Journal of Library and Information Science in Agriculture ›› 2022, Vol. 34 ›› Issue (5): 76-91.doi: 10.13998/j.cnki.issn1002-1248.21-0622
Previous Articles Next Articles
YUAN Fan
CLC Number:
[1] 冯占英, 张玉, 段美珍, 等. 大数据环境下个人信息泄露路径及其保护策略研究[J]. 中华医学图书情报杂志, 2020, 29(9): 7-12. FENG Z Y, ZHANG Y, DUAN M Z, et al.Divulging paths and protecting strategies of personal information in big data environment[J]. Chinese journal of medical library and information science, 2020, 29(9): 7-12. [2] KWON O, WEN Y.An empirical study of the factors affecting social network service use[J]. Computers in human behavior, 2010, 26(2): 254-263. [3] 网信办. CNNIC发布第47次《中国互联网络发展状况统计报告》[EB/OL].[2021-05-02]. http://www.gov.cn/xinwen/2021-02/03/content_5584518.htm. The 47th China statistical report on internet development[EB/OL]. [2021-05-02]. http://www.gov.cn/xinwen/2021-02/03/content_5584518.htm. [4] 罗军舟, 吴文甲, 杨明. 移动互联网: 终端、网络与服务[J]. 计算机学报, 2011, 34(11): 2029-2051. LUO J Z, WU W J, YANG M.Mobile internet: Terminal devices, networks and services[J]. Chinese journal of computers, 2011, 34(11): 2029-2051. [5] BOBBY A, SHANNON B, RYAN L.Google abuses its monopoly power over search, justice department says in lawsuit[EB/OL]. [2021-05-02].https://www.npr.org/2020/10/20/925736276/google-abuses-its-monopoly-power-over-search-justice-department-says-in-lawsuit. [6] Bundeskartellamt. Competition law and data[EB/OL]. [2020-05-02]. http://bundeskartellamt.de/SharedDocs/Publikation/DE/Berichte/Big%20Data%20Papier.pdf?_blob=publicationFile&v=2. [7] United States District Court, N D California Hiq Labs, Inc V Linkedin Corp (N D Cal Aug 14, 2017)[EB/OL].[2020-05-02]. https://h2o.law.harvard.edu/text_blocks/30226. [8] Pascal Schumacher federal cartel office. Accuses Facebook of abusive data collection and use[EB/OL].[2020-05-02]. https://www.noerr.com/en/newsroom/News/federal-cartel-office-accuses-facebook-of-abusive-data-collection-and-use. [9] 任晓宁. 多闪和腾讯因用户头像起纷争: 为了用户还是为了利益?[EB/OL]. [2021-05-02]. http://www.eeo.com.cn/2019/0320/350934.shtml. REN X N. Dosun and Tencent at odds over user avatars: For users or for profit?[EB/OL]. [2021-05-02]. http://www.eeo.com.cn/2019/0320/350934.shtml. [10] 刘学. 从抖音与腾讯的纠纷看互联网平台的权力边界[EB/OL]. [2021-05-02].https://www.yicai.com/news/100952639.html. LIU X. The boundary of power of internet platforms from the dispute between Tik Tok and Tencent[EB/OL]. (2021-02-07) [2021-05-02]. https://www.yicai.com/news/100952639.html. [11] 关于下架“滴滴企业版”等25款APP的通报[EB/OL]. [2021-07-12]. http://www.cac.gov.cn/2021-07/09/c_1627415870012872.html. Notice on the removal of 25 apps including "Didi enterprise"[EB/OL]. [2021-07-12]. http://www.cac.gov.cn/2021-07/09/c_1627415870012872.html. [12] 王博勋. 强化对隐私权及个人信息保护[EB/OL].[2020-04-12]. http://www.npc.gov.cn/npc/cw36/201908/70b9b2fa5b72475dada54ec33121d4bf.shtml. WANG B X. Enhanced protection of privacy and personal information[EB/OL]. [2020-04-12]. http://www.npc.gov.cn/npc/cw36/201908/70b9b2fa5b72475dada54ec33121d4bf.shtml. [13] ZANFIR G.The right to data portability in the context of the EU data protection reform[J]. International data privacy law, 2012: 149-162. [14] SPYROS E P, GEORGE N P.When the mobile app is free, the product is your personal data[J]. Digital policy, regulation and governance, 2019, 21(2): 89-101. [15] SIMON W.A framework for security technology cohesion in the era of the GDPR[J]. Computer fraud & security, 2018(12): 8-11. [16] UNAL T, YASIR G, BRIAN N.Law versus technology: Blockchain, GDPR, and tough tradeoffs[J]. Computer law & security review: The international journal of technology law and practice, 2020, 38. [17] 冉从敬, 张沫. 欧盟GDPR中数据可携权对中国的借鉴研究[J]. 信息资源管理学报, 2019, 9(2): 25-33, 45. RAN C J, ZHANG M.Study on the data portability of EU GDPR and its reference for China[J]. Journal of information resources management, 2019, 9(2): 25-33, 45. [18] 吴任力, 吴淑倩. 移动互联网环境下用户账号注销机制研究[J]. 图书情报工作, 2019, 63(23): 52-64. WU R L, WU S Q.Research on user account cancellation mechanism under the environment of mobile internet[J]. Library and information service, 2019, 9(2): 25-33, 45. [19] 冉从敬, 刘先瑞, 何梦婷. 欧美数据垄断的治理模式比较及对我国的借鉴研究[J]. 信息资源管理学报, 2021, 11(3): 18-29. RAN C J, LIU X R, HE M T.Comparison of data monopoly governance models between Europe and America and its application to China[J]. Journal of information resources management, 2021, 11(3): 18-29. [20] 朱光, 丰米宁, 陈叶, 等. 大数据环境下社交网络隐私风险的模糊评估研究[J]. 情报科学, 2016, 34(9): 94-98. ZHU G, FENG M N, CHEN Y, et al.Research on fuzzy evaluation of privacy risk for social network in big data environment[J]. Infor-mation science, 2016, 34(9): 94-98. [21] 程瑶, 应凌云, 焦四辈, 等. 移动社交应用的用户隐私泄露问题研究[J]. 计算机学报, 2014, 37(1): 87-100. CHENG Y, YING L Y, JIAO S B, et al.Research on user privacy leakage in mobile social messaging applications[J]. Chinese journal of computers, 2014, 37(1): 87-100. [22] 沈洪洲, 汤雪婷, 周莹. 我国移动社会化媒体隐私保护功能的可用性研究[J]. 图书情报工作, 2017, 61(4): 23-30. SHEN H Z, TANG X T, ZHOU Y.Study on the usability of the privacy protection functions on the mobile social media in China[J]. Library and information service, 2017, 61(4): 23-30. [23] GDPR[EB/OL]. [2020-07-02].https://gdpr-info.eu/issues/consent/. [24] Document 52018DC0043[EB/OL]. [2020-07-02].https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0043. [25] 陈一. 欧盟大数据伦理治理实践及对我国的启示[J]. 图书情报工作, 2020, 64(3): 130-138. CHEN Y.The practice of EU big data ethics governance and its enlightenment to China[J]. Library and information service, 2020, 64(3): 130-138. [26] Art 20 GDPR right to data portability[EB/OL]. [2020-07-02].https://gdpr-info.eu/art-20-gdpr/. [27] H R5841-foreign investment risk review modernization act of 2018[EB/OL].[2021-05-20]. https://www.congress.gov/115/bills/hr5841/BILLS-115hr5841eh.pdf. [28] The committee on foreign investment in the United States (cfius)[EB/OL]. [2021-05-20].https://home.treasury.gov/policy-issues/international/the-committee-on-foreign-investment-in-the-united-states-cfius. [29] CCPA[EB/OL]. [2020-09-07].https://www.caprivacy.org/. [30] CCPA and GDPR: Similarities and differences you must know[EB/OL]. [2020-09-07].https://trustgdpa.com/ccpa-and-gdpr-similarities-and-differences-you-must-know/. [31] 国家法律法规数据库[EB/OL]. [2020-09-07]. http://www.npc.gov.cn/flk/flk/flkPortalManager.do?method=index. Database of national laws and regulations[EB/OL].[2020-09-07]. http://www.npc.gov.cn/flk/flk/flkPortalManager.do?method=index. [32] 国务院. 全国人民代表大会常务委员会关于加强网络信息保护的决定[EB/OL]. [2020-09-07]. http://www.cac.gov.cn/2012-12/29/c_133353262.htm. Decision of the standing committee of the national people's congress on strengthening online information protection[EB/OL]. [2020-09-07].http://www.cac.gov.cn/2012-12/29/c_133353262.htm. [33] 中华人民共和国网络安全法[EB/OL]. [2020-09-07]. http://www.gov.cn/xinwen/2016-11/07/content_5129723.htm. Cyber Security Law of the People's Republic of China[EB/OL]. [2020-09-07]. http://www.gov.cn/xinwen/2016-11/07/content_5129 723. htm. [34] 中华人民共和国反不正当竞争法[EB/OL]. [2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201906/t20190625_302771.html. Anti-Unfair Competition Law of the People's Republic of China[EB/OL]. [2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201906/t20190625_302771.html. [35] 国务院. 禁止滥用市场支配地位行为暂行规定[EB/OL].[2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201907/t20190701_303057.html. Interim provisions forbidding abuse of dominant market position[EB/OL].[2020-09-07]. http://gkml.samr.gov.cn/nsjg/fgs/201907/t20190701_303057.html. [36] 国务院. 市场监管总局就《<反垄断法>修订草案(公开征求意见稿)》公开征求意见的公告[EB/OL].[2020-09-07]. http://www.samr.gov.cn/hd/zjdc/202001/t20200102_310120.html. Draft amendments to the Anti-Monopoly Law[EB/OL]. [2020-09-07].http://www.samr.gov.cn/hd/zjdc/202001/t20200102_310120.html. [37] 林敏. 政府信息公开中知情权和隐私权的冲突与协调原则[J]. 图书情报工作, 2007, 51(2): 48-50, 103. LIN M.The conflict and coordination between the right to know and the right of privacy in open government information[J]. Library and information service, 2007, 51(2): 48-50, 103. [38] Data portability policy[EB/OL]. [2020-10-08].https://thecommandline.net/2010/06/23/data-portability-policy/. [39] Data to go: An FTC workshop on data portability[EB/OL].[2021-01-12].https://www.ftc.gov/news-events/events-calendar/data-go-ftc-workshop-data-portability. [40] Facebook DYI[EB/OL].[2020-10-08].https://www.facebook.com/dyi. [41] Data transfer project: Enabling portability of photos and videos between services[EB/OL].[2020-11-02].https://engineering.fb.com/2019/12/02/security/data-transfer-project/. [42] Solid: Your data, your choice advancing web standards to empower people[EB/OL]. [2021-06-02].https://solidproject.org/. [43] 潘开灵, 白列湖. 管理协同机制研究[J]. 系统科学学报, 2006(1): 45-48. PAN K L, BAI L H.Study on management synergy mechanism[J]. Chinese journal of systems science, 2006(1): 45-48. [44] 以数字政府建设提升政府治理能力[EB/OL]. [2021-01-29]. http://www.e-gov.org.cn/article-176023.html. Building a digital government will enhance government governance capacity[EB/OL].[2021-01-29]. http://www.e-gov.org.cn/article-176023.html. [45] 周昊冉. 我国用户数据获取行为法律规制问题研究[D]. 上海: 华东政法大学, 2019: 6-37. ZHOU H R.Research on legal regulation of user data acquisition behavior in China[D]. Shanghai: East China university of political science and law, 2019: 6-37. [46] 何晓斌, 李政毅, 卢春天. 大数据技术下的基层社会治理: 路径, 问题和思考[J]. 西安交通大学学报(社会科学版), 2020, 40(1): 97-105. HE X B, LI Z Y, LU C T.Big-data based technological social governance at the grassroots level: Path exploration and problem[J]. Journal of Xi'an Jiaotong university (social sciences), 2020, 40(1): 97-105. [47] 陈定权. 信息检索系统中的用户相关反馈机制[J]. 现代图书情报技术, 2002(4): 33-35. CHEN D Q.User relevance feedback for information retrieval system[J]. New technology of library and information service, 2002(4): 33-35. [48] 王小龙. 信息安全遵从行为的正式控制机制研究[D]. 大连: 大连理工大学, 2016: 30-73. WANG X L.A study of the formal organizational control mecha-nisms for information security compliance behaviors[D]. Dalian: Dalian university of technology, 2016: 30-73. [49] 郭雅婷. 基于大数据分析的用户画像研究与应用[D]. 长沙: 湖南大学, 2019: 5-16. GUO Y T.The persona based on big data analysis research and application[D]. Changsha: Hunan university, 2019: 5-16. [50] 万方. 大数据背景下个人信息保护的新路径——被遗忘权的更新兼论信息技术革新[J]. 图书情报知识, 2016(6): 107-113. WAN F.New path of personal data protection under big data - The renewal of the right to be forgotten and the innovation of information technology[J]. Document, information & knowledge, 2016(6): 107-113. |
|