中文    English

Journal of Library and Information Science in Agriculture ›› 2022, Vol. 34 ›› Issue (5): 76-91.doi: 10.13998/j.cnki.issn1002-1248.21-0622

Previous Articles     Next Articles

The Mechanism of Personal Data Transfers of Social Network Users

YUAN Fan   

  1. Shanghai Polytechnic University, Shanghai 201209
  • Received:2021-08-15 Online:2022-05-05 Published:2022-05-27

Abstract: [Purpose/Significance] As a typical pattern of user-centered information service, social network has become increasingly pervasive throughout every aspect of users' lives, whereas resulting in some safety problems, for instance data abuse and data monopoly. Users' power of control over personal data has been weakened. The digital market has witnessed the incidence of restrained competition and suppressed innovation, which leads to the impaired vitality of the national digital economy. Nationally, much more attention has been drawn to the protection of users' data rights and interests. Likewise, with the advancement of information technology, it is possible to transfer users' data across platforms. However, the absence of management mechanism makes it impossible to bridge the gap of users' cross platform access, acquisition and transfer of personal data. Hence, on the basis of the investigation and analysis of international successful data transfer modes within the domestic digital network environment, this research aims to construct a personal data transfer mechanism for social network users for breaking the data blockade and protect their digital rights and interests. [Method/Process] To provide the insights into existing research on management mechanism of user's personal data transfer, this research has investigated and reviewed systematically the data transfer systems at home and abroad represented by Data Portability, California Consumer Privacy Protection Law and Anti-Monopoly Law, in such a way that a horizontal comparison from the aspects of system characteristics and connotation, and an analysis of the effectiveness and existing problems of a data transfer system in protecting user's data rights and breaking data monopoly were conducted. Furthermore, according to the characteristics of social network platform, some representative cases like Facebook, SoLiD, and WeChat were chosen to investigate and analyze the mode, characteristics and impact of user's personal data transfer, and then ten mainstream social network platforms at home and abroad were selected in terms of the different number of downloads, users and other indicators of a digital platform. From collecting content, transferable data to data format, a horizontal comparative analysis was conducted to summarize the mode and problems of data transfer on social network platforms. Finally, based on the users' needs of personal information resource management and government digital governance, this research has designed the whole process management organization structure of user personal data transfer, including trust mechanism, feedback mechanism, evaluation mechanism, deletion mechanism and supervision mechanism. To form a personal data transfer mechanism for social network users, the paths of user data acquisition, transfer and deletion were utilized and developed in the context of three phases, before, in and after the transfer. [Results/Conclusions] The data transfer mechanism empowers users' data to be transferred between different digital platforms, effectively breaking the monopoly of large-scale social network platforms on users' personal data. The free transfer of user data lowers the threshold for new entrants of social network services, addressing the significance of the data competition and innovation in the industry of information service. More significantly, some insights could be identified to promote the social network platform for optimizing the technology, product and service mode, and further enriching users' experience, which benefits the ecology-oriented development of digital industry.

Key words: right to data portability, social network, data transfer, management mechanism, data monopoly

CLC Number: 

  • G203
[1] 冯占英, 张玉, 段美珍, 等. 大数据环境下个人信息泄露路径及其保护策略研究[J]. 中华医学图书情报杂志, 2020, 29(9): 7-12.
FENG Z Y, ZHANG Y, DUAN M Z, et al.Divulging paths and protecting strategies of personal information in big data environment[J]. Chinese journal of medical library and information science, 2020, 29(9): 7-12.
[2] KWON O, WEN Y.An empirical study of the factors affecting social network service use[J]. Computers in human behavior, 2010, 26(2): 254-263.
[3] 网信办. CNNIC发布第47次《中国互联网络发展状况统计报告》[EB/OL].[2021-05-02]. http://www.gov.cn/xinwen/2021-02/03/content_5584518.htm.
The 47th China statistical report on internet development[EB/OL]. [2021-05-02]. http://www.gov.cn/xinwen/2021-02/03/content_5584518.htm.
[4] 罗军舟, 吴文甲, 杨明. 移动互联网: 终端、网络与服务[J]. 计算机学报, 2011, 34(11): 2029-2051.
LUO J Z, WU W J, YANG M.Mobile internet: Terminal devices, networks and services[J]. Chinese journal of computers, 2011, 34(11): 2029-2051.
[5] BOBBY A, SHANNON B, RYAN L.Google abuses its monopoly power over search, justice department says in lawsuit[EB/OL]. [2021-05-02].https://www.npr.org/2020/10/20/925736276/google-abuses-its-monopoly-power-over-search-justice-department-says-in-lawsuit.
[6] Bundeskartellamt. Competition law and data[EB/OL]. [2020-05-02]. http://bundeskartellamt.de/SharedDocs/Publikation/DE/Berichte/Big%20Data%20Papier.pdf?_blob=publicationFile&v=2.
[7] United States District Court, N D California Hiq Labs, Inc V Linkedin Corp (N D Cal Aug 14, 2017)[EB/OL].[2020-05-02]. https://h2o.law.harvard.edu/text_blocks/30226.
[8] Pascal Schumacher federal cartel office. Accuses Facebook of abusive data collection and use[EB/OL].[2020-05-02]. https://www.noerr.com/en/newsroom/News/federal-cartel-office-accuses-facebook-of-abusive-data-collection-and-use.
[9] 任晓宁. 多闪和腾讯因用户头像起纷争: 为了用户还是为了利益?[EB/OL]. [2021-05-02]. http://www.eeo.com.cn/2019/0320/350934.shtml.
REN X N. Dosun and Tencent at odds over user avatars: For users or for profit?[EB/OL]. [2021-05-02]. http://www.eeo.com.cn/2019/0320/350934.shtml.
[10] 刘学. 从抖音与腾讯的纠纷看互联网平台的权力边界[EB/OL]. [2021-05-02].https://www.yicai.com/news/100952639.html.
LIU X. The boundary of power of internet platforms from the dispute between Tik Tok and Tencent[EB/OL]. (2021-02-07) [2021-05-02]. https://www.yicai.com/news/100952639.html.
[11] 关于下架“滴滴企业版”等25款APP的通报[EB/OL]. [2021-07-12]. http://www.cac.gov.cn/2021-07/09/c_1627415870012872.html.
Notice on the removal of 25 apps including "Didi enterprise"[EB/OL]. [2021-07-12]. http://www.cac.gov.cn/2021-07/09/c_1627415870012872.html.
[12] 王博勋. 强化对隐私权及个人信息保护[EB/OL].[2020-04-12]. http://www.npc.gov.cn/npc/cw36/201908/70b9b2fa5b72475dada54ec33121d4bf.shtml.
WANG B X. Enhanced protection of privacy and personal information[EB/OL]. [2020-04-12]. http://www.npc.gov.cn/npc/cw36/201908/70b9b2fa5b72475dada54ec33121d4bf.shtml.
[13] ZANFIR G.The right to data portability in the context of the EU data protection reform[J]. International data privacy law, 2012: 149-162.
[14] SPYROS E P, GEORGE N P.When the mobile app is free, the product is your personal data[J]. Digital policy, regulation and governance, 2019, 21(2): 89-101.
[15] SIMON W.A framework for security technology cohesion in the era of the GDPR[J]. Computer fraud & security, 2018(12): 8-11.
[16] UNAL T, YASIR G, BRIAN N.Law versus technology: Blockchain, GDPR, and tough tradeoffs[J]. Computer law & security review: The international journal of technology law and practice, 2020, 38.
[17] 冉从敬, 张沫. 欧盟GDPR中数据可携权对中国的借鉴研究[J]. 信息资源管理学报, 2019, 9(2): 25-33, 45.
RAN C J, ZHANG M.Study on the data portability of EU GDPR and its reference for China[J]. Journal of information resources management, 2019, 9(2): 25-33, 45.
[18] 吴任力, 吴淑倩. 移动互联网环境下用户账号注销机制研究[J]. 图书情报工作, 2019, 63(23): 52-64.
WU R L, WU S Q.Research on user account cancellation mechanism under the environment of mobile internet[J]. Library and information service, 2019, 9(2): 25-33, 45.
[19] 冉从敬, 刘先瑞, 何梦婷. 欧美数据垄断的治理模式比较及对我国的借鉴研究[J]. 信息资源管理学报, 2021, 11(3): 18-29.
RAN C J, LIU X R, HE M T.Comparison of data monopoly governance models between Europe and America and its application to China[J]. Journal of information resources management, 2021, 11(3): 18-29.
[20] 朱光, 丰米宁, 陈叶, 等. 大数据环境下社交网络隐私风险的模糊评估研究[J]. 情报科学, 2016, 34(9): 94-98.
ZHU G, FENG M N, CHEN Y, et al.Research on fuzzy evaluation of privacy risk for social network in big data environment[J]. Infor-mation science, 2016, 34(9): 94-98.
[21] 程瑶, 应凌云, 焦四辈, 等. 移动社交应用的用户隐私泄露问题研究[J]. 计算机学报, 2014, 37(1): 87-100.
CHENG Y, YING L Y, JIAO S B, et al.Research on user privacy leakage in mobile social messaging applications[J]. Chinese journal of computers, 2014, 37(1): 87-100.
[22] 沈洪洲, 汤雪婷, 周莹. 我国移动社会化媒体隐私保护功能的可用性研究[J]. 图书情报工作, 2017, 61(4): 23-30.
SHEN H Z, TANG X T, ZHOU Y.Study on the usability of the privacy protection functions on the mobile social media in China[J]. Library and information service, 2017, 61(4): 23-30.
[23] GDPR[EB/OL]. [2020-07-02].https://gdpr-info.eu/issues/consent/.
[24] Document 52018DC0043[EB/OL]. [2020-07-02].https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0043.
[25] 陈一. 欧盟大数据伦理治理实践及对我国的启示[J]. 图书情报工作, 2020, 64(3): 130-138.
CHEN Y.The practice of EU big data ethics governance and its enlightenment to China[J]. Library and information service, 2020, 64(3): 130-138.
[26] Art 20 GDPR right to data portability[EB/OL]. [2020-07-02].https://gdpr-info.eu/art-20-gdpr/.
[27] H R5841-foreign investment risk review modernization act of 2018[EB/OL].[2021-05-20]. https://www.congress.gov/115/bills/hr5841/BILLS-115hr5841eh.pdf.
[28] The committee on foreign investment in the United States (cfius)[EB/OL]. [2021-05-20].https://home.treasury.gov/policy-issues/international/the-committee-on-foreign-investment-in-the-united-states-cfius.
[29] CCPA[EB/OL]. [2020-09-07].https://www.caprivacy.org/.
[30] CCPA and GDPR: Similarities and differences you must know[EB/OL]. [2020-09-07].https://trustgdpa.com/ccpa-and-gdpr-similarities-and-differences-you-must-know/.
[31] 国家法律法规数据库[EB/OL]. [2020-09-07]. http://www.npc.gov.cn/flk/flk/flkPortalManager.do?method=index.
Database of national laws and regulations[EB/OL].[2020-09-07]. http://www.npc.gov.cn/flk/flk/flkPortalManager.do?method=index.
[32] 国务院. 全国人民代表大会常务委员会关于加强网络信息保护的决定[EB/OL]. [2020-09-07]. http://www.cac.gov.cn/2012-12/29/c_133353262.htm.
Decision of the standing committee of the national people's congress on strengthening online information protection[EB/OL]. [2020-09-07].http://www.cac.gov.cn/2012-12/29/c_133353262.htm.
[33] 中华人民共和国网络安全法[EB/OL]. [2020-09-07]. http://www.gov.cn/xinwen/2016-11/07/content_5129723.htm.
Cyber Security Law of the People's Republic of China[EB/OL]. [2020-09-07]. http://www.gov.cn/xinwen/2016-11/07/content_5129
723. htm.
[34] 中华人民共和国反不正当竞争法[EB/OL]. [2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201906/t20190625_302771.html.
Anti-Unfair Competition Law of the People's Republic of China[EB/OL]. [2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201906/t20190625_302771.html.
[35] 国务院. 禁止滥用市场支配地位行为暂行规定[EB/OL].[2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201907/t20190701_303057.html.
Interim provisions forbidding abuse of dominant market position[EB/OL].[2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201907/t20190701_303057.html.
[36] 国务院. 市场监管总局就《<反垄断法>修订草案(公开征求意见稿)》公开征求意见的公告[EB/OL].[2020-09-07]. http://www.samr.gov.cn/hd/zjdc/202001/t20200102_310120.html.
Draft amendments to the Anti-Monopoly Law[EB/OL]. [2020-09-07].http://www.samr.gov.cn/hd/zjdc/202001/t20200102_310120.html.
[37] 林敏. 政府信息公开中知情权和隐私权的冲突与协调原则[J]. 图书情报工作, 2007, 51(2): 48-50, 103.
LIN M.The conflict and coordination between the right to know and the right of privacy in open government information[J]. Library and information service, 2007, 51(2): 48-50, 103.
[38] Data portability policy[EB/OL]. [2020-10-08].https://thecommandline.net/2010/06/23/data-portability-policy/.
[39] Data to go: An FTC workshop on data portability[EB/OL].[2021-01-12].https://www.ftc.gov/news-events/events-calendar/data-go-ftc-workshop-data-portability.
[40] Facebook DYI[EB/OL].[2020-10-08].https://www.facebook.com/dyi.
[41] Data transfer project: Enabling portability of photos and videos between services[EB/OL].[2020-11-02].https://engineering.fb.com/2019/12/02/security/data-transfer-project/.
[42] Solid: Your data, your choice advancing web standards to empower people[EB/OL]. [2021-06-02].https://solidproject.org/.
[43] 潘开灵, 白列湖. 管理协同机制研究[J]. 系统科学学报, 2006(1): 45-48.
PAN K L, BAI L H.Study on management synergy mechanism[J]. Chinese journal of systems science, 2006(1): 45-48.
[44] 以数字政府建设提升政府治理能力[EB/OL]. [2021-01-29]. http://www.e-gov.org.cn/article-176023.html.
Building a digital government will enhance government governance capacity[EB/OL].[2021-01-29]. http://www.e-gov.org.cn/article-176023.html.
[45] 周昊冉. 我国用户数据获取行为法律规制问题研究[D]. 上海: 华东政法大学, 2019: 6-37.
ZHOU H R.Research on legal regulation of user data acquisition behavior in China[D]. Shanghai: East China university of political science and law, 2019: 6-37.
[46] 何晓斌, 李政毅, 卢春天. 大数据技术下的基层社会治理: 路径, 问题和思考[J]. 西安交通大学学报(社会科学版), 2020, 40(1): 97-105.
HE X B, LI Z Y, LU C T.Big-data based technological social governance at the grassroots level: Path exploration and problem[J]. Journal of Xi'an Jiaotong university (social sciences), 2020, 40(1): 97-105.
[47] 陈定权. 信息检索系统中的用户相关反馈机制[J]. 现代图书情报技术, 2002(4): 33-35.
CHEN D Q.User relevance feedback for information retrieval system[J]. New technology of library and information service, 2002(4): 33-35.
[48] 王小龙. 信息安全遵从行为的正式控制机制研究[D]. 大连: 大连理工大学, 2016: 30-73.
WANG X L.A study of the formal organizational control mecha-nisms for information security compliance behaviors[D]. Dalian: Dalian university of technology, 2016: 30-73.
[49] 郭雅婷. 基于大数据分析的用户画像研究与应用[D]. 长沙: 湖南大学, 2019: 5-16.
GUO Y T.The persona based on big data analysis research and application[D]. Changsha: Hunan university, 2019: 5-16.
[50] 万方. 大数据背景下个人信息保护的新路径——被遗忘权的更新兼论信息技术革新[J]. 图书情报知识, 2016(6): 107-113.
WAN F.New path of personal data protection under big data - The renewal of the right to be forgotten and the innovation of information technology[J]. Document, information & knowledge, 2016(6): 107-113.
[1] LI Bo, LI Honglian, GUAN Qing, LIU Yang. Fine-grained Sentiment Analysis of Social Network Platform of University Libraries Based on CNN-BiLSTM-HAN Hybrid Neural Network [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 63-73.
[2] HOU Jianhua, GENG Bingbing, ZHANG Yang. Academic Origin Structure and Mobility Network of Technological Talent in Chinese Universities [J]. Journal of Library and Information Science in Agriculture, 2021, 33(6): 66-80.
[3] XU Yi, LI Jing, XU Haiyun, LI Shuying. Identification of Technology Transfer Potential Based on Patent Dynamic Characteristics [J]. Journal of Library and Information Science in Agriculture, 2021, 33(6): 107-115.
[4] LI Pei, GU Donglei, ZOU Tao, JIANG Ling, LIU Jianfeng. Exploration of Potential Reading Interest Groups in Social Sciences of Undergraduates Based on Social Network Analysis: A Case Study of China Pharmaceutical University [J]. Journal of Library and Information Science in Agriculture, 2021, 33(3): 78-89.
[5] CHEN Yunwei. Review on Quantitative Methods of Science and Technology Evaluation [J]. Journal of Library and Information Science in Agriculture, 2020, 32(8): 4-11.
[6] GUAN Cuizhong, FAN Aihong, ZHAO Chenggang. Social Network Analysis of Research Collaborations between Departments—— Taking Tsinghua University as an Example [J]. Journal of Library and Information Science in Agriculture, 2020, 32(4): 42-50.
[7] CHANG Ruru, ZHAO Rongying, JIA Zengshuai, ZHANG Zhaoyang. The Characteristics and Impact of International Artificial Intelligence (AI) Patent Cooperation [J]. Journal of Library and Information Science in Agriculture, 2020, 32(2): 58-70.
[8] LI Feifan. Research on the Universities Scientific Cooperation Network and Evolution: Taking 211 and Co-construction of Provincial and Subordinate universities of Beijing, Tianjin and Hebei region as an Example [J]. Agricultural Library and Information, 2019, 31(8): 31-39.
[9] ZHAO Jianping, ZHOU Lixia. Discussion on the Logical Framework of Government Data Open Mechanism Based on Three-Dimensional Perspective [J]. Agricultural Library and Information, 2019, 31(5): 61-67.
[10] REN Xiaohui. Research on Information Behavior of Mobile Library Users in Colleges and Universities under Social Network [J]. Agricultural Library and Information, 2019, 31(5): 68-74.
[11] MA Jie, ZHANG Guangyuan, GE Yan. Research social network information ecosystem structure and evolution model [J]. , 2018, 30(8): 5-7.
[12] LI Shanshan. Cooperative Research on Intellectual Property Rights Based on Patent Data under Collaborative Innovation Environment [J]. , 2018, 30(6): 78-83.
[13] LIU Huiliang. Research on the Co-authorship Network of Domestic Personalized Knowledge Service Based on SNA [J]. , 2018, 30(5): 165-169.
[14] ZHANG Chuanzhen, WANG Huanjing. Research on Domestic Information Resource Management Based on Co-word Cluster Analysis [J]. , 2018, 30(3): 48-52.
[15] YU Dengke, ZHOU Rong. The Contextual Features of Rural Social Networks and Farmer to Farmer Knowledge Sharing Mechanism within the Contexts [J]. , 2018, 30(2): 43-50.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!