The Frontiers of Society, Science and Technology, 2025, 7(4); doi: 10.25236/FSST.2025.070402.
Lin Li
Department of Political Science and International Studies, Incheon National University, Incheon, 22012, Republic of Korea
The proliferation of the internet and the rapid evolution of an information-driven society have resulted in the widespread collection and storage of personal data in daily life. In China, the issue of personal information security in cyberspace has become a key factor influencing the trust relationship between the government and its citizens. Data breaches and the misuse of personal information not only infringe upon individual privacy rights but also undermine public confidence in governmental credibility, governance capacity, and political legitimacy. This study examines the privacy challenges faced by citizens in the digital era from the perspective of online personal information security and explores their implications for the construction of governmental trust. It argues that restoring and reinforcing public trust requires effective measures such as enhancing transparency, strengthening accountability, refining legal and regulatory frameworks, and promoting international cooperation in the field of information security.
government, citizens, trust, network, information
Lin Li. The Construction of the Relationship between the Chinese Government and Public Trust: A Case Study of Online Personal Information Security. The Frontiers of Society, Science and Technology (2025), Vol. 7, Issue 4: 10-17. https://doi.org/10.25236/FSST.2025.070402.
[1] Huang, D.-L., Rau, P.-L. P., & Salvendy, G. (2010). Perception of information security. Behavior & Information Technology, 29(3), 221–232.
[2] Westin, A. F. (2003). Social and Political Dimensions of Privacy. Journal of Social Issues, 59(2), 431–453.
[3] Young, A. L., & Anabel, Q.-H. (2013). PRIVACY PROTECTION STRATEGIES ON FACEBOOK: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479–500.
[4] Chen, Y., & Cheng, P. (2019). Analysis of New Threats to Personal Information Security in the Era of Big Data and Protection. China Management Informationization, 22(04), 164–165.
[5] Castells, M. (2008). The New Public Sphere: Global Civil Society, Communication Networks, and Global Governance. The ANNALS of the American Academy of Political and Social Science, 616(1), 78–93.
[6] Kellner, D. (2000). Habermas, the public sphere, and democracy: A critical intervention. Perspectives on Habermas, 1(1), 259–288.
[7] Zhao, H. (2021). Research on the protection of citizens' privacy in the Internet era. Legality Vision, 31, 15–16.
[8] Li, Z. (2023). Research on the legal protection of personal information in the Online Environment. Journal of Handan University, 33(02), 74–78.
[9] Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3, 1–21.
[10] Ping, Y. (2024). Research on personal information protection based on cyberspace security. Cyberspace Security, 15(04), 47–51.
[11] Adebayo O Adewale. (2018). Data Breach Risk Reduction through Perimeter Security and Smart Surfing. International Journal of Computer Science Research and Technology, 7(11),80-84.
[12] Zong, X. (2021). Regulatory Frameworks for Personal Information Protection in the Digital Era. Legality Vision, 16, 104–106.
[13] Solove, D. J. (2012). Introduction: Privacy Self-Management and the Consent Dilemma Symposium: Privacy and Technology. Harvard Law Review, 126(7), 1880–1903.
[14] Mansoor, M. (2021). Citizens’ trust in government as a function of good governance and government agency’s provision of quality information on social media during COVID-19. Government Information Quarterly, 38(4), 101597.
[15] Beshi, T. D., & Kaur, R. (2020). Public Trust in Local Government: Explaining the Role of Good Governance Practices. Public Organization Review, 20(2), 337–350.
[16] Singh, S., & Kumar, R. (2024). SOCIAL CONTRACT THEORY AND IT’S DIMENSIONS- A CRITICAL REVIEW. NUJS Journal of Regulatory Studies, 9, 108-130.
[17] Talesh, S. A. (2018). Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses. Law & Social Inquiry, 43(02), 417–440.
[18] Taylor, N. (2002). State Surveillance and the Right to Privacy. Surveillance & Society, 1(1), 66–85.
[19] Chen, L. (2018). Algorithmic Recommendations Under the Panopticon Model: A Case Study of Toutiao. New Media Research, 04(07), 54–55.
[20] Yuan, D. (2010). The New Media Monitoring System From the Perspective of Foucault’s Superpanopticon. Journal of China Three Gorges University (Humanities & Social Sciences), 32(S2), 187–188.
[21] Gu, L., & Wang, S. (2017). The Conflict Between Social Governance and Citizens' Privacy Rights: Public Video Surveillance from the Perspective of the Super Panopticon Theory. Modern Communication (Journal of Communication University of China), 39(06), 34–38.
[22] Xu, Y. (2021). "Intensification" and "Diffusion": The Panopticon in Social Media. Radio & TV Journal, 12, 190–192.
[23] Lu, A. (2017). A comparative study of the Super-Panopticon of Post and the Panopticon of Foucault Theory Research, Theory Research, 07, 105–106.
[24] Zhang, P. (2007). Analysis of Legal Protection of Personal Information in the Internet Age. Journal of Huaibei Normal University (Philosophy and Social Sciences), 01, 88–90.
[25] Dong, S., Zhang, L., & Zhou, Y. (2020). Telecom Fraud, Network Security and Government Accountability——A Case Study of XU Yu-yu. Journal of Luohe Vocational and Technical College, 19(04), 65–67.
[26] Wu, J., & Fang, X. (2024). Five years of GDPR enforcement in the EU: Achievements, Challenges, and Lessons Learned. Journal of Shanghai Jiaotong University (Philosophy and Social Sciences), 32(03), 82–99.