Welcome to Francis Academic Press

International Journal of Frontiers in Engineering Technology, 2021, 3(1); doi: 10.25236/IJFET.2021.030106.

Privacy Security of Personal Information in China's Top 10 Online Game Platforms

Author(s)

Xiuwen Ye, Fan Zhou*, Yucui Yang , Haolong Dong, Zhengkeer Zhou, Manping Yang and Xiufang Huang

Corresponding Author:
Fan Zhou
Affiliation(s)

Yulin Normal University, Yulin City,China

e-mail:[email protected]

*corresponding author

Abstract

With the development trend of online games in the era of big data as the breakthrough point, the privacy of personal information on Chinese game platforms was studied by referring to the collection and use of personal information in the privacy agreements of the top 10 online game platforms. Based on numerous theoretical facts, supplemented by scientific and reasonable analysis, substantive suggestions were put forward from three aspects: the users' right to know, the operators' authority for and the legal provisions about the purpose of personal information, providing valuable opinions and development plans for the solution and improvement of the personal information privacy issue on Chinese online game platforms.

Keywords

privacy right; personal information protection; user's right to know

Cite This Paper

Xiuwen Ye, Fan Zhou, Yucui Yang , Haolong Dong, Zhengkeer Zhou, Manping Yang , Xiufang Huang. Privacy Security of Personal Information in China's Top 10 Online Game Platforms. International Journal of Frontiers in Engineering Technology (2021), Vol. 3, Issue 1: 33-38. https://doi.org/10.25236/IJFET.2021.030106.

References

[1] Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets network security and priva-cy. ACM Computing Surveys (CSUR), 45(3), 1-39.

[2] Qian Li,Jinke Tan.(2015)Perfection of Network Privacy Protection Legislation in the Internet Plus Era.China Business and Market ,v.29;No.255,119-124.

[3] Wang Yegang, ( 2020) “Legal Regula-tion of Internet Privacy Policy and Protec-tion of Personal Information: the Ameri-can Practice and Its Implication”,Global Law Review ,No.226,151-163.

[4] Li hanyan, (2020)“Study on the Prin-ciple of Parental Informed-Consent for the Protection of Children's Personal Infor-mation”,Library Tribune,No.256,63-73.

[5] Zou, L., Chen, L., & Özsu, M. T. (2009). K-automorphism: A general framework for privacy preserving net-work publication. Proceedings of the VLDB Endowment, 2(1), 946-957.

[6] Madejski, M., Johnson, M. L., & Bel-lovin, S. M. (2011). The failure of online social network privacy settings.

[7] Blank, G., Bolsover, G., & Dubois, E. (2014, August). A new privacy paradox: Young people and privacy on social net-work sites. In Prepared for the Annual Meeting of the American Sociological Association (Vol. 17).

[8] Tai Jiangli, ( 2019)“On Practice and Regulations of App's Collecting Personal Information”,Journal of Beijing Univer-sity of Aeronautics and Astro-nautics(Social Sciences Edition), v.32;No.128,10-15.

[9] Ye Mingyi, (2018)“Protection of Per-sonal Information by Tort Law”,Chinese Journal of Law,No.237,85-104.

[10] Wei Lai Zheng Yue, (2010)“Private 2.0: Research on User's Privacy Protect in Web 2.0”,Library and Infor-mation,No.135,66-70+86.

[11] Madejski, M., Johnson, M. L., & Bellovin, S. M. (2011). The failure of online social network privacy settings.