The notion of privacy was first put forward in 1890, which included ideas, views and emotions (Warren & Brands, 1979)  . Privacy content changes with the times background and regional culture. Through the summary of more than 200 cases, it was pointed out that privacy mainly includes: portrait, name, private space and misunderstood information by others (Prosser, 1960)  . With the development of the Internet, especially the popularity of e-commerce and social networks, the content of privacy has become a hot topic discussed by experts and scholars. The EU has a relatively wide range of privacy content, such as personal age, salary, credit status, property status, physical status, employment status, family status, hobbies, network comments and online shopping records (Schmidt, 2014)  . Privacy range is relatively narrow in US and Japan. It mainly includes the following factors: personal age, home address, property status and other content, such as online shopping records and online comments (Newell, B. C., 2013)  . According to Cavoukian, A. & Jonas, J., “the right of habitation, property status, social relations, living and reluctance to publicly available information belong to privacy” (2012)  . Juels claims that illegal access to personal information, illegal providing personal information to others and personal decision interference, all belong to the infringement of personal Privacy Act (2008)  . Obviously, personal information may not have research value. However, in the era of big data, the property attributes of personal data are becoming increasingly prominent. Much personal information such as family members, work units, marriage status, online shopping records, Internet records and so on in real life are not necessarily practical significance, but in large data background, it has economic value. For example, Decide is a company which forecasts commodity price and provides suggestions about purchase time for consumers (Lazar, N., 2015)  . Through the analysis of data in Amazon, it shows that there are one billion data integration in a page to facilitate consumer comparison, predict the price trend of products, and help the user to identify the best time to buy (Brunozzi, S., 2012)  . Through the association of data mining, it is easy to find a lot of privacy information in the surface of mass data, which brings a new problem to the information security and privacy protection. About 80% organizations have their own database, such as Baidu and Tencent, and these data are mostly in the form of digital, and it is easy to spread out. Once spread out, it is irreversible. Necessarily, it is significant to study privacy in the era of the big data. According to Madden, S., the existing literature about the China’s personal privacy lacks of specialized research (2012)  . To this end, this essay is designed to determine the main content of personal privacy through questionnaires and put forward privacy protection measures.
It can be argued that in the field of business through the analysis of sales data, companies can understand customers’ shopping habits and know which products are suitable for the sale of collocation in order to provide personalized services. However, it is my contention that in fact personal information is completely exposed and used by the third party without informing us, so as to determine our identity. In addition, When internet users become accustomed to the web and visit social networking sites, the users may not have noticed that personal activities is being monitored. According to Victor, Amazon surveils customers’ shopping habits, Google watches people’s web browsing habits and Facebook knows user’s social relations network, which involve 1/5 population of the world (2013)  . Even though database passwords use the protection measures, the probability of hackers restoring the password is about 70% - 80% (Glasgow, K., 2015)  . I request that it is necessary to pay much attention to privacy in the era of big data.
2. Literature Review
The strengthening of legislation to regulate the use of personal information under the network environment is a general way, and explore some of the new data usage patterns, in order to ensure the legitimate rights and interests of individuals to dig up the premise of the use of information, innovative value-added services (Tene, 2012)  . Weber (2012)  believes that the relevant laws and regulations in terms of information protection play a crucial role, and legislation cannot be overanxious for quick results. From the perspective of access to the big data privacy protection, combing the current big data security and the relevant key technologies, Feng believes that big data has brought new security issues, but there is also an important way to solve the problem, through technical means, related policies and regulations to address the big data security and privacy issues (2014)  . According to professor Liu, “it is not enough only by laws and technologies to protect personal information, and it is necessary to strengthen the comprehensive of data literacy from the perspective of ethics” (2015)  . Peter Leonard claims that Data analysis has economic value, while our personal information may be collected and used by the third party without informing us, so as to determine our identity (2013)  . Finally, Leonard focuses on the use of anonymous and de-identified measures to ease the re-identi- fication of risk and these measures are a combination of technology, business and contract security measures (2013)  . Smith claims that “when data about customers is collected and mined by companies such as Facebook, Google, mobile phone companies, retail chains and governments, it is a sociological problem to surveil the use of personal data” (2012)  . It is feasible to look at this issue from a new perspective, namely how can the user gain awareness of the personally relevant part Big Data that is publicly available in the social web. The amount of user-generated media uploaded to the web is expanding rapidly and it is beyond the capabilities of individuals to sift through them to see which media impacts our privacy. Based on the emerging trends of privacy implications and geo-tagged social media, users can stay informed about which parts of the social Big Data deluge is relevant to them (Smith, 2012)  . According to Wang Zhong, the privacy protection in big data environment not only related to ethics, law, industry, technology and other fields, but also involves a large number of individuals, groups, enterprises and institutions, and thus put forward to build the standard system, product information registration system, traceability system, traceability information reward system (2014)  . These systems are regarded as the main content of personal data privacy disclosure mechanism, to attract the relevant stakeholders to provide a solution for the rational use of personal data.
The most difficult part of this assignment will be the collection of foreign literature since there is little literature studying Chinese privacy trust. In addition, big data privacy issues is a new field and the current domestic research in this area is less, so finding sources concerning privacy will also be difficult.
The essay adopts questionnaires to collect data and analyze people’s attitude. In order to guarantee the wide range of the data, this survey chooses different education level, different sex, different ages and different occupations of people as the object of investigation. About 90% of the questions are single and closed response, so it is better to analyze the questionnaire and initiate a clear legal and regulatory protection measures. The survey adopts the Likert Scaling approach, which can be more clear understanding of consumer attitudes towards privacy. This questionnaire has been disseminated through online and offline methods. In order to carry out online survey, the questionnaire is hung in the famous professional survey website “questionnaire star”. The investigation lasted for 15 days. A total of 300 copies have been sent and received a total of 209 questionnaires, of which 123 online questionnaires, 86 copies of offline, including 98 males and 111 females. Details are shown in Table 1.
Ranking from high to low according to the probability of individual privacy are: ID number (73.52%), telephone number (53.18%), IP address (45.26%), Internet records (37.69%), friends dynamic (33.45%), ages (28.12%) and full name (22.37%).
The vast majority of citizens have realized that telephone numbers are privacy. Telephone numbers have become the most common way to get personal information, and customers are often subject to the merchant’s telephone harassment. In addition, We Chat uses phone numbers to bind and log in. As long as users have received the verification code, it is possible to ignore previous password and log in directly, which leads to the huge risk.
Table 1. Descriptive statistics of the study sample.
Data source: all the data comes from the questionnaire.
Females believe that the proportion of personal information belonging to the privacy are higher than males, indicating that females are more sensitive to personal information, as shown in Table 2. But female’s personal privacy leak ratio is higher than male, and the ratio of taking the initiative measures to protect the privacy of personal information is lower than male. Obviously, females are conscious of privacy but lack of prevention technology. Most of them don’t know encryption technology, firewall technology, security authentication and digital hiding technology. when the personal information is infringed, the probability of female choice silently endured 31.66% is more than 22.80%, which shows that women are less flexible than men in taking specific measures, as shown in Table 3.
This essay is designed to study the contents of personal privacy in the era of big data, and propose the strategy to protect the privacy of individuals, which requires large amount of data. The previous studies haven’t use questionnaire to
Table 2. Cross analysis on the cognition of different gender for the content of privacy.
Data source: all the data comes from the questionnaire.
Table 3. Cross analysis of privacy protection measures in different gender.
Data source: all the data comes from the questionnaire.
study privacy, while this essay use questionnaire to study it. Because questionnaire is efficiency and availability, the essay adopts questionnaire to collect data and analyze people’s attitude. In order to guarantee the wide range of the data, this survey chooses different education level, different sex, different ages and different occupations of people as the object of investigation.
6. Conclusion and Recommendation
The research indicates that data has economic value, while most of Chinese are not aware of the importance of personal information, and our information may be collected and used by the third party without informing us, so as to determine our identity. The fact that citizens are aware of the privacy of telephone numbers is due to the merchant’s telephone harassment. It is also indicated that ages and friends dynamic also belong to the content of privacy, while most people don’t pay much attention to them. On the issue of personal information, males are generally “careless” and “lazy”, while females are more “careful” and “active”, while female’s technical ability is relatively poor. Both of them don’t know how to protect their privacy, so it is necessary to learn from the overseas related legislation and combine with China’s actual situation to accelerate the formulation of laws and regulations on the protection of the privacy of citizens and make the violation of privacy clear, as a result, let the citizens abide by the law. For example, in Britain, it is required that business or government should inform the subjects when personal information is collected and used by them; in Germany, if citizens receive spam messages, it is judged to be a violation of personal privacy (Wilson, S., 2014)  . In addition, it is necessary to strengthen the publicity and education of the concept of privacy. There are two ways to promote this concept: the first is through public service ads or lectures; the other is through school education. At last, privacy protection skills training should be promoted and privacy protection technology innovation should be supported. Through the national science and technology plan or industrial development fund, it is available to support enterprises or research institutions to innovate privacy protection technology.
 Schmidt, R., Mohring, M., Maier, S., Pietsch, J. and Harting, R.C. (2014) Big Data as Strategic Enabler—Insights from Central European Enterprises. Lecture Notes in Business Information Processing, 176, 50-60.
 Newell, B.C. (2013) Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information. Elsevier, Amsterdam.
 Weber, S. (2012) Big Data Privacy and Security Challenges. In: Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, ACM, New York, 1-2.
 Smith, M., Szongott, C., Henne, B. and Von Voigt, G. (2012) Big Data Privacy Issues in Public Social Media. Digital Ecosystems Technologies (DEST). 6th IEEE International Conference on Digital Ecosystems Technologies, Campione d’Italia, 18-20 June 2012, 1-6.