期刊文献+
共找到1,024篇文章
< 1 2 52 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Impact of Enforcement of Right of Communication through Information Network
2
作者 Chen Wen Attorney-at-law of the Beijing Hankun Law Firm 《中国专利与商标》 2006年第4期89-93,共5页
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20... On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu... 展开更多
关键词 PRO Impact of Enforcement of right of Communication through information network ISP
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
3
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the Protection of the right of Communication through information network
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
4
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
The Profound Revelation of Human Social Relations and the Profound Realization of Information Right of Citizens——The social significance of network technique advancement in the perspective of “Entity Cube”
5
作者 GAO GANG 《The Journal of Human Rights》 2010年第4期9-12,共4页
The R&D group of relationship searching in Microsoft Asia Research Institute explains "Entity Cube" launched in 2008 as follows:
关键词 The social significance of network technique advancement in the perspective of The Profound Revelation of Human Social Relations and the Profound Realization of information right of Citizens Entity Cube
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
6
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the Protection of privacy in the information network Age
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Privacy disclosure in Chinese social networking sites:An investigation of Renren users
8
作者 Chenju ZHU Qi HUANG Qinghua ZHU 《Chinese Journal of Library and Information Science》 2014年第2期31-42,共12页
Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college student... Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college students on Renren.com,a popular college-oriented social networking site in China.Users’ privacy disclosure behaviors were studied and gender difference was analyzed particularly.Correlation analysis was conducted to examine the relationships among evaluation indicators involving user name,image,page visibility,message board visibility,completeness of education information and provision of personal information.Findings:A large amount of personal information was disclosed via social networking sites in China.Greater percentage of male users than female users disclosed their personal information.Furthermore,significantly positive relationships were found among page visibility,message board visibility,completeness of education information and provision of personal information.Research limitations:Subjects were collected from only one social networking website.Meanwhile,our survey involves subjective judgments of user name reliability,category of profile images and completeness of information.Practical implications:This study will be of benefit for college administrators,teachers and librarians to design courses for college students on how to use social networking sites safely.Originality /value:This empirical study is one of the first studies to reveal the current situation of privacy disclosure in the Chinese social networking sites and will help the research community gain a deeper understanding of privacy disclosure in the Chinese social networking sites. 展开更多
关键词 Social networking site(SNS) Personal information privacy disclosure Web 2.0
下载PDF
Route Planning for Autonomous Transmission of Large Sport Utility Vehicle
9
作者 V.A.Vijayakumar J.Shanthini +1 位作者 S.Karthik K.Srihari 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期659-669,共11页
The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans.Hence,there exist a prediction of the back... The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans.Hence,there exist a prediction of the background scenes and that leads to discontinuity between the predicted and planned outputs.An optimal prediction engine is required that suitably reads the background objects and make optimal decisions.In this paper,the author(s)develop an autonomous model for vehicle driving using ensemble model for large Sport Utility Vehicles(SUVs)that uses three different modules involving(a)recognition model,(b)planning model and(c)prediction model.The study develops a direct realization method for an autonomous vehicle driving.The direct realization method is designed as a behavioral model that incorporates three different modules to ensure optimal autonomous driving.The behavioral model includes recognition,planning and prediction modules that regulates the input trajectory processing of input video datasets.A deep learning algorithm is used in the proposed approach that helps in the classification of known or unknown objects along the line of sight.This model is compared with conventional deep learning classifiers in terms of recall rate and root mean square error(RMSE)to estimate its efficacy.Simulation results on different traffic environment shows that the Ensemble Convolutional Network Reinforcement Learning(E-CNN-RL)offers increased accuracy of 95.45%,reduced RMSE and increased recall rate than existing Ensemble Convolutional Neural Networks(CNN)and Ensemble Stacked CNN. 展开更多
关键词 Artificial intelligence information system security and privacy fuzzy modelling deep neural networks machine learning reinforcement learning CNN SUV
下载PDF
Perspectives for Sharing Personal Information on Online Social Networks
10
作者 Chi Kin Chan Johanna Virkki 《Social Networking》 2014年第1期41-49,共9页
The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong... The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong, and Finland. This paper presents the included 12 questions and discusses the collected answers. It was discovered, e.g., that 38 out of the 50 answerers use social media every day and share versatile personal information on the Internet. Half of the answerers also share information about other people on the Internet. It was also discovered that compared to male answerers, the female answerers were more active in sharing information about other people. There was a significant variety in opinions: what should be the age limit for sharing personal information online, while 22 out of the 50 answerers felt that there is no need for an age limit at all. According to the answers, only a few people use social media for making new friends. Instead, an important reason for using social media is that their existing friends are using. An interesting finding was that the answerers see the Internet as a part of the real world;the privacy that you have on the Internet is the privacy that you have in the real world. 展开更多
关键词 information SHARING SOCIAL Media SOCIAL networks PERSonAL information privacy
下载PDF
OTT Messages Modeling and Classification Based on Recurrent Neural Networks 被引量:3
11
作者 Guangyong Yang Jianqiu Zeng +3 位作者 Mengke Yang Yifei Wei Xiangqing Wang Zulfiqar Hussain Pathan 《Computers, Materials & Continua》 SCIE EI 2020年第5期769-785,共17页
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel... A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages. 展开更多
关键词 OTT messages information privacy nine-rectangle-grid hierarchical classification recurrent neural networks
下载PDF
Analysis of Copyright Infringement in Deep Linking
12
作者 Huochenchen 《International Journal of Technology Management》 2017年第4期17-21,共5页
With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged... With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged gradually. The deep linking has brought convenience to the public and also caused a lot of copyright infringement problems. This paper expounds the identification of infringement of the deep linking information transmission on internet and the identification of infringement of the right of reproduction, furthermore analyzing three kinds of applicable standards to determine interact information transmission behavior. Finally, we should gradually get rid of the dependence on server standard applicable, auxiliary for the substantive alternative standard, and gradually complete the substantive alternative standard. 展开更多
关键词 deep linking Identification of infringement information network communication rights
下载PDF
Development in theoretical study and practice of library legislation in China
13
作者 LI Guoxin XU Shan +1 位作者 LIU Xuan WANG Xuan 《Chinese Journal of Library and Information Science》 2008年第2期16-30,共15页
One of the most outstanding characteristics of library legislation in China is that theoretical research and legislative practice are mutually reinforcing, making important issues and basic rules and regulations close... One of the most outstanding characteristics of library legislation in China is that theoretical research and legislative practice are mutually reinforcing, making important issues and basic rules and regulations closely associated with legislation and the research focus. A national library law is currently being enacted while several local library legislations have already seen fruitful results. In the enactment of 'Regulations for the Protection of Information Network Dissemination Rights', the library professional participated for the first time in enacting a national copyright law, which led to unprecedented flourishing of library activities and copyright studies. The promulgation of another legal framework,'Government Information Disclosure Regulations' further advanced the research on related issues and pushed forward government information services in public libraries in the same way. A new landmark for library legislation in recent years is the promulgation of'Guidelines for Land Utilization for Public Library Construction' and 'Public Library Construction Standards', while the framing of 'Rules of Professional Ethics for Librarians in China(On trial)' and the 'Library Service Manifesto' give indication that a framework of self-disciplinary measures of library professionals is established. 展开更多
关键词 Library legal construction information network dissemination right Government information disclosure Public Library Construction Standards Professional self-disciplined standards
下载PDF
Human Rights Protection in Genome Editing
14
作者 石佳友 胡新平 CHEN Feng(译) 《The Journal of Human Rights》 2022年第5期837-867,共31页
Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics c... Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics committee members, and the public, and clarify specific practices of these subjects or entities to meet the requirements of human rights obligations. Based on the human dignity principle, humans must never be used as a means to an end in scientific research. The right to physical and mental health requires the implementation of the principles of informed consent, the primacy of life, and risk control in genome editing, as well as the proper treatment of embryos. The right to privacy corresponds to the confidentiality obligations and non-intervention obligations of relevant parties, and the protection of sensitive personal information points to the special compliance requirements regarding information processing. Differential treatment of genome-edited humans requires objective and reasonable justification, and should also meet the requirements of the proportionality principle. 展开更多
关键词 genome editing human dignity right to physical and mental health right to privacy personal information protection
下载PDF
《民法典》背景下个人信息保护的司法考察与制度完善 被引量:2
15
作者 沃耘 乔鹏飞 《征信》 北大核心 2024年第5期31-42,共12页
大数据时代,为充分保障个人的信息安全,我国相继施行的《民法典》《个人信息保护法》对此作出了较为全面的规定。考察相关规则的司法适用,发现我国个人信息保护存在个人信息与隐私权界定不清、损害赔偿威慑作用不足、公益诉讼制度效用... 大数据时代,为充分保障个人的信息安全,我国相继施行的《民法典》《个人信息保护法》对此作出了较为全面的规定。考察相关规则的司法适用,发现我国个人信息保护存在个人信息与隐私权界定不清、损害赔偿威慑作用不足、公益诉讼制度效用未充分发挥、“知情—同意”标准不一且流于形式等问题。为解决上述问题,可通过构建可识别的场景化模式界定个人信息,引入情境脉络完整性理论判定隐私,审慎引入惩罚性赔偿,明晰个人信息保护公益诉讼的适用条件,构建“国家—行业—平台”三层规则体系实现实质同意,全面保护个人信息。 展开更多
关键词 个人信息保护 隐私权 惩罚性赔偿 “知情—同意” 《民法典》
下载PDF
大数据时代隐私权的刑法保护模式重构 被引量:1
16
作者 陈伟 邬雨岑 《西南政法大学学报》 2024年第1期107-121,共15页
大数据促进了生活的便捷,带动了新兴行业的高速发展,但超出合理边界的数据滥用行为,也对公民的隐私安全带来了现实威胁。伴随大数据时代的纵深发展,个人隐私的保护从传统个人本位向社会本位发生转变,隐私权的法益内涵在大数据时代应当... 大数据促进了生活的便捷,带动了新兴行业的高速发展,但超出合理边界的数据滥用行为,也对公民的隐私安全带来了现实威胁。伴随大数据时代的纵深发展,个人隐私的保护从传统个人本位向社会本位发生转变,隐私权的法益内涵在大数据时代应当进行重新审视。随着信息保护的日渐重视,隐私权的价值应与个人信息权一样受到同等重视,刑法应当为大数据时代隐私权的保护开辟新路径,采取直接保护与间接保护并行的双轨制保护模式,重构个人信息的刑法定义,引入“弱可识别性+隐私性”标准,同时继续加强针对隐私权犯罪的积极预防,通过刑法调整来应对当前公民隐私权被侵害的现实。 展开更多
关键词 大数据时代 隐私权 侵犯公民个人信息 刑法保护
下载PDF
NFT数字作品交易行为的“发行属性”与适用规则 被引量:1
17
作者 黄玉烨 关春媛 《编辑之友》 北大核心 2024年第3期105-112,共8页
NFT数字作品交易方兴未艾,但侵权问题频现,亟需合理的规制路径。NFT技术促进数字作品交易客体特定化并产生准物权变动的效果,使NFT数字作品区别于一般数字作品与传统作品,为发行权扩张提供了技术性支撑。但发行权的扩张尚面临诸多困境,... NFT数字作品交易方兴未艾,但侵权问题频现,亟需合理的规制路径。NFT技术促进数字作品交易客体特定化并产生准物权变动的效果,使NFT数字作品区别于一般数字作品与传统作品,为发行权扩张提供了技术性支撑。但发行权的扩张尚面临诸多困境,包括“有形载体”要件的阻碍、“所有权转移要件”标准不明、发行权与信息网络传播权在数字环境中存在重叠等。基于此,应当厘清数字环境中发行权与信息网络传播权的关系;细化NFT数字作品交易领域的发行权适用标准,完成从“有形载体”到“作品与载体相对应”的转变,明确“出售”及“所有权转移”的认定;以“转让+删除”技术及征收版权转售费作为辅助手段,完成发行权在NFT数字作品交易中的嬗变与适用。 展开更多
关键词 NFT数字作品 发行权 信息网络传播权 有形载体 所有权转移
下载PDF
馆藏绝版作品数字化传播的规范进路 被引量:1
18
作者 张惠彬 何易平 《大学图书馆学报》 北大核心 2024年第1期48-55,共8页
国家图书馆与北京三面向公司著作权纠纷案让馆藏绝版作品的数字化传播问题引起社会关注。为保护著作权并调和社会公共利益,避免破坏正常市场运作机制,我国《信息网络传播权保护条例》规定了馆藏绝版作品数字化传播的合理使用制度。从实... 国家图书馆与北京三面向公司著作权纠纷案让馆藏绝版作品的数字化传播问题引起社会关注。为保护著作权并调和社会公共利益,避免破坏正常市场运作机制,我国《信息网络传播权保护条例》规定了馆藏绝版作品数字化传播的合理使用制度。从实施情况看,条例对适格客体条件与传播范围的限制过于严苛,存在违反基本公共服务均等性要求和违背利益平衡原则等问题。借鉴新修订《日本著作权法》中的相关条款,建议我国对于馆藏绝版作品的数字化传播规范宜采取如下改革措施:一是扩大合理使用的范围,建立覆盖馆内、馆际、馆外的传播体系,并设置匹配的补偿机制;二是优化客体适用条件,建立“绝版作品”的动态认定机制;三是探索建立以国家图书馆为枢纽的绝版作品数字化传播运行机制。 展开更多
关键词 绝版作品 信息网络传播权 合理使用
下载PDF
NFT数字艺术品版权法律问题的厘清
19
作者 喻玲 邵滨 《湖南大学学报(社会科学版)》 北大核心 2024年第3期140-146,共7页
NFT数字艺术品具有唯一性,是有数字资产价值的艺术品。相较于一般艺术品,它具有准物权属性和版权属性,其交易是数字资产权属交易和版权许可使用的复合行为。NFT数字艺术品交易分为铸造发布和链上交易两个阶段。铸造是版权法意义上的复... NFT数字艺术品具有唯一性,是有数字资产价值的艺术品。相较于一般艺术品,它具有准物权属性和版权属性,其交易是数字资产权属交易和版权许可使用的复合行为。NFT数字艺术品交易分为铸造发布和链上交易两个阶段。铸造是版权法意义上的复制行为,上链发布是信息网络传播行为,后续链上交易不属于复制行为,而是准发行行为,其转售行为适用权利穷竭原则。由于载体的无形性,NFT数字艺术品持有人无法享有展览权。同时,基于智能合约中蕴含的版权许可,持有人享有非交互式传播的权利。对NFT数字艺术品非交互式传播的保护,可以考虑通过将其纳入广播权控制范围或者适用《中华人民共和国著作权法》第十条“其他权利”等途径实现。 展开更多
关键词 NFT数字艺术品 发行权 展览权 信息网络传播权
下载PDF
公众知情权与个人隐私权:公共卫生治理中的价值两难与伦理抉择
20
作者 朱海林 《社会治理》 2024年第2期47-57,共11页
公众知情权与个人隐私权是公共卫生治理中两种均应保护的重要权利。保障公众知情权与个人隐私权不仅有利于保障公民权利和维护公共健康,而且是维护人的尊严和价值、促进社会文明进步的题中之义。二者既有诸多共同的重要意义和伦理价值,... 公众知情权与个人隐私权是公共卫生治理中两种均应保护的重要权利。保障公众知情权与个人隐私权不仅有利于保障公民权利和维护公共健康,而且是维护人的尊严和价值、促进社会文明进步的题中之义。二者既有诸多共同的重要意义和伦理价值,也有不同的价值取向。价值取向的差异可能导致实践中两种权利之间的冲突。现实地看,公共卫生治理中公众知情权与个人隐私权的冲突主要表现为两种权利主体之间的利益冲突、以权利冲突为内容的法律冲突以及由义务主体的“一身二任”导致的义务冲突,从伦理层面看则是两种权利的不同价值取向导致的价值两难、以“尊重”原则为核心的伦理冲突以及以道德义务为核心的价值冲突和角色伦理困境。公共卫生治理中公众知情权与个人隐私权的冲突看似一种非此即彼的“悲剧性冲突”,但由于二者在尊重和保障公民权利和维护公众健康等方面具有价值统一性,两种权利仍然可以而且应该通过有限度的让渡方式予以平衡。平衡公众知情权与个人隐私权的价值两难,应基于公共利益优先和生命健康至上,坚持必要性、最小化和不伤害等伦理原则,使个人隐私权有限度地让渡于公众知情权。 展开更多
关键词 公共卫生治理 公众知情权 个人隐私权 价值两难 伦理抉择
下载PDF
上一页 1 2 52 下一页 到第
使用帮助 返回顶部