Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2025, 8(9); doi: 10.25236/AJCIS.2025.080909.

A Visual Analysis Study on the Theory and Model of User Personal Information Security Protection

Author(s)

Xiaomei Xiong, Yufan Zhao

Corresponding Author:
​Xiaomei Xiong
Affiliation(s)

Jiangxi Police Institute, Nanchang, China

Abstract

In today's digital era, the rapid development of information technology has made the network closely connected with people's lives. While various network services provide convenience to users, they have also caused serious problems in user personal information security. The security of personal information not only causes serious infringement on personal rights and interests, but may also have a negative impact on corporate reputation, social stability and national security. In the network environment, strengthening the security protection of user personal information has become an urgent task. This article aims to deeply analyze the current situation, problems and internal laws of user personal information security protection, and conduct comprehensive and systematic visual analysis of relevant data through network metrology methods, thereby providing solid theoretical basis and practical and feasible suggestions for building a more complete user personal information security protection system. 

Keywords

Network Security Protection; Personal Information Security; User Personal Information Security Protection

Cite This Paper

Xiaomei Xiong, Yufan Zhao. A Visual Analysis Study on the Theory and Model of User Personal Information Security Protection. Academic Journal of Computing & Information Science (2025), Vol. 8, Issue 9: 60-66. https://doi.org/10.25236/AJCIS.2025.080909.

References

[1] National Office for the Regulation of Internet Information. Daily Protection Knowledge of Personal Information Security [EB/OL]. National Confidentiality Administration, 2024. https://www.gjbmj.gov. cn.

[2] Li M. Research on the protection mechanism of personal information from the perspective of overall national security[J]. National Confidentiality Technology, 2020, 12(3): 45-58.

[3] Rogers R W. Cognitive and Psychological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation[M]// Social Psychophysiology. New York: Guilford Press, 1983: 153-176.

[4] Culnan M J. "How Did They Get My Name?" An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use[J]. MIS Quarterly, 1993, 17(3): 341-363.

[5] Zhang Hua. Construction and Application of User Information Security Protection Model [J]. Information Security Research, 2021, 33(2): 95-112.

[6] Li Jun. Research on the Application of Information Security Maturity Model in Personal Information Protection [J]. Computer Applications and Software, 2022, 39(1): 22-30.

[7] Zhang Wei. Research on Legal Issues of Personal Information Protection in China [J]. Legal Studies, 2022, 45(2): 123-145.

[8] Li Jing. Survey and Analysis of Network Users' Privacy Awareness [J]. Information Security, 2023, 38(1): 67-79.

[9] Wang Ming. Application of Data Encryption Technology in Personal Information Protection [J]. Computer Science and Technology, 2023, 39(3): 201-215.

[10] Solove D J. The Concept of Data Privacy[J]. Harvard Journal of Law & Technology, 2021, 34(2): 500-510.

[11] Madden M, et al. Privacy and Data Management in the Digital Age: A Mixed-Methods Study[J]. Journal of Privacy and Confidentiality, 2020, 10(1): 1-25.

[12] Kumar A. Protecting Patient Information in Healthcare: Challenges and Solutions[J]. Journal of Medical Internet Research, 2022, 24(12): e35353.

[13] Smith H J, et al. The Impact of Culture on Privacy Attitudes: A Comparative Study[J]. International Journal of Information Management, 2020, 50: 20-30.

[14] Zhou Li. Comparative Study on Personal Information Protection Laws at Home and Abroad [J]. Comparative Law Studies, 2023, 36(4): 88-102.

[15] Johnson R. The impact of data breaches on consumer trust[J]. Journal of Cybersecurity, 2019, 5(3): 45-67.

[16] Smith J. The role of technology in safeguarding personal information: A review[J]. Computers & Security, 2020, 95: 101800.

[17] Wang L. User awareness and attitudes towards personal information protection: A survey study [J]. International Journal of Information Management, 2022, 62: 102453.

[18] Zhang Jian. Network Graph Analysis of Social Media Users' Privacy Setting Behavior [J]. Cybersecurity and Informatization, 2022, 21(5): 45-60.

[19] Li Xiaoming. Research on Dynamic Monitoring of User Privacy Driven by Big Data[J]. Big Data, 2023, 10(1): 67-79.

[20] Wang Gang. Research on the Application of Machine Learning in User Behavior Pattern Recognition[J]. Information Systems and Management, 2022, 29(3): 150-162.