期刊文献+

网络环境下的个人信息保护立法 被引量:83

下载PDF
导出
摘要 个人信息关系到人格尊严及人格自由发展,对个人信息进行保护是个人信息自决权的必然要求。由此,个人信息保护立法成为全球最为瞩目的立法运动之一,中国也不例外,数年前即开始酝酿个人信息保护立法。为此,有必要广泛参考国外的经验特别是欧盟的模式;以民法典和单行法的二元立法模式来对个人信息进行保护。为了保证立法的实效,必须针对信息和网络技术发展为个人信息所带来的挑战,提出有效的原则和措施。就此而言,中国的行政机关已开始进行探索和尝试,其中所包含的成就和不足,对未来的个人信息保护法来说都是十分有益的参考。
作者 石佳友
出处 《苏州大学学报(哲学社会科学版)》 CSSCI 北大核心 2012年第6期85-96,共12页 Journal of Soochow University(Philosophy & Social Science Edition)
基金 国家社会科学基金一般项目"民法典的精神"(项目编号:08BFX022)的阶段性成果
  • 相关文献

参考文献21

  • 1Graham Greenleaf. Global data privacy laws: 89 countries, and accelerating[ J ]. Privacy Laws & Business International Report, 2012, ( 115 ). 被引量:1
  • 2Graham Pearce & Nicholas Plattern. Orchestrating Translantie Approches to Personal Data Protection: A European Perspective[ J ]. Fordham International Law Journal, 1998, ( 22 ). 被引量:1
  • 3Ryan Moshell. And Then There Was One: The Outlook for a Self-Regulatory United States Amidst a Global Trend l'oward Comprehensive Data Protection[ J ]. Texas Tech Law Review, 2005, ( 37 ). 被引量:1
  • 4Sunni Yuen. Exporting trust with data: audited self-regulation as solution to cross-border data transfer protection :oneerns in the offshore outsourcing industry[ J ].The Columbia Science and Technology Law Review, 2008, ( 9 ). 被引量:1
  • 5James Q. Whitman. The Two Western Cultures of Privacy: Dignity versus Liberty[ J ]. The Yale Law Journal, 2004, ( 4 ). 被引量:1
  • 6Omer Tene & Yucel Saygin. Privacy and Data Protection in Turkey : ( Inching ) Towards a European Framework [ J ]. Privacy & Security Law Report, 1467, 2011, ( 10 ). 被引量:1
  • 7Hfiseyin Can Aksoy. The Right to Personality and Its Different Manifestations as the Core of Personal Data[ J ]. Ankara Law Review, 2008, ( 5 ). 被引量:1
  • 8Luiz Costa. A Brief Analysis of Data Protection Law in Brazil [ Z ]. 28th Plenary meeting of the Consuhative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data [ETS No. 108 ] ( T-PD ), Council of Europe, June, 2012, ( 9 ). 被引量:1
  • 9Louise Story. To Aim Ads, Web Is Keeping Closer Eye on You[ N ]. The New York Times, 2008-03-10( 9 ). 被引量:1
  • 10Edwin Jacobs. SWIFT Privacy : Data Processor Becomes Data Controller [ J ]. Journal of Internet Banking and Commerce, 2007, ( 12 ). 被引量:1

二级参考文献13

  • 1Parakh A, Kak S. Space efficient secret sharing for implicit data security [J]. Information Sciences, 2011, 181(2): 335 - 341. 被引量:1
  • 2Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures [C]// Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, China: IEEE Computer Society, 2009:711-716. 被引量:1
  • 3Roy I, Ramadan H, Setty S, et al. Airavat: Security and privacy for map reduce [C]// Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose, USA: USENIX Association Berkeley, 2010: 297 -312. 被引量:1
  • 4Mowbray M, Pearson S. A client based privacy manager for cloud computing [C]// Proceedings of the 4th International ICST Conference on Communication Syslem Software and Middleware. New York, USA: Association for Computing Machinery, 2009. 被引量:1
  • 5Muntes -Mulero V, Nin J. Privacy and anonymization for very large datasets [C]// Proceedings of the ACM 18th International Conference on Information and Knowledge Management. New York, USA: Association for Computing, 2009, 2117-2118. 被引量:1
  • 6Creese S, Hopkins P, Pearson S, et al. Data protection aware design for cloud services [C]// Proceedings of the 1st International Conferenee on Cloud Computing. Lecture Notes in Computer Science. Beijing, China: Springer, 2009:119 - 130. 被引量:1
  • 7Ghemawat S, Gobioff H, Leung S. The Google file system [C]// Proceedings of the 9th ACM Symposium on Operating Systems Principles. New York, USA: Association for Computing Machinery, 2003. 被引量:1
  • 8Armbrust M, Fox A, Griffith R, et al. Above the clouds: A berkeley view of cloud computing. Technical Report No. UCB/EECS-2009-28 [R]. Berkeley, USA: University of California at Berkeley, 2009. 被引量:1
  • 9Wang L, TaoJ, Kunze M, et al. Scientific cloud computing: Early definition and experience [C]//Proceedings of the 10th International Conference on High Performance Computing and Communications. Dalian, China: IEEE Computcr Society, 2008: 825-830. 被引量:1
  • 10Kaufman L. Data security in the world of cloud computing [J]. IEEE Security and Privacy, 2009, 7(4): 61- 64. 被引量:1

共引文献46

同被引文献655

引证文献83

二级引证文献808

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部