首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 187 毫秒
1.
政府信息公开可以确保公民知情权的不断满足,但同时公民隐私权被侵害的可能性也随之加大,两者间的冲突成为一个不可回避的问题.通过对政府信息公开中隐私权与知情权的内涵、保护制度,两者冲突的探讨,指出平衡两者利益,协调两者冲突的途径与方法.  相似文献   

2.
美国《隐私权法》与公民个人信息保护   总被引:9,自引:1,他引:9  
周健 《情报科学》2001,19(6):608-611
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。  相似文献   

3.
个人数据是用来直接或间接识别自然人情况的数据资料,个人数据构成个人隐私的重要内容。政府机关必须通过法定程序与方式收集涉及个人隐私的信息,并注意保护当事人的隐私权利。我国应借鉴美国的立法保护模式,既要制定《政府信息公开法》,又要制定《隐私权法》。  相似文献   

4.
电子政务信息资源共享与个人信息隐私权的保护   总被引:1,自引:0,他引:1  
何振  贺佐成 《情报杂志》2005,24(3):2-4,7
电子政务信息资源共享给人们带来便利的同时 ,也使得电子政务信息资源库中个人信息隐私面临被侵犯的可能 ,对此 ,应当从提高公民个人信息隐私权意识 ,提高电子政务信息管理者道德 ,以及加强电子政务信息资源系统的管理方面来保护电子政务信息系统中的个人信息隐私权。  相似文献   

5.
吕璐 《情报探索》2014,(12):22-25
从政府信息公开的视角探析隐私权的涵义、特征、内容及其与知情权的关系。认为政府信息公开中对隐私权管理具有行政性、公权和私权冲突交叉、需要多种法律协调等特点。从知政权与隐私权、社会信息知情权与隐私权、隐私权保护的统一与均衡、法定知情权与隐私权等4个方面,探讨如何平衡知情权与隐私权的关系,提出应根据社会政治及公共利益、利益衡量、宽容协调、人格尊严等4项原则来协调,以实现二者的和谐。  相似文献   

6.
祝阳  李欣恬 《情报杂志》2021,(1):165-170
[目的/意义]大数据时代将人类社会带入了数据利用的黄金时代,与此相伴的个人隐私安全问题,成为数据价值开发及政府数据开放的瓶颈。文章旨在解决大数据时代的个人数据隐私安全问题,充分保障公民隐私权。[方法/过程]在已有研究基础上,梳理大数据发展对个人隐私的挑战并分析产生影响的原因;按个人信息敏感程度与数据生命周期两个维度,构建大数据时代个人数据隐私安全保护的分析框架;从技术、政府、信息业者、公民四个方面,分析各环节应当采取的针对性保护措施。[结果/结论]不同类型的个人数据的信息敏感度及信息价值不同,在数据生命周期的各个阶段,需要采取差异化的保护策略。  相似文献   

7.
Web2.0时代网络信息资源管理隐私权保护已严重影响用户对网站的安全度和信任度。网络信息资源管理中的隐私权侵权行为主要有:对网络用户个人信息使用不当,个人活动隐私的侵犯,个人网络痕迹隐私的侵犯以及个人网络空间隐私权的侵犯;网络信息资源管理中的隐私权保护对策主要有:完善网络隐私权保护的立法,加强网络信息产业的行业自律,提高网络用户的自我保护意识,最大限度地利用信息安全技术、成立网络隐私权保护的专门机构以及融入国际网络隐私权保护体系等。  相似文献   

8.
张淑苹  李玉国 《黑龙江科技信息》2013,(6):131+188-131,188
隐私权是公民的基本权利,信息经济时代,互联网技术的迅速推广,信息传播的便捷性和快速性,使公民隐私权的内涵和外延得到进一步扩展,网络隐私权应运而生,在信息时代新的形势下,从法律层面保护公民隐私权尤其是网络隐私权成为人们日益关注和亟待解决的问题。  相似文献   

9.
本文提出了图书馆可以应用隐私保护技术来解决信息服务中无法回避的读者隐私权问题,概述了一些常用的隐私保护技术,并初步探索了隐私保护技术在数字图书馆领域的一些实际应用。  相似文献   

10.
说说隐私权     
隐私权,又可称之为生活秘密权。即公民个人生活不受非法干扰的权利。具体包括静居、独处、一己之私不为外人道等内容。隐私与隐私权的保护一说源于英美,但我国古之所谓阴私,实际上也是指这个意思。而对于阴私的保护,发端于前清。如前清修正报律第十一条规定,“损害他  相似文献   

11.
连志英 《情报科学》2012,(4):628-632
从公民获取政府电子信息权利保障视角对我国《政府信息公开条例》进行审视,指出我国《政府信息公开条例》未能明确赋予公民享有获取政府电子信息权利,对申请者申请获取政府信息的目的进行限定,并且在立法价值取向及公民可获取的政府电子信息范围界定方向均存有缺陷,针对这些缺陷提出相应的几点建议以完善我国《政府信息公开条例》,确实保障公民获取政府电子信息权利。  相似文献   

12.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

13.
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are examined through different perceptions of privacy in the digital age. The findings of this study suggest that users possess certain amount of freedoms on WeChat. However, users’ individual privacy attitudes and behaviour in practice suggest they have a declined sense of their own freedom and right to privacy. A privacy paradox exists when users, while holding a high level of concerns, in reality do little to further the protection of their personal information on WeChat. We argue that once a user has ingrained part of their social engagement within the WeChat system, the incentive for them to remain a part of the system outweighs their requirement to secure their privacy online as their decision-making is largely based on a simple cost-benefit analysis. The power and social capital yielded via WeChat is too valuable to give up as WeChat is widely used not only for private conversations, but also for study or work-related purposes. It further blurs the boundaries between the public, the professional and the private, which is a rather unique case compared with other social media around the world.  相似文献   

14.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

15.
本文论述了Google如何收集用户信息,黑客如何通过高级操作符获取用户的敏感信息并通过Google搜索服务器漏洞信息进行攻击,为用户正确使用Google进行了警示。文章最后提出了通过提高用户防范意识,个人隐私技术手段保护,服务器保护,和政策法规保护等方面来防范Google黑客对用户信息的侵犯。  相似文献   

16.
It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.  相似文献   

17.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号