期刊文献+

跨境数据流动场景中的网络安全保障研究 被引量:4

Research on Cybersecurity in Cross-Border Data Flow Scenario
下载PDF
导出
摘要 随着全球数字经济不断发展,跨国企业需要在全球部署其产业链,跨境数据流动成为促进全球经济化进程的必经之路.跨境数据实践一方面带来了巨大经济红利,另一方面会造成国家主权和个人隐私保护问题.需要世界各国在各自法律框架和国际贸易规则之内,制定既利于数据流动又能保障商业数据安全、个人隐私保护和国家安全的网络安全保障体系和贸易规则,共享数字经济高速发展的红利.梳理了当前世界范围内跨境数据流动遇到的法律法规及贸易规则挑战,从网络安全风险角度提出了安全需求,从技术角度给出了跨境数据流动场景中的网络安全保障体系,提出了下一阶段的工作建议. With the development of global digital economy,multinational enterprises need to deploy their industrial chains around the world,and cross-border data flow has become the only way to promote the process of economic globalization.On the one hand,cross-border data practice brings huge economic dividend,on the other hand,it will cause personal privacy disclosure and national data sovereignty game and other problems.It is necessary for countries around the world,within their respective legal frameworks and international trade rules,to formulate network security systems and trade rules that are conducive to both data flow and commercial data security,personal privacy protection and national security,and to share the dividends of the rapid development of the digital economy.This paper combs the current challenges of laws,regulations and trade rules in the process of cross-border data flow in the world,puts forward the security requirements from the perspective of network security risk,and gives the network security assurance system in the cross-border data flow scenario from the technical point.Suggestions for the next stage are put forward.
作者 王斯梁 冯暄 陈翼 Wang Siliang;Feng Xuan;Chen Yi(Institute of Computer Science of Sichuan Province,Chengdu 610041)
出处 《信息安全研究》 2021年第7期682-686,共5页 Journal of Information Security Research
基金 四川省科技厅高新技术重大专项(2020YFG0030)。
关键词 跨境数据流动 网络安全风险 网络安全保障体系 工作建议 商业数据安全 cross-border data transmission cybersecurity risk cybersecurity assurance system recommendations for work businness data security
  • 相关文献

参考文献8

二级参考文献63

  • 1[英]维克托·迈克.舍恩伯格,肯尼思·库克耶著,盛杨燕,周涛译:《大数据时代:生活、工作与思维的大变革》,杭州:浙江人民出版社,2013年版,第8页.
  • 2Gantz F, Reinsel D, The 2011 Digital Universe Study." Extracting Value from Chaos, International Data Corporation and EMC, 2011.
  • 3Maude Bonenfant et al, Big Data and Governance, April 2013, p. 2, http://www, inter-disciplinary, net/critical-issues/wp-content/uploads/2013/04/mondouxcyberpaper, pdf.
  • 4David Lazer, Alex Pentland, Lada Adamic et al, "Computational Social Science", in Science, 2009, 323 ( 5915 ) , pp.721-723.
  • 5吴世忠:“大数据时代安全风险及政策选择”,http//www.71.cn/2013/0814/727984.shtml.
  • 6邓晓蕾:“盘点:五年十大严重信息泄露事件”,http://soft.yesky.corn/security/263/38259763.shtml.
  • 7Joseph S. Nye, Power in a Global Information Age: From Realism to Globalization, New York: Routledge, 2004, p.75.
  • 8[法]让·博丹著,李卫海等译:《主权论》,北京:北京大学出版社,2008年版.
  • 9孙南翔,张晓君:"论数据主权--基于虚拟空间博弈与合作的考察",第65页.
  • 10Joel Trachtman, "Cyberspace, Sovereignty, Jurisdiction, and Modernism", in Indiana Journals of Global Legal Studies, Vol.5, Issue 2,1998, p.566.

共引文献299

同被引文献21

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部