首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
个人信用信息是能够反映特定个人的信用状况的各种信息资料的总和,在性质上属于个人隐私的范畴.在个人信用信息隐私的立法保护上,主要存在欧盟的统一立法和美国的分散立法两种立法模式.我国个人信用信息隐私保护立法应当立足于我国的实际并借鉴欧盟和美国立法中的合理之处,确立统一立法与行业立法并举的折中模式.通过统一立法确立个人信用信息隐私保护的基本原则和最低标准,并在此基础之上进一步完善个人信用信息隐私保护的行业立法,以健全我国个人信用信息隐私保护的法律体系.  相似文献   

2.
网络环境下的隐私与隐私保护   总被引:3,自引:0,他引:3  
刘一兵 《情报科学》2003,21(6):605-608
网络隐私问题已经引起学术界的广泛关注,本文首先分析了网络隐私产生的四种渠道和侵害网络隐私的四种可能方式,然后研究了网络隐私保护的行业自律措施和立法保护措施,最后就我国的网络隐私保护问题给出了建设性的意见。  相似文献   

3.
从读者隐私的界定、馆员在读者隐私权保护中的职责、违反隐私保护制度的责任追究三个方面,对图书馆读者隐私权保护制度的建立进行了论述,最后提出必须从行业自律和立法两方面下手,才能真正使读者隐私权得到有效保护.  相似文献   

4.
大数据挖掘为经济和社会问题研究提供了崭新方法,但对隐私权在内的个人基本权利的潜在侵犯风险不容忽视。归纳大数据挖掘所面临的隐私风险问题,探讨隐私保护数据分析的流程及策略,从数据格式、知识产权、服务条款、社交网络等方面指出网络环境下隐私保护的技术趋势,并就立法完善提出建议。  相似文献   

5.
李力 《现代情报》2005,25(11):24-26
文章分析了网络信息隐私问题突出的原因,论述了保护网络信息隐私的意义,重点介绍并分析了国外典型的一些网络信息隐私保护法的情况,最后阐述了其对我国立法工作的启示。  相似文献   

6.
[目的/意义]从国家安全观视角,不仅能考察美国数据隐私保护框架的顶层设计,也能充分、全面、立体地揭示出美国数据隐私保护制度的整体趋势与优劣,为我国跨境数字贸易流通有效安全政策的制定提供理论依据。[方法/过程]运用文献研究与内容分析法,对美国新型国家安全观的基本构成与特点、数据隐私立法演化历程及其数据隐私框架进行了分析。[结果/结论]美国新型国家安全观下的数据隐私保护以数字经济优先发展为前提;其数据隐私整体框架,由国内和跨境数据保护与流动规则两个部分组成;美国数据隐私保护统一立法、跨境数据流动监管与治理现代化立法成为趋势;美国主导的同盟国跨境数据流动圈的形成,成为逆全球化的数据贸易壁垒;构建“共同价值观下的网络空间命运共同体”成为中国的必然选择。  相似文献   

7.
王晓 《今日科苑》2009,(20):191-191
个人信息的保护从最初的隐私、尊严和自由的人格权要求到现在流行的财富积累保障的要求,很好地体现人权和社会经济发展的过程,从而影响到人们对这些发展的保障要求。本文阐述了我国个人信息保护法的现状,并进一步提出个人信息立法的社会发展要求。  相似文献   

8.
谈咏梅  钱小平 《现代情报》2006,26(1):215-217
在没有隐私立法的情况下,我国网站隐私权保护政策的制约功能不能发挥,告之功能流于形式,为克服这些缺陷。可以利用该政策的契约性质,对网站的隐私权保护政策加以完善。  相似文献   

9.
孙继周 《现代情报》2016,36(6):140-143
针对"大数据"背景下,我国数据隐私法律缺失的现状,本文以日本数据隐私法律为研究对象,介绍了日本目前2部数据隐私保护适用法律——《个人信息保护法案》和《"通用号码"法案》,从数据操作规定、数据服务规定、执行处罚规定3个方面,对日本数据隐私法律内容进行研究分析,并得出制定数据隐私专门法,鼓励多方机构参与,建立行业部门规范标准,建立数据隐私保护倒逼机制4个方面的启示,以期为我国数据隐私立法提供借鉴参考。  相似文献   

10.
美国和欧盟的数据隐私保护策略   总被引:2,自引:0,他引:2  
孙美丽 《情报科学》2004,22(10):1265-1267
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。  相似文献   

11.
李雪  许晓东 《现代情报》2015,35(6):166-171
随着信息社会化不断深入,网络隐私的侵犯与保护问题成为人们探讨的焦点。本文以SSCI收录的网络隐私问题研究型论文为研究对象,采用文献计量法从文献来源情况、被引情况、关键词等角度分析了目前网络隐私问题国际研究特点;并采用内容分析法对文章内容进行分析,总结出目前该领域的4个热点研究主题:隐私概念争议与发展、隐私关注量表体系、网络隐私观形成前因和社交平台中的隐私问题。以期引起国内学界的注意,为我国学者深入研究网络隐私问题提供参考。  相似文献   

12.
[目的/意义]旨在探析隐私计算视角下在线健康社区知识转移粘滞影响因素,构建理论模型,为完善在线健康社区健康信息隐私安全保护机制、交互性服务建设与运营管理提出建议。[方法/过程]采用质性研究方法,借助软件NVivo12对访谈资料进行内容分析与编码,归纳影响在线健康社区知识转移粘滞的4个主要因素以及14个子因素,并构建在线健康社区知识转移粘滞影响因素模型。[结果/结论]感知风险、社会收益、情感收益和主观规范对在线健康社区知识转移粘滞都有不同程度的影响。据此,总结相关启示。  相似文献   

13.
网络隐私第三方认证机制初探   总被引:4,自引:1,他引:3  
研究表明,由于担心个人信息得不到有效的保护,人们对使用基于互联网的各种服务心存疑虑,严重影响到电子商务的发展.旨在给电子商务的发展营造宽松的发展环境,在网络隐私法律框架之外,以美国为代表的国家产生了基于市场运作的网络隐私第三方认证.为了减少网络用户担心隐私遭到侵犯的不安全感,不少网站加入网络隐私认证计划.本文介绍了网络隐私第三方认证运行机制,以及在保护个人隐私方面存在的不足之处,并提出完善第三方认证机制的策略,以期对我国的个人信息保护提供新的思路.  相似文献   

14.
In the analysis of the ethicalproblems of online research, there is much tobe learned from the work that has already beendone on research ethics in the socialsciences and the humanities. I discuss thestructure of norms in the Norwegian ethicalguidelines for research in the social scienceswith respect to their relevance for the ethicalissues of Internet research. A four-stepprocedure for the ethical evaluation ofresearch is suggested. I argue that eventhough, at one level, the problems of onlineresearch are very similar to those we find intraditional areas of social scientificresearch, there still are some issues that areunique to research online. A general model forthe analysis of privacy and data protection issuggested. This model is then used tocharacterize the special problems pertaining tothe protection of privacy in online contexts,and to argue that one cannot assume a simpledistinction between the private and the publicwhen researching in such contexts.  相似文献   

15.
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform.  相似文献   

16.
赵静 《现代情报》2014,34(3):29-31,35
个人信息网络侵权主要有个人信息的不当收集、个人信息的不当利用、个人信息的不当管理3种形式,可以通过“加强宣传教育,提高个人信息保护意识,营造尊重个人隐私的社会氛围”、“制定可操作性强的政策和法律,规范网络业者的行为”、“开展标准制定和隐私认证,实施行业自律”、“实施多方监管,提高个人信息网络侵权成本”及“积极运用技术手段,防个人信息网络侵权于未然”等多维途径进行治理。  相似文献   

17.
Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, the constitutionalright to privacy first established by Griswoldv. Connecticut finds its moral basis largelyin a single value, the value of autonomy ofdecision-making. I propose that an expandedconstitutional right to informational privacy,responsive to the escalating threats posed toonline privacy by developments in informationaltechnology, would be more likely to find asolid moral basis in the value of autonomyassociated with the constitutional right toprivacy found in Griswold than in the varietyof values forming the moral basis for the rightto privacy backed by the Fourth Amendment.  相似文献   

18.
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.  相似文献   

19.
王小燕 《预测》2012,(1):14-19
顾客担心个人隐私信息得不到有效保护是其不愿意使用网络银行的主要原因之一。研究表明,在网站上张贴隐私协议和隐私印章,能提高顾客对网络商家的信任和使用意愿。为此,本文以网络银行为研究背景,以理性行为理论为基础,探究隐私协议、隐私印章对我国网络银行顾客信任及其使用意向的影响作用,并应用结构方程方法进行实证研究。通过对198个有效调查样本的研究结果表明:隐私协议、隐私印章两者既会直接正向影响顾客对网络银行的信任和使用意向,又会通过信任这一中介变量,对顾客的使用意向产生间接正向影响。  相似文献   

20.
Toward a Typology of Internet Users and Online Privacy Concerns   总被引:2,自引:0,他引:2  
Traditional typologies of consumer privacy concern suggest that consumers fall into three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on the situation presented. This study examines online users to determine whether types of privacy concern online mirror the offline environment. An e-mail survey of online users examined perceived privacy concerns of 15 different situations involving collection and usage of personally identifiable information. Results indicate that the vast majority of online users are pragmatic when it comes to privacy. Further analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern. Distinct demographic differences were seen. Persons with higher levels of education are more concerned about their privacy online than persons with less education. Additionally, persons over the age of 45 years tended to be either not at all concerned about privacy or highly concerned about privacy. Younger persons tended to be more pragmatic. Content and policy implications are provided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号