网络空间中的数据及其治理机制分析Analysis of Data and its Governance Mechanism in Cyberspace
鲁传颖
摘要(Abstract):
数据是网络空间中各种流动信息的载体。从治理的角度看,它同时可以被视为权力和财富的信息、具有社会和政治意义的内容和个人在线隐私。现有的治理机制很容易将这三方面的内容混淆在一起,增加了对数据治理的认知难度,影响了治理机制的构建。本文认为,构建合理的数据治理机制应当从信息、内容和隐私三个不同的视角来看待数据的属性,在不同的领域构建有针对性的治理机制,并通过这些不同治理机制之间的松散耦合关联来共同组成网络空间的数据治理机制。
关键词(KeyWords): 数据治理;隐私治理;内容治理
基金项目(Foundation):
作者(Author): 鲁传颖
DOI: 10.16602/j.gmj.20160035
参考文献(References):
- 梁辰曦、董天策(2015):试论大数据背景下“被遗忘权”的属性及其边界,《学术研究》,第9期,31-36页。
- 鲁传颖(2013):试析当前网络空间全球治理困境,《现代国际关系》,第11期,48-54页。
- 鲁传颖(2014):奥巴马政府网络空间战略面临的挑战及其调整,《现代国际关系》,第5期,54-60页。
- 罗伯特·基欧汉、约瑟夫·奈(2012):《权力与相互依赖》(门洪华译),北京:北京大学出版社。
- 齐爱民、盘佳(2015):数据权、数据主权的确立与大数据保护的基本原则,《苏州大学学报(哲学社会科学版)》,第1期,64-70页。
- 杨剑(2012):《数字边疆的权力与财富》,上海:上海人民出版社。
- (1)中央政治局第九次集体学习李彦宏讲解大数据,《大公报》,2013年10月1日,获取自http://finance.takungpao.com/tech/q/2013/1001/1940595.html
- (2)“Chris Stevens,US ambassador to Libya,killed in Benghazi attack”,September2012,The Guardian,获取自http://www.theguardian.com/world/2012/sep/12/chris-stevens-us-ambassador-libya-killed
- (3)Hillary Clinton,“Secretary Clinton's Remarks on Internet Freedom”,08December 2011,获取自http://iipdigital.usembassy.gov/st/english/texttrans/2011/12/20111209083136su0.3596874.html#axzz2eIWPYNRu
- (4)参见中俄等国向66届联大提交的《信息安全国际行为准则》,获取自http://www.fmprc.gov.cn/chn//pds/ziliao/tytj/t858317.htm
- (5)BBC,“US and UK refuse to sign UN's communications treaty”,14,December,2012,获取自http://www.bbc.co.uk/news/technology-20717774
- (6)Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,UN General Assembly Document A/68/98,June 24,2013.
- (7)Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,UN General Assembly Document A/70/174,July 22,2015.
- (8)新浪网(2014年5月16日):公民拥有“被遗忘权”谷歌等互联网巨头或增加运营成本,获取自http://finance.sina.com.cn/world/20140516/105219131299.shtml
- (9)Tim Cook,“A Message to Our Customers”,February 16 2016,Retrieved from http://www.apple.com/customer-letter/
- (10)文庚淼(2016年3月29日):FBI宣布成功破解iPhone,库克估计要有几个不眠之夜了,获取自http://business.sohu.com/20160329/n442667834.shtml
- (11)Global Conference On Cyberspace 2015 Chair'S Statement,16 April 2015,Retrieved from https://www.gccs2015.com/sites/default/files/documents/Chairs%20Statement%20GCCS2015%20-%2017%20April.pdf
- (12)Department of Justice,“Privacy Act of 1974”,Retrieved from http://www.gpo.gov/fdsys/pkg/USCODE-2012-title5/pdf/USCODE-2012-title5-partI-chap5-subc hapII-sec552a.pdf
- (13)Federal Trade Commission,“Children's Online Privacy Protection Act of 1998”,15U.S.C.6501-6505,Retrieved from http://www.ftc.gov/ogc/coppa1.htm
- (14)Raya Jalabi,“OPM hack:21 million people's personal information stolen,federal agency says”,The Guardian,July 09 2015,Retrieved from http://www.theguar dian.com/technology/2015/jul/09/opm-hack-21-million-personal-information-stolen
- (15)NBCnews(June 5,2015).Eric Baculinao And Alastair Jamieson,“OPM Data Breach:China Hits Back at U.S.Over Federal Cyberattack”,Retrieved from http://www.nbcnews.com/news/us-news/opm-data-breach-china-hits-back-u-s-over-federal-n370351