中文    English

›› 2016, Vol. 28 ›› Issue (8): 92-95.doi: 10.13998/j.cnki.issn1002-1248.2016.08.022

• Work study • Previous Articles     Next Articles

Study on Personal Information Management and Risk Aversion

BI De-qiang, WU De-zhi,DONG Ying   

  1. Library of Harbin Normal University, Heilongjiang Harbin 150080, China
  • Received:2016-02-02 Online:2016-08-05 Published:2016-08-03

Abstract: In the information era, how to acquire, store, organize and use personal information, and how to protect personal information security and avoid risk when people face vast amounts of information have no time to delay. The good or poor of personal information management profoundly affect people’s life and work efficiency. Uncontrolled and unorganized information don't constitute needed resource, in reverse, they confuse people and prevent people absorbing and utilizing information. Therefore, it should overcome discrete and fragmentized phenomenon, and strengthen the management, development and utilization of personal information resource. To protect personal information security for risk avoidance has been the main task in the information era.

Key words: Personal information

CLC Number: 

  • G203
[1] PIM2008.Personal Information Management—PIM2008[EB/OL].[2012-08-24].http://pim2008.ethz.ch/.
[2] 黄娟.信息时代的个人知识管理探微[J].现代教育技术,2005,(3):112-115.
[3] 仇壮丽.基于“5S”理念的个人信息管理[J].档案学研究,2010,(4):35-37.
[4] 陈杰.信息整合技术的理论与实践[J].中国传媒科技,2007,(3):30.
[5] 吉向文,张世永.个人信息检索概述[J].计算机应用与软件,2010,27(2):137.
[6] E.Freeman and D.Gelernter.Lifestreams:a storage modelfor personal data.[EB/OL].[2009-11-15].http://citeseer.ist.psu.edu/viewdoc/download;jsessionid=79A6D1190D5FDD5670780F7CDA37B7CA?doi=10.1.1.54.604&rep=rep1&type=ps.
[7] S.Dumais,E.Cutrell.J.Cadiz et al.Stuff I've seen:A system for personal information retrieval and re-use[EB/OL]..[2009-11-15].http://research.microsoft. com/en-us/um/people/sdumais/siscore-sigir2003-final.pdf.
[8] D.Quan,D.Huynh,and D.R.Karger.Haystack:A platform for authoring end user semantic web applications[EB/OL].[2009-11-15].http://www2003.org/cdrom/ papers/ poster/p339/p339-quan.htm.
[9] 占南,谢笑,谢阳群.个人信息空间管理研究初探[J].情报科学,2011,(8):1140-1146,1153.
[10] 黄蓝会.基于WSRF的个人信息空间管理系统的研究与实现[D].北京:国防科学技术大学,2007.
[11] Robert Capra.A Survey of Personal Information Management Practices[EB/OL].[2010-3-20].http://pimworkshop.org/2009/papers/capra-pim2009.pdf.
[12] 王翠萍,张妍妍.基于个人知识管理的用户信息空间模型构建[J].图书情报工作,2008,(4):54.
[13] 王春元.公共网络信息系统安全管理的研究[D].合肥:合肥工业大学,2009.
[14] 彭默馨,袁艺,孙靖.浅析个人信息安全问题及对策[J].保密工作,2009,(3):54.
[15] 李广都.基于个人信息安全的个人数据管理[J].金卡工程.经济与法,2009,(4):238.
[16] 郭玉梅.个人信息安全的风险规避[J].软件工程师,2011,(Z1):71-7
[1] CUI Yilin, LI Zhuozhuo. Is the Privacy Waybill Really Invisible? A Study of Courier Industry's Personal Information Protection [J]. Journal of Library and Information Science in Agriculture, 2022, 34(8): 65-78.
[2] ZHANG Bin, ZHOU Yonghong. Investigation into and Reflection of User Privacy Policies of Reading Apps [J]. Journal of Library and Information Science in Agriculture, 2021, 33(7): 35-45.
[3] XIE Huizhen. Discussion and Research of Privacy Protection Problems in User Interest Model [J]. , 2018, 30(1): 108-112.
[4] CHEN Xiaohua. Research on Personal Information Security of User in Library Micro Service in Big Data Era [J]. , 2017, 29(12): 131-134.
[5] KUANG Gengli. Research of Library Information Resource Preservation Based on Business Process Analysis [J]. , 2017, 29(11): 36-40.
[6] YANG Min. The Analysis of Personal Information Backup Management and its Development Trend [J]. , 2016, 28(9): 139-142.
[7] ZHAO Xue-yun, ZHU Li. Reader’s Personal Information Disclosure and Protection in Library in the Internet era [J]. , 2016, 28(8): 142-145.
[8] LI Ming-zhen, WANG Zhen. Construction of Information Adoption Model in Digital Library Based on Personal Information World Theory [J]. , 2016, 28(11): 9-12.
[9] LI Jian-li, XIA Hong. Thoughts on Personal Information Management under the Environment of Cloud Computing [J]. , 2013, 25(12): 162-166.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!