首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

2.
如何把握数据驱动创新与个人信息保护之间的平衡,深刻影响一国数字经济发展的未来,尤其在医疗数据等敏感个人数据领域。日本在医疗数据规制领域建立"基本法+专门法"双层法律体系,并在操作层面创设"匿名加工+认定"制度,以平衡医疗大数据开发与个人信息保护之间的关系,形成独树一格的日本式规制模式。针对我国在个人信息保护和数据开发利用2个方面立法滞后、制度不健全的现状,建议:(1)加快推进数据保护体系构建,弥补"保护缺位";(2)系统思考数据保护与运用的平衡关系,探索实效性发展举措,弥补"发展缺位";(3)借鉴日本经验做法,为推进医疗数据开发利用,完善相关配套制度。  相似文献   

3.
崔东宝  陈玉  王玉飞 《科教文汇》2014,(5):217-217,224
构建社会主义法治中国是现在履行依法治国的关键工作所在,目前构建法治中国主要是在一定的法律伦理的基础上展开,法律伦理虽然与现在的法治中国中的法治精神存在着一定的碰撞,但是法律伦理在构建法治中国方面还是具有十分重要的现实意义。法治中国是社会主义依法治国精神的关键所在,是国家迈向现代化依法治国的必然要求。构建社会主义现代化法治中国必须以法律伦理作为基础,不断将现代化中国的新生元素融入到其中,实行法治中国的有效构建。本文首先将对法律伦理进行总体的改善,然后分析法律伦理在构建法治中国中的现实意义。  相似文献   

4.
Learning semantic representations of documents is essential for various downstream applications, including text classification and information retrieval. Entities, as important sources of information, have been playing a crucial role in assisting latent representations of documents. In this work, we hypothesize that entities are not monolithic concepts; instead they have multiple aspects, and different documents may be discussing different aspects of a given entity. Given that, we argue that from an entity-centric point of view, a document related to multiple entities shall be (a) represented differently for different entities (multiple entity-centric representations), and (b) each entity-centric representation should reflect the specific aspects of the entity discussed in the document.In this work, we devise the following research questions: (1) Can we confirm that entities have multiple aspects, with different aspects reflected in different documents, (2) can we learn a representation of entity aspects from a collection of documents, and a representation of document based on the multiple entities and their aspects as reflected in the documents, (3) does this novel representation improves algorithm performance in downstream applications, and (4) what is a reasonable number of aspects per entity? To answer these questions we model each entity using multiple aspects (entity facets1), where each entity facet is represented as a mixture of latent topics. Then, given a document associated with multiple entities, we assume multiple entity-centric representations, where each entity-centric representation is a mixture of entity facets for each entity. Finally, a novel graphical model, the Entity Facet Topic Model (EFTM), is proposed in order to learn entity-centric document representations, entity facets, and latent topics.Through experimentation we confirm that (1) entities are multi-faceted concepts which we can model and learn, (2) a multi-faceted entity-centric modeling of documents can lead to effective representations, which (3) can have an impact in downstream application, and (4) considering a small number of facets is effective enough. In particular, we visualize entity facets within a set of documents, and demonstrate that indeed different sets of documents reflect different facets of entities. Further, we demonstrate that the proposed entity facet topic model generates better document representations in terms of perplexity, compared to state-of-the-art document representation methods. Moreover, we show that the proposed model outperforms baseline methods in the application of multi-label classification. Finally, we study the impact of EFTM’s parameters and find that a small number of facets better captures entity specific topics, which confirms the intuition that on average an entity has a small number of facets reflected in documents.  相似文献   

5.
谷镇 《情报科学》2021,39(12):93-97
【目的/意义】通过对个人信息的泄露给公民造成的损失和伤害的分析,能够帮助民众认识个人信息的重要 性,了解个人信息泄露的途径及其原因,加强个人信息安全的防护意识。【过程/方法】本文界定了个人信息与个人 隐私,进而从个人信息的产生、收集以及利用过程中个人隐私泄露造成的危害出发,进一步研究大数据背景下个人 信息和个人隐私的保护措施。【结果/结论】从各国对个人信息安全和隐私保护的法律、法规的现状中梳理出关于我 国个人信息保护的特征与信息存在的突出问题,为了使国家尽快出台“个人信息保护法”“个人隐私保护法”法律制 度提出自己的观点和建议。【创新/局限】本文只是从理论层面分析了个人信息及个人隐私的保护问题,再接下来的 研究中将深入技术研究。  相似文献   

6.
金泓序  何畏 《情报科学》2022,40(6):132-140
【目的/意义】大数据技术的广泛应用为个人信息的保护提出新的挑战,既有的个人信息法律保护模式亟待 完善,研究个人信息保护的存在的问题及影响因素能有利于提出完善个人信息保护相应的对策。【方法/过程】基于 大数据时代背景下我国个人信息保护的状况,找出目前我国个人信息保护存在的问题,并深入发掘个人信息保护 的影响因素,针对各影响因素提出相应的对策。【结果/结论】通过分析研究提出加大个人信息保护的投入,明确个 人信息与个人隐私界分,完善可识别化要素,重塑知情同意原则等,从多途径、多维度完善个人信息保护。【创新/局 限】本文是对我国大数据时代个人信息保护问题的影响因素和对策的宏观研究,在微观层面还有待进一步深层 剖析。  相似文献   

7.
大数据时代个人信息保护的理论困境与保护路径研究   总被引:1,自引:0,他引:1  
姜盼盼 《现代情报》2019,39(6):149-155
[目的/意义]通过对大数据时代个人信息保护的既有研究成果进行梳理和分析,个人信息保护的基础理论与保护路径还有探讨的空间。[方法/过程]从理论困境入手,主要分析个人信息与数据、隐私的概念界分以及个人信息的法律属性辨析;从保护路径入手,主要分析个人信息保护立法、个人信息保护技术、行政监管、行业自律以及自我保护意识。[结果/结论]在理论层面,个人信息的概念,应从闭合的"可识别性"到开放的"伤害风险"把握;个人信息的法律属性,应从单一的私有化到复合的两面性理解。在保护路径层面,个人信息保护的立法趋势,应实现由"碎片化"到"体系化"、"宏观思维"到"微观思维"的转变;个人信息保护的技术着力点,应基于"资金、手段、规范"三位一体的具体展开;个人信息保护的行政监管,应变革"政府参与"模式;个人信息保护中行业自律理念,应实现由原则性的指导到具体性的实践;个人信息自我保护意识,应拓宽"事前保护"+"事后保护"的认知视野。  相似文献   

8.
梅傲  苏建维 《情报杂志》2021,(2):154-160,122
[目的/意义]“知情同意”模式一直是数据处理重要的合法性基础,但其在适用过程中也存在现实困境。我国《数据安全法》和《个人信息保护法》尚在持续完善之中,我国要深度参与全球数据治理,就需要关注“知情同意”的有关问题。[方法/过程]以谷歌公司因涉嫌违反欧盟《一般数据保护条例》而被法国国家信息与自由委员会开出巨额罚单一案为考察中心,从算法的特征、个人数据的多样性以及数据主体与数据控制者间的关系三个角度揭示“知情同意”模式存在的问题,从案件焦点回归现实困境,寻求改良现有“知情同意”模式的方法。[结果/结论]一方面要强化数据控制者的责任与义务,从外部监管、内部优化以及事后救济三个维度补充“知情同意”模式的效力,另一方面要引入“动态同意”模式,稳固“知情同意”模式的法律基础。  相似文献   

9.
Information ethics: On the philosophical foundation of computer ethics   总被引:9,自引:5,他引:4  
The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of “environmental” ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical question asked by IE. The answer is provided by a minimalist theory of deseerts: IE argues that there is something more elementary and fundamental than life and pain, namely being, understood as information, and entropy, and that any information entity is to be recognised as the centre of a minimal moral claim, which deserves recognition and should help to regulate the implementation of any information process involving it. IE can provide a valuable perspective from which to approach, with insight and adequate discernment, not only moral problems in CE, but also the whole range of conceptual and moral phenomena that form the ethical discourse.  相似文献   

10.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

11.
Censorship exists wherever there is preselection of information made available to a particular group of potential users-that is, wherever there is an information intermediary between the information source and the user. Therefore, one cannot ask whether or not there should be censorship. Nor is it realistic to declare that freedom of expression should override censorship. A more useful approach is to ask what checks and balances should be in place to ensure freedom of expression and other basic information rights in the face of the necessity and reality of the information selection process. Two forms of legal intervention have been used to create our current regime. This article first examines delegation of the censoring/selecting power to particular intermediaries in the information cycle. Historically, power to select appropriate information for dissemination was delegated to the 'censors,' and examples of this approach continue in our law in such areas as access and copyright legislation and in unlegislated areas of the law such as confidential information. Second, the paper examines situations where the law regulates the censoring activity itself. In situations such as libel and obscenity, for example, our law preempts the intermediary by dictating the decision itself. The law, however, does not necessarily mirror actual decisions being made by information intermediaries. Empirical evidence suggests that selection/censorship decisions, which the current law might have been expected to affect, may be being made by other intermediaries and on other criteria than theoretical examination of the law would lead one to expect. These 'extralegal' forms of censorship can be very effective, but are we content to leave those decisions without legal control? The article concludes that more strategic empirical analysis of our current legal attempts to create effective checks and balances on the censoring decisions made by intermediaries will assist us in further law reform attempts.  相似文献   

12.
我国传统法学教学方法的弊端是显而易见的。法学是应用性学科,注重法律思维、法律语言、法律伦理、法学知识、法律信仰及实务能力的养成。法学教育是法律职业教育,没有法律职业教育便没有法律职业,法学教育培养和提升了法律职业素养,法律职业决定着法律教育的发展方向。法学教育培养目标和模式要求与之相适应的教学手段或方法,案例教学法在上述法律能力或构成要素的养成中有不可替代的作用。  相似文献   

13.
闫霏 《情报科学》2012,(3):450-454,475
专门的政府信息公开法可确保政府信息公开工作的顺利开展,但更需要与其他相关法律的良好配合以共同界定、处理政府信息公开过程中可能遇到的问题。在我国,目前与政府信息公开联系比较紧密的相关法律主要有《保密法》,《档案法》以及其他一些涉及到隐私方面的法律法规,本文将分析我国政府信息公开相关法律之间的兼容性,同时与美国、英国、澳大利亚、日、韩、新加坡等国的政府信息公开现状作比较分析,以对完善我国政府信息公开活动做进一步的参考。  相似文献   

14.
基于信息立法视角的政府信息公开制度研究   总被引:2,自引:0,他引:2  
我国正在起草制定政府信息公开条例和法律制度。许多国家和地区、国际机构和组织都以各种法律形式将信息公开制度法律化,并赋予公民以法定的获取信息的权利。本文在探讨世界信息公开立法现状和发展趋势基础上,总结了信息公开制度的基本要素,并在借鉴国外司法经验基础上对我国信息公开立法提出建议。  相似文献   

15.
Legal English is very important for the study and the usage of law, combing personal study and usage of law, I summarize the teaching method of legal English to help those who want to study and use Legal English to make some progress.  相似文献   

16.
胡发富 《科教文汇》2007,(9X):106-106
Legal English is very important for the study and the usage of law, combing personal study and usage of law, I summarize the teaching method of legal English to help those who want to study and use Legal English to make some progress.  相似文献   

17.
现行〈审查指南〉规定,本国申请人为单位时,需具备法人地位,否则不能申请专利。这就将一些依法成立并能对外承担责任且在民事诉讼中拥有诉权的非法人组织排除在专利法的保护范围之外,不利於鼓励发明创造和成果转化。本文对此作出了分析,并就《审查指南》的修改提出了建议。[编者按]  相似文献   

18.
孙瑞英  李杰茹 《情报科学》2021,39(11):157-166
【 目的/意义】个人信息保护政策作为公民个人信息保护的法律保障依据,具有重要的研究价值,将词频分 析、社会网络分析法、内容分析法用于政策解读与分析,推动我国个人信息保护工作的进一步开展。【方法/过程】本 文以《中华人民共和国个人信息保护法(二审稿草案)》(2021年4月29日发布)的政策文本为研究对象,运用词频分 析、社会网络分析法、内容分析的方法,对该法律草案文本进行研究,从而达到以更多视角挖掘分析法律政策条款 内涵的目的,以法律文本的分析为依据完成对我国个人信息推进现状的描述。【结果/结论】通过定量与定性相结合 的研究方法,解读《中华人民共和国个人信息保护法(二审稿草案)》,归纳并揭示法律文本中所蕴含的个人信息保 护工作的运行机理,明确我国个人信息保护立法的进程。【创新/局限】综合运用词频分析、社会网络分析法及内容分 析法解读《中华人民共和国个人信息保护法(二审稿草案)》的内容。但本文只针对我国个人信息保护的现状进行 了分析,并未涉及策略、改进方法等更进一步的讨论。  相似文献   

19.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

20.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号