident. [24] 国家信息安全漏洞共享平台.物联网供应商Wyze确认服务器数据泄漏[EB/OL].(2020-01-06)[2020-05-08].https://www.cnvd.org.cn/webinfo/show/5365. [25] ZDNet.IoT vendor Wyze confirms server leak[EB/OL].(2019-12-29)[2020-01-01].https://www.zdnet.com/article/iot-vendor-wyze-confirms-server-leak/. [26] SCUPIN R.The KJ method:a technique for analyzing data derived from Japanese ethnology[J].Human organization,1997,56(2):233-237. [27] 王永进,张淑洁,汪群,等.用帕累托法则对读者留言的分析研究[J].图书馆工作与研究,2008(4):78-81. [28] 杨琴,杨正,张继霞.高校实验队伍综合激励调研及帕累托图分析[J].实验技术与管理,2019,36(12):271-273 [29] 信息通信管理局.关于侵害用户权益行为的APP(第一批)通报[EB/OL].(2019-12-19)[2019-12-28].http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057709/n3057714/c7574782/content.html. [30] 人民网.全球90个国家和地区制定个人信息保护法律[EB/OL].(2017-08-10)[2020-01-02].http://world.people.com.cn/n1/2017/0810/c1002-29463433.html. [31] 国家保密科技测评中心.我国个人信息保护标准体系与实践[EB/OL].(2019-12-30)[2018-12-29].http://www.gjbmj.gov.cn/n1/2018/1229/c411145-30495426.html. [32] 央视新闻客户端.外来“黑客”、平台“内鬼”,个人信息被泄露都和他们有关[EB/OL].(2018-10-08)[2019-12-30].http://m.news.cctv.com/2018/10/08/ARTIR2gU4dCSou4J8qiJGcLY181008.shtml.