The Wave of the Digital Economy: The Conflict and Balance between Data Sharing and Personal Privacy

. As modern society gradually penetrates into the era of big data, digital economy becomes an important field. Citizens' information data is rapidly passed in the tripartite field of economy, government and individuals, and citizens' privacy leakage is serious. The article will take Learning Pass leaked information, township bank red code, etc. as examples to study the result and impact of personal privacy leakage, the conflict and balance between digital sharing and personal privacy, how to work together to protect personal privacy, personal privacy related protection policies, etc. Through questionnaire survey, data crawling, and XXXX model, etc. to analyze data, the article will research on the digital economy on personal privacy, and propose protection countermeasures, so that individual citizens can be more vigilant, relevant fields can comply with relevant norms, improve relevant literacy, reduce personal privacy leakage, and make data sharing and personal privacy present a balanced state.


Research Background
As we move into the era of big data, citizens' data are passed in several fields, which makes citizens' personal privacy needs to be paid more attention and prevention.The survey shows that the last three years articles related to personal privacy amounted to2,286, and the average annual and personal privacy-related papers from 2018 to 2020reached 762 on average; 51% of global consumer privacy attitudes in 2021 are privacy pragmatists; 26% are optimists and 23% are privacy nativists, and in 2020 Chinese consumers believe that companies leak users' personal information to third parties up to 74%.All these data show the importance of personal privacy and the seriousness of the extent of personal privacy leakage 2.
Through research discovery, foreign relevant right of privacy legislation is more.The United States has the Financial Privacy Act, the Federal Electronic Communications Privacy Act, the Family Education Rights and Privacy Act, the Computer Comparison and Privacy Protection Act, etc. Germany has the Federal Data Protection Act, the State Data Protection Act, and the Federal Data Protection Act.There is no such special privacy law in China, but it is scattered in pieces between the Criminal Law and the Civil Code of the People's Republic of China and other laws.Legal defects will bring new hidden dangers to the protection of personal privacy.
So this paper will examine the following questions: What will be the outcome and impact of personal privacy leakage?How can the conflict between digital sharing and personal privacy be mitigated and balanced?How to protect the privacy of citizens?These are the main questions addressed in the article

1) Realistic meaning
In recent years, data sharing has been a major trend in contemporary society.There-fore, in the current context of increasing tension between citizens and various fields due to personal privacy conflicts, we find that data sharing is an important part of the digital economy in the wave of digital economy.This paper attempts to break through the article will focus on the results and impacts of personal privacy leakage, to solve the digital sharing and personal privacy conflict to reach a balance; and to propose corresponding strategies to protect the privacy of citizens.This paper attempts to break-through from the attitude of citizens' privacy, analyze the technology used for personal privacy protection, the related laws of personal privacy protection and several important aspects of industry regulation; propose further research directions for personal privacy protection of big data based on the analysis of the causes and then targeted solutions from the aspects of government facilities and privacy leakage, so as to achieve the purpose of this paper to solve the conflict between data sharing The purpose of this paper is to solve the conflict between data sharing and personal privacy.
2) Theoretical significance This article has research value for the digital economy proper, and the study of data sharing and personal privacy conflicts can make up for the lack of relevant literature on user psychology and governmental grassroots and other related studies, and deepen there search on closely related protection technologies and the digital economy.The article will be of value to the practical aspects of data protection and will provide some insight into the research on related data transportation

Main Methods
This article mainly adopts the method of questionnaire survey firstly, using the questionnaire survey to communicate with the respondents to collect samples, mainly to investigate the users' attitude towards personal privacy and the various ways of personal privacy leakage, and to analyze the relevant research population; secondly, we adopt the case study method, this article mainly uses the case of Henan Township Bank's recode and the case of learning to delete users' stored information to study the aspects of user information leakage and the seriousness of personal privacy leakage under the cur-rent epidemic situation.Third, we will also use literature research to elaborate on this field so that the public can have a deeper understanding of this field and raise citizens' vigilance and prevention.
The research in this article features a comprehensive study of multiple research methods and models from a citizen's perspective on how to leak personal privacy and how to maintain good personal privacy at the grassroots level of government and business, and the research ideas in the article are as follows.
1. How personal privacy is compromised The article will provide a more comprehensive description of the aspects, processes, and main categories of information leakage, so that the public can understand how personal privacy can be leaked and thus improve the security settings of each privacy and strengthen the prevention.

Analysis of public attitudes toward personal privacy
Based on the questionnaire, we will conduct a targeted analysis of the main distribution of the questionnaire, and we will analyze the public's psychology to understand the public's needs and the areas where the public feels that data sharing is insufficient.

Status of domestic research on digital economy
The literature on digital economy in China reflects the beginning and development of digital economy in China.As shown in Figure 1.From 1994 to 2013, research related to the digital economy grew slowly, and from 2014, the volume of literature grew exponentially until 2019.
In 1994, China's first article on the theme of digital economy, "Digital Revolution: A New Economic War" was published, and in that year, Sina, Sohu, Netease and other leading companies in China's Internet industry received unprecedented development, and China officially entered the Internet era.
However, there were fewer studies on the digital economy between 1997 and 2013, with an average of less than 10 publications and a long interval between research results.This may be due to the imperfect construction of Internet infrastructure in China at that time, and the digital economy model was not formed in the early stage, so there were fewer related studies.2014, the government really elevated the construction of information technology to a "handful project" and made the digital economy a strategic choice in China's development process, which aroused great attention from academia and set off a research boom.From 2014 to 2019, the number of core literature related to digital economy has increased exponentially, from 17 in 2014 to 178 in 2019, with a spurt of research.
Yuan Zhengguang (1994) in "The Digital Revolution: A New Economic War" prospectively expounded the trend of the world's digital technology development and pro-posed countermeasures for how countries should respond to the digital revolution in the future.This article was the opening work of China's digital economy research and pro-vided a certain foundation for the subsequent digital economy research.
In his article "Digital Economy: How China's Tax System Responds" published in2020, Liu Qichao proposes that the digital economy will bring about adjustments in the rules of global economic governance, and the tax system should respond to this with support and not become a stumbling block that hinders the development of the digital economy.Before an international consensus is reached, it is recommended to draw on relevant international experiences and deliberate whether the reorganization of tax rules will aggravate the burden of the relevant authorities and enterprises.
Fan Zhibu and Cheng Jiaojiao in their "Study on Opportunities and Countermeasures for Digital Economy Development under the New Coronary Pneumonia Epidemic" published in 2020 suggested that the highfrequency terms studied by scholars in recent years are "digital economy," "digital transformation," and "highquality development.high quality development", "big data", "blockchain", "artificial intelligence", "digital trade "Digital Currency", "Digital Transformation", "Platform", "e-commerce", "re-source allocation", "big data" and other keywords have a high intermediary centrality.It is also mentioned that the demand for online services has surged in the new crown pneumonia, ushering in a series of major transformation and development opportunities.And because the current research on digital economy is in its infancy, resulting in a small sample, the research results may produce bias.

The value of the digital economy
As the core force of the new round of global technological innovation and industrial change, the digital economy is highly compatible with the inherent requirements of the new development concept and has become a leading factor in reshaping the eco-nomic structure and improving production efficiency.First of all, the digital economy is characterized by high growth, wide coverage and strong penetration, which provides a strong impetus for sustainable economic development and is a source of power for high quality development of economy and society.The digital economy can also provide high-quality products and service systems for the whole society in a high-efficiency and high-yield production mode, and also change the traditional public service mode and social governance mode, and improve the effectiveness of government ser-vices.
The digital economy is an important engine for achieving high-quality economic development, and is an important platform and "gas pedal" for implementing the new development concept and achieving high-quality economic development.

Development of the digital economy
The focus of development: It should promote the promotion of big data model, layout node cities nationwide, enrich the development model of information industry with digital industrialization, and strengthen the software development and hardware layout of related technologies.
Traditional industries and new industries are not incompatible, we should use industrial digitalization to boost the deep integration of digital mirror economy and real economy, drive the transformation and upgrading of traditional industries, bring into play the advanced advantages of digital economy, and drive the new development of traditional enterprises.Finally, the digital economy accelerates the integrated development of urban and rural areas, and through the integration and sharing of urban and rural information resources, the boundaries between urban and rural areas are increasingly blurred, which is conducive to the development of urban and rural integration.

Definition of personal privacy
The word "privacy" is an evolution of the word "private", which originally means the area of one's life that is unrelated to others.Nowadays, the concept of "privacy" is commonly used to protect the rights and interests of citizens, and it is forbidden to publish or disclose the personal information of citizens, such as their age, gender, family composition, ID number, etc.
There are currently laws that speak to this concept.The concept is the "White Paper on Privacy and Information Highway Construction" issued by the U.S. Department of Commerce's Telecommunications and Information Administration in October1995.According to the book, personal privacy includes at least the following nine areas: ①Private property.②Name and image interests.(3) The right not to have one's affairs interfered with by others.④The internal affairs of an organization or business.⑤ Privacy regarding certain occasions when it is not appropriate to show your face.(6) Respect for the privacy of others not to disclose information about others.(7) Sexual life and other private life.(8) The right not to be monitored by others.⑨Private versus official privacy [1] The importance of personal privacy From the perspective of spiritual and material costs From the definition of personal privacy, we know what personal privacy includes.As we are in the era of big data, our personal data are constantly bouncing around in the hands of different people for analysis and manipulation.The loss of information is to a large extent a spiritual and material cost to us.The first is the mental cost, which is defined in this paper as the mental work and mental experience and effort that an individual puts into a motivation.There are recent cases of personal privacy breaches.In the case of the Tangshan beating incident on June 10, 2022, people were in an emotional shock of anger and pity and conducted a human flesh search for the abuser, which made the abuser's personal privacy transparent to the public instantly.Under the pressure of the huge mental cost, some of the abuser's family members were humiliated and jumped off the building to make the tragic case.Therefore, the protection of personal privacy is very important to maintain our mental costs.
Secondly, from the perspective of material cost our personal privacy can also cost us a lot of physical financial resources.Taking telecom fraud as an example, we found after research that from January to May 2021, 114,000 cases of telecom network fraud were solved nationwide, more than 14,000 criminal gangs were broken up, and 154,000suspects were arrested, up 60.4%, 80.6%, and 146.5% respectively year-on-year.Successfully dissuaded 7.71 million people from being cheated and recovered 99.1 billion yuan in economic losses for the public.In May 2021, a total of 84,600 cases of telecom network fraud were established nationwide, down 14.3% compared to April, and the momentum of the continued high incidence of cases has been somewhat curbed [2].
This shows the importance of personal privacy prevention for citizens' property protection.

From the perspective of risk prevention and control awareness
In the era of big data, the use of citizens' personal data is becoming more and more widespread and involved.A Russian cameraman, Aig, implemented an experiment and spent six weeks to take more than 100 photos of random people in St. Petersburg, and used the face recognition software Find Face to determine the network identity of these people, and the software accurately confirmed the network identity of 70% of the matter scanning the network of 55 million photo matches.The main reason behind this is the lack of awareness of risk prevention and control of citizens, so it is necessary to engage the awareness of citizens to avoid the emergence of more "transparent people "because of big data, the improvement of awareness of personal privacy control, on the one hand, can effectively protect the safety of citizens' lives, on the other hand, if there is a large area of information leakage.It is easy to trigger social panic, which is not good for the security and stability of society as a whole, the heightened awareness also provides effective protection for national security 3 Experimental analyses

Purpose
With the rapid development of information and communication technology and the Internet, data sharing technology is developing at a high speed.People's browsing his-tory reflects the user's personality traits, internal status and other characteristics.The use of many software applications requires user authorization to enable certain data, and in doing so, provides the appropriate development portal as a way to provide a higher user experience.But to be sure, it is a certain degree of leakage of this data that allows us to enjoy better services.For example, various applications analyze people's psychological characteristics based on their browsing history and display "relevant con-tent of interest to you", self-screening the information you want to browse or under-stand, greatly reducing the time wasted on useless information; or various online ordering, home delivery and other software, naturally to obtain our location information.Traditionally, privacy is just a name, the location is in a public or private place and other issues.But in today's society, the combination of big data and artificial intelligence, our privacy will be subject to deeper leaks, even involving values, sexual orientation and other "sensitive" personal information in the usual sense.In the era of bigdata, privacy leaks are inevitable, and this is considered one of the new ethical issues associated with the increasing development of the Internet, where the boundaries of privacy are blurred, and the law may still need to be improved as far as how to protect online privacy.Therefore, this paper aims to explore how users can avoid unwarranted privacy invasion in the context of big data and what help they would like to get to avoid unwarranted privacy invasion.

Results
The total number of valid questionnaires is 155, of which 62.58% are young people aged 18-40, 69.68% have a bachelor's degree or above, and 61.94% live in urban areas.Regarding the keyword "digital economy", 74.84% of the respondents believe that it is essentially the same as information technology and data, and 82.58% believe that it greatly affects daily life.And 89.03% of the respondents demanded the right to know about personal privacy data sharing, while 64.52% agreed with the necessity of reason-able data collection and most demanded data collectors to collect data for the first time.90.97% of the respondents in this questionnaire recognized the problem of leaking personal privacy information from electronic devices.Among them, most of the surveyed people rationally perceived the pros and cons of privacy data sharing.The specific interpretation is that 56.77% of the surveyed people think their personal privacy is relatively safe, but some of them have received infringement.99.35% of the surveyed people are concerned about privacy security.Among them, 49.03% always pay attention to the protection of privacy, 29.68% will think carefully about the issue of APP permissions, 20.65%only care about the privacy of bank cards and other property issues.
For the permissions of APP to read SMS records, call records, etc., 89.03% of the surveyed people pay attention to them, 50.97% will prohibit all permissions except those necessary for APP functions, and 38.06% will occasionally restrict their permissions.The number of people who have the right to read SMS records is 89.03%.
In response to the website registration is required to real name or provide other real personal information, 25.81% of the surveyed people choose not to register, 1.29% fill in all non-real information, 72.9% fill in the real information: 35.48% fill in as required, otherwise can not be used normally; 37.42% part of the real fill in, the rest fill in non-real information For public WiFi, 18.71% of the surveyed people never use it, only use the traffic,7.1% always use it without asking the source, 27.74% generally only use the official and verified one, 46.45% generally don't use it unless necessary.
Although most of the surveyed people are so concerned about the security of their personal privacy information, they have also suffered from the following violations: 18.06% of the surveyed people have suffered from personal video and photo exposure, 54.84% received SMS or email scams in the name of winning a prize, 63.87% caller strangers know your name, address or other information accurately, 51.61% received local recommendations immediately after going to a city The message, 32.9%of the wrongdoers steal other people's accounts to you to implement fraud, 57.42%received fraudulent calls to promote loans, 31.61% of personal QQ, WeChat, Alipay and other passwords leaked, 12.9% of people steal their personal information to implement illegal acts.The proportion of surveyed people who have never been violated by information is only 9.03%.
In response to the above-mentioned infringement, the surveyed people have taken the following measures 45.16% looked for online platform operation managers and re-sorted to platform rules, 41.94% solved the problem by themselves, asked the perpetrators to stop the infringement to complain to the competent authorities, 38.06% called the police, 35.48% resorted to legal means, 19.35% used exposure, network bashing and other forms of counterattack, while 16.77% thought it was not a It's not a big deal, no need to call the police to solve it, and 23.23% suffer in silence.As for the cause of privacy leakage, 63.87% of the surveyed people think that the main reason is the imperfect measures of the government and enterprises, while only36.13% of the people think it is the weak awareness of personal prevention.
SHS Web of Conferences 148, 03055 (2022) https://doi.org/10.1051/shsconf/202214803055ICPRSS 2022 For the detailed ways of privacy leakage, 81.94% social networks, 74.19% the per-mission of APP in electronic devices, 62.58% the camera of electronic devices, 59.35%phishing websites, 42.58% used malicious charging devices and other hacked devices,42.58% the cloud storage of the network, and 43.23% the resale of old cell phones.There are various ways of privacy leakage.
As for the methods of privacy protection, 83.23% of the surveyed people think to improve citizens' awareness of personal privacy protection, 78.06% to strengthen the supervision of Internet merchants' behavior of collecting and using customers' personal information, 65.16% to strengthen the rational application of big data technology to avoid harm, 68.39% to strengthen the protection of personal information security bylaw, and 54.84% to develop new technologies to protect personal privacy.As for the future development of personal information protection, the surveyed people hope to improve personal information protection in the following aspects in the future: 80% clarify the amount of compensation for personal information infringement,74.84%simplify the litigation procedure of personal information infringement cases,69.68%clarify the protection responsibility of enterprises or institutions, 65.81% pro-mote the update of information protection technology, 67.74% establish a reporting institution, 60.65% establish arbitration, 64.52% optimize litigation procedures, 11.61% others.Personal information protection requires a longtime effort from many parties.

Evaluation
Analysis of outstanding issues 63.87% of the surveyed people believe that the leakage of privacy has more to do with the imperfect measures of the government and enterprises, rather than personal awareness of prevention In terms of the types of privacy, it can be divided into three categories: personal affairs, personal information, and personal domain.Therefore, the privacy information involved in e-government information sharing can be considered as personal information as well as personal affairs and personal domain information.The right to privacy was first formally defined as the "right to live" and the "right to be free from interference" in the American book "The Right to Privacy" by Warren and Brandeis in January.
As a platform led by a government organization, the Open Government Data Plat-form takes on the responsibility of opening up the publicly available information of various government departments for the public.With the introduction of the The government open data platform provides convenience to the public's life and work, but at the same time, the open data also brings the problem of leakage of personal privacy, national security and commercial secrets, especially the frequent leakage of personal privacy, which leads to the damage of the subject interests of the majority of citizens.
Although 99.35% of the surveyed population cared about privacy and security is-sues, and carefully considered details such as app permissions, they still received minor or serious privacy violations, and even 12.9% of the surveyed population said someone stole their personal information to commit illegal acts.The problem of privacy data leakage has a long history.
In addition to the common problems covered by the questionnaire of this project, there are also many online scams caused by personal privacy leakage in the process of sharing data in the society.The following attached chart, about the statistics of some cyber scams in recent years.
In response to the leakage of personal information on the Internet, 21.32% of the surveyed population said they did not know there were countermeasures or knew or had no measures.
The following chart shows the classification ratio of the daily average number of privacy-protected single devices in China in 2021, from Meizu Flyme Security Center's Meizu Flyme Security Privacy White Paper Many cell phones now include intelligent privacy data protection systems that auto-matically alert or warn you when you clean or download data.This largely protects the data security of most users with weak awareness of privacy data security.

User Analysis
The problem of privacy leakage in the era of big data exists among various people, whether they are teenagers, middle-aged or elderly; or highly educated or loweducated, and it can affect people to different degrees.In this study, analyzed from the perspective of user psychology, taking the age group of 20-40 years old as an example, people think there are mainly the following situations regarding the privacy and security issues.

Very caring, always focus on privacy protection
In the era of rapid development of the Internet, 49.03% of users are very concerned about the attitude of privacy and security issues.According to Freud's psychoanalytic theory, the personality structure is divided into three parts: ego, self and superego.The "superego" is the controller of the personality structure, governed by the principle of perfection, and they will always pay attention to privacy protection and will not make privacy leakage from their own side.
More concerned about the APP permissions issue will think carefully 29.68% of users believe that privacy security problems mainly exist in unreasonable APP permissions, and overly broad APP permissions can become a major hidden dan-ger of personal privacy leakage.In the "2021 China Smartphone User Security Needs Insight Report", it can be seen that 59% of users know to set read permission for APP, 45% will set harassment blocking, 42% will encrypt or hide information, but only avery small number of people will carefully read the privacy policy/statement and actively consult related issues.
General concern, only concerned about property privacy issues such as bank cards Due to the characteristics of the transparency of personal information in the era of big data, there are also 20.65% of users who are only concerned about privacy security issues such as bank card passwords and other property privacy issues.From the point of attention, this part of people's mental activities selectively reflect some phenomena and leave the rest of the objects; the focus of their concern points to property security, because property security is the basic requirement to guarantee the smooth running of people's life and other activities.In Maslow's hierarchy of needs theory, physiological needs, security needs, social needs, respect and selfactualization needs can be realized only under the condition of property security.Once people's property security is violated, it will not only have an impact on their personal emotions but also affect their personal life.Therefore, most people's attention is directed to property privacy issues such as bank cards.Don't care, often ignore privacy and security issues SHS Web of Conferences 148, 03055 (2022) https://doi.org/10.1051/shsconf/202214803055ICPRSS 2022 For privacy and security issues, another 0.65% of users are silently unconcerned about privacy and security issues.The first situation: analyzed from the perspective of the law of acquisition of behavior, Bandura believes that human behavior, especially complex behavior, is mainly acquired.The acquisition of behavior is governed by both genetic and physiological factors, and influenced by the acquired environment.In a large environment like Big Data, it is highly likely that a small number of people will form a habit of personal data privacy and other leaks, making them unconcerned about their privacy leaks.The second situation: younger teenagers, etc., they are busy with their studies every day, and few of them will have smartphones, and in the era of bigdata, smartphones are the most important source of privacy leaks, and they are not ex-posed to the most basic source of privacy leaks, so they also have less concern about privacy security issues.

Digital Economy Scale Statistics and Measurements
The BEA is a measurement system based on the concept of digital economy in an arrow sense, which classifies the digital economy into three main types according to the characteristics of ICT: digital media, ecommerce, and digital infrastructure.The BEA is based on the concept of digital economy in a narrow sense, and classifies the digital economy into three types according to the characteristics of ICT: digital media, e-commerce, and digital infrastructure.Xu Xianchun and Zhang Meihui (2020) summarize the existing literature and classify the digital economy measurement methods asnational economic accounting-related methods (Xu and Tang Qi, 2019;Ahmad and Schreyer, 2016), value added measurement methods (Machlup, 1962;Porat, 1977;Kang Tiexiang, 2008)

Digital Economic Calculation Explanation
The value added of digital economy production is measured.According to the National Economic Classification of Industries (2017), digital economy production includes C-39, I-64, and I-65 industries, and in view of the availability of data, this paper is based on the data from the input-output tables of each region of China in 42 sectors.C-39 corresponds to the category of "communication equipment, computer and other electronic equipment" in the input-output table, while I-64 and I-65 correspond to the category of "information transmission, software and information technology services" in the input-output table.I-64 and I-65 correspond to the "information transmission, software and information technology services" category in the input-output table.1The value added to the output of both is the value added to the digital economy production of the region in that year.The input-output table is compiled on a five-year basis, and the value added of the digital economy for the year in which it is not compiled is estimated by using the statistical yearbook data and the coefficients of the above mentioned tools.Specifically, the value added of "communication equipment, computers and other electronic equipment" as a share of the total value added of "manufacturing" is obtained from the value added of "communication equipment, computers and other electronic equipment" for a known year.Assuming that the adjustment coefficient of digital economy does not change in the short term, the value added of "communication equipment, computer and other electronic equipment" can be obtained by combining the value-added of manufacturing industry in each year of the region; accordingly, the value-added of "information transmission, software and information technology" can also be obtained.The value added of "information transmission, software and information technology services" in the missing years.Measurement of the added value of digital economy circulation.According to the division of digital economy industries, digital economy circulation includes all industries in R-87, some industries in R-86, and some industries in I-63.42 sectoral regional input-output tables only include culture, sports and entertainment, and there is no further industry breakdown.The ratio of the main business income of "broadcasting, television, film and sound recording production" to the main business income of "culture, sports and entertainment" in the census year was measured in the China Economic Census Yearbook as the adjustment factor for the digital economy, and the value added of culture, sports and entertainment in each province was combined with the value added of the industry.The value added of the "radio, television, film and audio production industry" was calculated.The value added of "radio, television, film and video production" is calculated by combining the value added of the culture, sports and entertainment industry in each province.I-63 is calculated in the same way as I-64.

Event Overview
In the township bank red code incident, Zhengzhou Municipal Commission for Discipline Inspection issued a circular on June 22, saying that at that time, a total of 1317village bank depositors were given red codes, of which 446 people were given red codes for sweeping into Zheng, and 871 people were not in Zheng but were given red codes by sweeping the Zhengzhou premises codes sent by others.Zhengzhou Village Bank depositors were given red codes for "inbound personnel under intensive or home isolation medical observation", but in fact most of the depositors who were given red codes did not meet the following conditions.

Assignment of codes and reasons
According to the "Henan Province Health Code Assignment Rules (Second Edition)" issued by the Office of the Henan Province New Crown Epidemic Prevention and Control Command in August 2021, the assignment of red codes is.Assigning red codes during the hospitalization of confirmed cases and during the 14days of intensive isolation medical observation after discharge.Assignment of red codes during intensive isolation of asymptomatic infected persons for medical observation.Close contacts of confirmed cases and asymptomatic infected persons, 14 days of intensive isolation during medical observation, assigned a red code.
Confirmed cases and asymptomatic infected persons of the close connection of the close connection, 7 days of intensive isolation during medical observation, assigned recode.People from abroad to Henan, from the date of entry, 14 days of intensive isolation during medical observation, assigned red code.High-risk areas to stay in the personnel, the implementation of 14 days of intensive isolation medical observation, assigned red code; and so on.
The reasons for the assignment of red codes at that time were as follows.
Zhengzhou Municipal Commission for Discipline Inspection and Supervision said, after investigation, Zhengzhou Municipal Commission for Political and Legal Affairs Executive Deputy Secretary, the city's new crown pneumonia epidemic prevention and control command social control guidance department minister Feng Xianbin, secretary of the league municipal committee, the city's new crown pneumonia epidemic prevention and control command social control guidance department deputy minister Zhang Linlin, unauthorized decision to some village bank depositors to Zheng Fu red code.
Arrangement of the Municipal Party Committee Political and Legal Affairs Com-mission, the Director of the Department of stability maintenance guidance Zhao Yong, the Municipal Bureau of big data section, the city epidemic prevention and control command of social control guidance Department of health code management team leader Chen Chong, deputy general manager of Zhengzhou Big Data Development Co.The briefing pointed out that Feng Xianbin, Zhang Linlin, Chen Chong, Yang Yao-huan, Zhao Yong and other comrades of the rule of law, awareness of the rules is weak, in violation of the "new crown pneumonia epidemic prevention and control in Henan Province, health code management methods" and health code assignment to code trans-fer rules, unauthorized assignment of red code to people who do not meet the conditions of the code, seriously undermining the seriousness of the health code management and use of regulations, causing serious adverse social impact, is typical of the chaotic action.
Trace back to the source The Daily Economic News interviewed Zhang Hua (a pseudonym), a practitioner involved in health code construction work, by phone on the afternoon of the 14th.Zhang Hua said that the residents reflected the situation of "health code for red, place code for green" is likely to exist.This is because the place code is a new product under the new situation of national epidemic prevention and control.Many places only have health code system before, but this year there is a place code system.If the contractor of the two systems is not the same company, there will be two systems independent of each other, although the data flow through a platform, but the results of the two systems are not fully consistent possible.Zhang Hua told reporters, from a technical point of view, the health code "from green to red" is mainly because the user has reached a specific place or other specific conditions.
The technology to modify the health code status is also simple, and the key lies in the allocation and setting of permissions.Under normal circumstances, the permission to modify the health code status will not be the sole responsibility of a department or a link of staff, but will be built-in a rule that does not change at will and will change with the requirements of the epidemic prevention and control departments at all levels."It's rare for technicians to change (codes) in the background if they want to, but they can certainly change them.It depends on each location's internal approval process, permission process, modification process, and special requirements.
In a telephone interview with the Daily Economic News on the afternoon of June 14, Liao Zang Yi, an associate professor at China University of Political Science and Law, particularly emphasized the background and significance of the existence of health codes.
In 2020, the state issued technical specifications for health code development, unified specifications and requirements for the authorization, management and application scope of health code using units, and released a series of national standards for Personal Health Information Codes.
Liao Zang Yi said that from the attribute point of view, the personal health information code belongs to the residents' privacy information at the individual level and is protected by the law of the Personal Information Protection Law.Departments that ap-ply health codes should follow the law in the process of using and managing health codes.The law is not authorized to do, if not in accordance with national regulations, arbitrarily turn yellow code, red code, beyond the scope of national standards for use, belongs to the abuse of power and infringement of government departments, should be corrected in a timely manner.
Liao Zangyi pointed out that the health code, also known as the epidemic prevention and control health code system, was originally intended to be used by the government as an electronic credential for determining the epidemic-related status of individuals under extraordinary circumstances.At present, the application scenarios of health code are becoming more and more extensive, including traffic and travel, access management of key places, medical care and medicine.Empowered by big data, the health code has played an active role in government departments' accurate and efficient epidemic prevention and control and personnel management, and in improving government ser-vices and social governance.

Lead-in Events
The M78Sec security team took the lead in disclosing the leaked information of Super Star Learning Pass, and on June 21, Qiu, a security company founder in Beijing, said in an interview with the Shell Finance reporter that he found out a few days ago that the data of Learning Pass App was being peddled by hackers on a platform, so he checked carefully and found that the social worker database (the database where the hackers filed the leaked user data) was highly consistent with the information of Learning Pass.The leaked information in the social worker database (the database where the hacker archived the leaked user data) is highly consistent with the Study Tone information.The price of Study Tone's data was reduced to RMB 3,000 after several rounds of selling from the initial price of about USD 1,300.The leaked data contains 172.73million pieces of information including school/organization name, name, cell phone number, school/work number, gender, email address, etc.The issue of personal data and privacy protection is once again a concern.
In response to this matter, Study Tone responded on the same day that it does not store user passwords in plain text and takes one-way encrypted storage, so theoretically user passwords will not be leaked, and "the company confirmed that the online rumors of password leaks are untrue.Learning pass said that after receiving the news of suspected leakage of user data has been continuous technical investigation for more than ten hours, no clear evidence of leakage of user information has been found for the time being.But in fact, the shell financial reporter logged into the black and gray production platform and found that the encrypted data stored by Study Tone can be deciphered through technology, such as the mainstream "rainbow table" password deciphering technology, so even if the password is not leaked it does not affect the black industry to obtain student data.

Reason for leakage
In addition to the external reasons for hackers to use special techniques to invade as mentioned above, the internal reasons for the privacy data leakage of Learning Pass APP are mainly divided into two cases.
The first possibility of accidental data leakage due to improper operation of operation and maintenance personnel.
The second kind is an inside job, if its internal authority control is missing or there is a mistake in behavior audit, internal staff (such as database administrator) can use their own system authority to download the data in the database in bulk and then sell it.Kong Deliang, vice president of Qi'anxin Group and head of Innovation BG, said that the information leakage incidents exposed by the media in recent years once agains how that the data of many enterprises and organizations are in a "naked" state, which is the primary problem of data security, preventing "nakedness" and it is urgent to pre-vent "nakedness" and make up for the shortcomings.
With the massive use of APPs, more frequently involved in personal privacy information are e-commerce APPs such as Taobao, Jindoduo, etc.As big data technology becomes more and more mature, e-commerce platforms are also developing rapidly.From the 2003 Taobao-based e-commerce platform, to the 2012 Tmall and other shopping platforms online, and then to the increase in the online market of various brands of e-commerce under the influence of the epidemic in 2020, China's e-commerce trans-actions have gradually hit a new high from 3 trillion yuan.2014-2020 period, the pro-portion of e-commerce retail sales in the retail sales of social consumer goods is getting higher and higher, from 2014 10.8% to 25.1% in 2018 and then to 30.0% in 2020, with an overall upward trend.
The conflict between personal information and the intelligence of e-commerce plat-forms This also makes the e-commerce platform also began to gradually change from focusing on the quality of goods to increasingly focus on the consumer experience, to promote the number of intelligent transformation of the e-commerce industry, intelligent process accelerated.Our daily life has become more and more convenient, at the same time, this has also led to more and more personal data leaks.Advances in big data have made it easier for people to access other people's information, and unscrupulous people are making huge profits by selling other people's information.However, the damage caused by information leakage is unimaginable.In addition to common.harassing phone calls, people may also face the risk of encountering fraud, or evenusing personal information to commit criminal acts.According to the 48th "China Internet Development Statistics Report", the three scenarios with the highest frequency of network fraud are 40.8% of virtual lottery information fraud, 31.7% of online shop-ping fraud, and 28.2% of online part-time job fraud, all of which require the possession of personal information as a prerequisite, and the rise of e-commerce platforms has undoubtedly increased the leakage of personal information to a great The rise of e-commerce platforms has undoubtedly increased the possibility of personal information leakage.
The conflict between personal information and personal psychology When a user logs in or registers on an e-commerce platform, it involves the leakage of a single type of personal information such as personal phone number, ID number, etc.The protection of this single type of personal information is very necessary.(Here, the single type of personal information refers to the information that can identify the information subject by a single piece of information alone. (For example, a person can be identified by virtue of his or her ID number).Using the theory of Nash equilibrium, suppose that the cost of buying the cell phone numbers of 10,000 people is $1 and the cost of sending spam messages to these numbers is $1.Then as soon as his gain exceeds $2, the rational participant will regret that he did not buy the cell phone numbers and send spam messages.Thus, game theory states that itis necessary that almost no one will look at the spam messages received in order to do so.For those who buy personal information, it is obviously cost-effective to spend $2to get 1% of the 10,000 subscribers, as long as 1% of them read the spam messages.Therefore, if 1% of people will read spam, more people will receive spam.Obviously, it is extremely convenient and inexpensive to use e-commerce platforms to collect single type of personal information.However, although composite personal information is not as simple as single type of personal information, it is also very important personal information, and the "guess your favorite products" in ecommerce platform may combine personal information to become personal privacy information.However, there is no way to know the extent of protection of composite personal information by e-commerce platforms (composite personal information here means that multiple information can be combined to identify the information subject.For example, a person can be identified by the combination of his or her name, gender, age, birthday, etc.).

Basic principles of data sharing and personal privacy protection
Principle 1: Let the control of personal information protection and encryption be placed in the hands of citizens.Personal privacy protection ranges from personal permission to holding those who use personal data accountable.When using the data, the borrower is not allowed to disclose it to a third party, and he shall be mainly responsible for the consequences of the behavior after using the data.
Principle Two: distinguish the use of privacy and give different protection.Privacy that will not cause harm to individuals, organizations, enterprises or even the society and the country should be protected by standards, that is, users are allowed to use it, but users must be responsible for the whole process; For high-level privacy that is harmful to the above groups and losses the interests of the above groups, regulations should be set up, targeted assessment of high-risk data should be carried out, and high-level protection measures should be taken to improve the protection.
Principle three: improve the transparency of data use and smash the black box.Because of big data algorithms, big data usage cannot be understood by a huge portion of citizens.So it is likely to be at risk of becoming a black box.For example: the flu-related search bar that Google identified was based on testing 450 million mathematical models.Black boxes are opaque, unexplained and untraceable, and we can't fathom them.To prevent accidents, we need transparency in our monitoring.

Suggestions for improving personal privacy protection
1. Personal level: self-protection of privacy.
If necessary, citizens should not fill in their personal information at will.Only by being themselves can citizens effectively prevent information leakage.Once a citizen discovers that his or her privacy has been leaked, he or she has the right to trace the source of the leak, and in serious cases, he or she can file a legal suit.Citizens have the right to request the deletion of personal information they consider important after using public devices.
Be cautious with all links and try not to use public WIFI.If you do and when you do, it is highly recommended to use a global VPN or an encrypted SSHT unnel to encrypt all communication traffic for security; Try not to use public mobile phone charging, mobile phone software download using official channels, access rights to think carefully, social networking sites photos, names, locations, vouchers and other important information is not disorderly sun, change the mobile phone number to the bank counter to remove all kinds of bank card binding.

At the company level: technical barrier protection of privacy
The data in the data layer of personal privacy protection communication can use SSL protocol to ensure the safety of data, as a result, the data layer of data protection is mainly refers to the protection of data storage and management, ensure the safety of data layer of personal information is the basis of all other application on the basis of the data, including data confidentiality, integrity, and availability.
In the computing environment based on big data, it is assumed that multiple data holders cannot trust each other, but due to the need of business cooperation, they need to share data to obtain more systematic information.If the shared information is not encrypted, the confidentiality of the shared data will be directly destroyed.There are two ways to prevent this behavior: either to interfere with the data before it is shared, or to encrypt the data for transmission.Therefore, it is necessary to adopt a privacy protection technology that can perform secure computing on sensitive data sets.Therefore, we need to adopt highly practical secure multi-party computing work in the big data computing environment, and summarize the current highly practical work from three perspectives, namely, obfuscation circuit, secret sharing and homomorphic encryption.
In addition, we should also pay attention to privacy protection technology.For privacy protection, the commonly used privacy protection technology can not solve our difficulties, can not directly hit the pain points and difficulties.Therefore, it is necessary to consider new privacy protection policies according to the evolution law of digital technology society.Privacy protection technology must be oriented to the value of good technology, not only to strengthen the research and development of technology, but also to constantly improve the technology innovation environment, to empower the technology.
First, government grassroots protection In the era of big data, it is far from enough to use technological means to protect personal privacy.It cannot replace the legal system.It is necessary to 10 SHS Web of Conferences 148, 03055 (2022) https://doi.org/10.1051/shsconf/202214803055ICPRSS 2022 establish laws, regulations and basic rules for the protection of personal privacy, and intensify the crackdown on the infringement of personal privacy.
The purpose of establishing laws is to safeguard the right of personal privacy protection in the era of big data, clarify the scope of personal privacy data protection in the era of big data, and the object under the jurisdiction of laws is users and enterprises or specific organizations.The supervision institution of the law suggests the establishment or entrusts special industry associations and industry self-regulatory organizations to assist relevant government departments to supervise the implementation of the law.The perspective of the establishment of the law is the collection, use, release, sharing and criminal punishment of personal data.
In the collection, use, release and sharing of data, it is not only guaranteed that it can be used by others for research, but also guaranteed that it will not cause the disclosure of personal privacy information and data.In terms of criminal punishment, it classifies individuals and enterprises according to the degree of damage, and gives punishment according to the degree of damage.

Summary
To sum up, under the sweeping trend of data economy, the conflict between data sharing and personal privacy is inevitable.Our data leakage will lead us to become "transparent people" on the network, and our personal privacy information will be leaked mainly through the government and merchants.
In order to resist such conflicts, we hope that the government can deepen the seamless management mode, achieve the goal of comprehensive coverage and comprehensive management, and strengthen the community to carry out relevant protection and grid management.Government agencies will strengthen prevention and establish a good privacy disclosure platform.We will strengthen laws to protect citizens' online rights and interests so that victims have regular channels to safeguard their rights.Individuals should improve the awareness of citizen risk prevention, when the capital surface less big data and business "kill ripe".We hope that in the near future, the digital economy will not only create a better way for people to get rich, but also maintain the healthy development of data sharing with legitimate contention processes.

Fig. 1 .Fig. 3 . 4 .Fig. 5 .Fig. 6 .
Fig. 1.The way information is leaked Fig. 2. The solution of information leakage Action Plan for Promoting the Development of Big Data, relevant national policies and regulations on data openness have grown rapidly, and in 2017 the state issued "Several Opinions on Promoting the Openness of Public Information Resources", and in 2018 it issued the "Pilot Work Plan for the Openness of Public Information Resources", and "the construction of a unified open platform for national government data and the development of a public institution data openness Plan" has flourished According to the "China Local Government Data Openness Report: Indicator System and City Benchmark" released by Fudan University on July 26, 2021, as of the end of April 2021, 174 provincial and city local governments in China have launched open data platforms, including 18 provincial platforms (including provinces and autonomous regions, excluding municipalities directly under the Central Government and Hong Kong, Macao and Taiwan) and 156 city platforms (including municipalities directly under the Central Government, sub-provincial and prefecture-level administrative regions).