期刊文献+
共找到1,760篇文章
< 1 2 88 >
每页显示 20 50 100
The Way to Optimize the Right to Personal Data Portability in Chinese Practice——Based on Empirical Analysis of the Privacy Policies of 66 Mobile Apps
1
作者 LI Jinhua 《The Journal of Human Rights》 2024年第3期637-661,共25页
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e... Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability. 展开更多
关键词 right to personal data portability right to consulta-tion and duplication right to data transfer privacy policy techni-cal operability
下载PDF
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
2
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
下载PDF
Research on Data Theory of Value
3
作者 Li Haijian Zhao Li 《China Economist》 2024年第3期21-38,共18页
This paper explores the data theory of value along the line of reasoning epochal characteristics of data-theoretical innovation-paradigmatic transformation and,through a comparison of hard and soft factors and observa... This paper explores the data theory of value along the line of reasoning epochal characteristics of data-theoretical innovation-paradigmatic transformation and,through a comparison of hard and soft factors and observation of data peculiar features,it draws the conclusion that data have the epochal characteristics of non-competitiveness and non-exclusivity,decreasing marginal cost and increasing marginal return,non-physical and intangible form,and non-finiteness and non-scarcity.It is the epochal characteristics of data that undermine the traditional theory of value and innovate the“production-exchange”theory,including data value generation,data value realization,data value rights determination and data value pricing.From the perspective of data value generation,the levels of data quality,processing,use and connectivity,data application scenarios and data openness will influence data value.From the perspective of data value realization,data,as independent factors of production,show value creation effect,create a value multiplier effect by empowering other factors of production,and substitute other factors of production to create a zero-price effect.From the perspective of data value rights determination,based on the theory of property,the tragedy of the private outweighs the comedy of the private with respect to data,and based on the theory of sharing economy,the comedy of the commons outweighs the tragedy of the commons with respect to data.From the perspective of data pricing,standardized data products can be priced according to the physical product attributes,and non-standardized data products can be priced according to the virtual product attributes.Based on the epochal characteristics of data and theoretical innovation,the“production-exchange”paradigm has undergone a transformation from“using tangible factors to produce tangible products and exchanging tangible products for tangible products”to“using intangible factors to produce tangible products and exchanging intangible products for tangible products”and ultimately to“using intangible factors to produce intangible products and exchanging intangible products for intangible products”. 展开更多
关键词 data theory of value data value generation data value rights determination data value pricing
下载PDF
On the Nature of Online Retrieval of Electronic Data
4
作者 WU Yingfei NI Weisi 《The Journal of Human Rights》 2024年第4期876-903,共28页
With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online... With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching. 展开更多
关键词 electronic data online retrieval compulsory investigation SEARCH right to privacy
下载PDF
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
5
作者 Samantha B. Larkin Shakour Abuzneid 《Journal of Information Security》 2024年第4期589-611,共23页
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about... Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles. 展开更多
关键词 Access Control Access rights Artificial Intelligence Consumer Behavior Consumer Protection Criminal Law data Brokers data Handling data Privacy data Processing data Profiling Digital Forensics
下载PDF
An Overview of the Application of Big Data in Supply Chain Management and Adaptation in Nigeria
6
作者 Jehoshaphat Jaiye Dukiya 《Journal of Computer and Communications》 2024年第8期37-51,共15页
That the world is a global village is no longer news through the tremendous advancement in the Information Communication Technology (ICT). The metamorphosis of the human data storage and analysis from analogue through... That the world is a global village is no longer news through the tremendous advancement in the Information Communication Technology (ICT). The metamorphosis of the human data storage and analysis from analogue through the jaguars-loom mainframe computer to the present modern high power processing computers with sextillion bytes storage capacity has prompted discussion of Big Data concept as a tool in managing hitherto all human challenges of complex human system multiplier effects. The supply chain management (SCM) that deals with spatial service delivery that must be safe, efficient, reliable, cheap, transparent, and foreseeable to meet customers’ needs cannot but employ bid data tools in its operation. This study employs secondary data online to review the importance of big data in supply chain management and the levels of adoption in Nigeria. The study revealed that the application of big data tools in SCM and other industrial sectors is synonymous to human and national development. It is therefore recommended that both private and governmental bodies should key into e-transactions for easy data assemblage and analysis for profitable forecasting and policy formation. 展开更多
关键词 Big data IoT Optimization right data Supply Chain Transport Management
下载PDF
Protection of Basic Human Rights in the Application of Big Data to Counter Terrorism
7
作者 夏雨 齐延平 PAN Yingzhao(译) 《The Journal of Human Rights》 2019年第5期590-602,共13页
In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strate... In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strategy.The application of big data technology to counterterrorism efforts has become a powerful weapon for all countries.However,due to the uncertainty,difficulty of interpretation and potential risk of discrimination in big data technology and algorithm models,basic human rights,freedom and even ethics are likely to be impacted and challenged.As a result,there is an urgent need to prioritize basic human rights and regulate the application of big data for counter terrorism purposes.The legislation and law enforcement regarding the use of big data to counter terrorism must be subject to constitutional and other legal reviews,so as to strike a balance between safeguarding national security and protecting basic human rights. 展开更多
关键词 the application of BIG data to COUNTER TERRORISM algorithm DISCRIMINATION national security basic human rightS the principle of BALANCE
下载PDF
Basic Rights Intervention in the Obtainment of Digital Data as Evidence in Criminal Case——An Analysis Based on Six Typical Cases
8
作者 谢登科 LIU Zhao 《The Journal of Human Rights》 2021年第1期60-79,共20页
Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data con... Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion. 展开更多
关键词 electronic data fundamental rights intervention in rights legal principles
下载PDF
Federation Boosting Tree for Originator Rights Protection
9
作者 Yinggang Sun Hongguo Zhang +3 位作者 Chao Ma Hai Huang Dongyang Zhan Jiaxing Qu 《Computers, Materials & Continua》 SCIE EI 2023年第2期4043-4058,共16页
The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all... The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient. 展开更多
关键词 Federated learning data privacy rights protection decision tree
下载PDF
On the Right to the Protection of Personal Data as a Constitutional Right
10
作者 戴激涛 LIU Zhao(Translated) 《The Journal of Human Rights》 2021年第5期851-874,共24页
The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of speci... The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of special significance for the realization of citizenship in a digital society.It can be seen from an examination of the constitutional texts of various countries in the world that the right to the protection of personal data as a constitutional right has rich normative connotations,and the key legal link to realize this right lies in the national legislature actively fulfilling its obligation to shape and specify the protection of personal data in accordance with the entrustment of the constitutional norms.Given the constitutional principles of fundamental rights protection,i.e.,realizing the constitutional status of the right to the protection of personal data as a basic right by means of institutional guarantees,the legislature should first adhere to the constitutionality principle of data protection legislation.Second,a multi-level data protection legal system centered on the right to the protection of personal data should be established.Finally,the institutional guarantee mechanism for the protection of personal data should be continuously improved through constitutional interpretation. 展开更多
关键词 the right to the protection of personal data constitutional rights institutional guarantees constitutional principles constitutional interpretations
下载PDF
数据要素流通与安全的研究范畴与未来发展趋势 被引量:4
11
作者 李凤华 李晖 +1 位作者 牛犇 邱卫东 《通信学报》 EI CSCD 北大核心 2024年第5期1-11,共11页
针对数据从信息技术时代的受控共享向数据技术时代的数据要素泛在流通演化的趋势,分析了数据共享与数据要素流通的差异,阐述了什么样的数据才能成为数据要素,提出了数据成为数据要素所必须具有的6个属性,定义了数据要素流通模型及主要环... 针对数据从信息技术时代的受控共享向数据技术时代的数据要素泛在流通演化的趋势,分析了数据共享与数据要素流通的差异,阐述了什么样的数据才能成为数据要素,提出了数据成为数据要素所必须具有的6个属性,定义了数据要素流通模型及主要环节,明确了数据要素流通的研究范畴,梳理了数据要素流通研究范畴的相关概念,厘清了研究范畴所涵盖的关键核心技术,并对未来需要突破的关键技术进行了展望。 展开更多
关键词 数据要素流通 数据确权 数据安全计算 隐私计算
下载PDF
Constitutional Nature of Personality Rights and Its Manifestation in Civil Law
12
作者 陈斯彬 《The Journal of Human Rights》 2023年第4期804-825,共22页
The formation of personality comes from people’s choices and pursuit of self-realization,which is influenced by objective factors but not determined by them,so personality does not belong to the domain of objectivity... The formation of personality comes from people’s choices and pursuit of self-realization,which is influenced by objective factors but not determined by them,so personality does not belong to the domain of objectivity.The concept of general personality rights in the German Constitution was initially premised on the objective determinability in the field of personality,but in constitutional jurisprudence,it gradually shifted to something with individual autonomy as the core and personal self-realization as the goal,and the scope of relevant rights expanded accordingly,so that they could not be clearly distinguished from general freedom of action and thus became the general principle of constitutional rights.The protection of constitutional personality rights in the United States and Japan can also confirm this process,providing evidence for the constitutional nature of personality rights.Deeper research shows that constitutional personality rights actually manifest the highest value of modern constitutions—human dignity.In contrast,the theoretical justification of personality rights in civil law just lies in the objectivity and defensive nature of personality elements. 展开更多
关键词 general personality rights constitutional personality rights SELF-REALIZATION self-determination human dignity
下载PDF
数据产权法律构造论 被引量:17
13
作者 冯晓青 《政法论丛》 CSSCI 北大核心 2024年第1期120-136,共17页
在数字经济环境中,数据已成为一种新型生产要素,需要更好地挖掘和开发其经济价值。数据不同于传统有体物以及知识产权客体的特征和属性使其在法律制度构建和运行上也具有特殊性。数据产权制度是数据基础制度的核心内容,其应涵盖保护数... 在数字经济环境中,数据已成为一种新型生产要素,需要更好地挖掘和开发其经济价值。数据不同于传统有体物以及知识产权客体的特征和属性使其在法律制度构建和运行上也具有特殊性。数据产权制度是数据基础制度的核心内容,其应涵盖保护数据主体合法权益、协调和平衡数据利益关系、促进数据有序流动和分享、促进数据要素利益公平分配等内容。数据产权的法律构造旨在建立数据资源持有权、数据加工使用权和数据产品经营权的数据动态流转和价值实现机制,最终服务于数字经济发展目标。 展开更多
关键词 数据产权 法律构造 数据资源持有权 数据加工使用权 数据产品经营权 公共领域
下载PDF
企业数据权益论 被引量:9
14
作者 程啸 《中国海商法研究》 CSSCI 2024年第1期50-63,共14页
企业对其生产和处理的数据享有的利益应受法律保护,然而现行的物权法、合同法、知识产权法和反不正当竞争法等民事法律制度都不足以实现对企业数据的全面保护,故应当确立企业对其数据享有一种独立的、新型的财产权,即企业数据权益。企... 企业对其生产和处理的数据享有的利益应受法律保护,然而现行的物权法、合同法、知识产权法和反不正当竞争法等民事法律制度都不足以实现对企业数据的全面保护,故应当确立企业对其数据享有一种独立的、新型的财产权,即企业数据权益。企业数据权益的确权应当采取单一路径,不应区分数据、数据资源和数据产品或数据的生产与流通而分别确权。企业对其数据享有的权益具有排他效力,但是该排他性受制于数据上其他参与方的权益,即个人信息权益及数据来源者权利。数据资源持有权、数据加工使用权和数据产品经营权并非是企业数据权益的内容,企业对其数据享有的权益的内容仍应从占有、使用、收益和处分等方面加以界定。 展开更多
关键词 数据产权 企业数据权益 个人数据 数据来源者权利 《数据二十条》
下载PDF
生成式人工智能的知识产权法律因应与制度创新 被引量:16
15
作者 吴汉东 刘鑫 《科技与法律(中英文)》 CSSCI 2024年第1期1-10,共10页
生成式人工智能的复合产品结构与自主运转功能造成了知识产权法律适用的难题与挑战。在复合产品结构下,知识产权法律难题源于生成式人工智能核心要素之算法与数据的知识产权保护问题;在自主运转功能下,知识产权法律挑战则呈现为生成式... 生成式人工智能的复合产品结构与自主运转功能造成了知识产权法律适用的难题与挑战。在复合产品结构下,知识产权法律难题源于生成式人工智能核心要素之算法与数据的知识产权保护问题;在自主运转功能下,知识产权法律挑战则呈现为生成式人工智能衍生内容的知识产权授权与确权问题。对此,应积极推进生成式人工智能场景下的知识产权法律变革,立足生成式人工智能核心要素与衍生内容,有针对性地展开知识产权制度创新,从而实现对生成式人工智能知识产权法律问题的合理回应。 展开更多
关键词 生成式人工智能 知识产权 算法 数据
下载PDF
数据“利益束”:数据权益制度新论 被引量:12
16
作者 杨东 白银 《武汉大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第1期65-77,共13页
创设排他性、利己性的数据权利不利于海量数据的高效流通与多元价值的实现,加剧了数据私权化与效用化之间的内生性冲突。在权益区分保护理论框架下,采取数据利益保护进路更具正当性和相对优势。我国宜将数据利益作为数据权益制度的中心... 创设排他性、利己性的数据权利不利于海量数据的高效流通与多元价值的实现,加剧了数据私权化与效用化之间的内生性冲突。在权益区分保护理论框架下,采取数据利益保护进路更具正当性和相对优势。我国宜将数据利益作为数据权益制度的中心,建构人与人之间动态灵活、有机立体的利他性数据“利益束”范式,以有效协调和整合多元主体之间复杂的数据利益关系,并在数据“利益束”范式下,充分利用Web3.0以用户为中心的开放式价值互联网效能,通过点对点的数据利益流通来构建全网络利益格局。我国还应建立合理的激励与收益实现机制,促进所有数据主体共创和共享数据红利,在数据财产行为主义保护模式基础上,建立智能化治理体系来保障数据安全,最终形成中国自主且更能适应数字经济发展规律的新型数据权益制度体系,以此推进我国数字经济的健康发展。 展开更多
关键词 数据要素市场 数据流通共享 数据产权 利益束 权利束 区块链技术 共票 法链 ChatGPT
下载PDF
“三权分置”路径下数据产权客体的类型谱系 被引量:6
17
作者 张素华 王年 《法治研究》 CSSCI 北大核心 2024年第2期47-60,共14页
“数据二十条”在表述数据产权“三权分置”时分别使用了“数据资源”“数据”“数据产品”三项表达来称谓“三权”的客体,从政策上肯认并确立了数据产权的客体对象。从法律视角审视,前述三项政策表达仍需经由学理阐释来论证其在法律上... “数据二十条”在表述数据产权“三权分置”时分别使用了“数据资源”“数据”“数据产品”三项表达来称谓“三权”的客体,从政策上肯认并确立了数据产权的客体对象。从法律视角审视,前述三项政策表达仍需经由学理阐释来论证其在法律上的定位及其相互关系,使之成为具有规范性的法律表达。“三权分置”路径下,“数据”的核心特征应包括信息属性、物理属性和集合属性,并在数据生产和流通使用的“价值链”上延展形成“数据资源”—“数据集合”—“数据产品”的类型层级。在分级分类构建原则下,作为产权客体的“数据”还可在横向上形成以公共数据与企业数据为一级子类型、公用/私用公共数据与公开/不公开企业数据为二级子类型的类型谱系。由此,便可在“三权分置”路径下阐明作为产权客体的数据的规范属性与类型谱系,为数据产权“三权分置”的法律化奠定基础和前提。 展开更多
关键词 数据产权 数据要素 三权分置 客体类型
下载PDF
国际数据权利体系沿革与我国借鉴研究 被引量:1
18
作者 何梦婷 刘先瑞 冉从敬 《图书馆论坛》 CSSCI 北大核心 2024年第1期124-136,共13页
当前我国数据权利制度体系尚不完善,严重阻碍数据资源流动、转化与增值,易引发国家数据安全问题。数据权利体系范畴包括国家数据主权、数据人格权和数据财产权,德、美、俄等国数据权利体系演化历程不同,呈现德国沿袭传统式、美国修正扩... 当前我国数据权利制度体系尚不完善,严重阻碍数据资源流动、转化与增值,易引发国家数据安全问题。数据权利体系范畴包括国家数据主权、数据人格权和数据财产权,德、美、俄等国数据权利体系演化历程不同,呈现德国沿袭传统式、美国修正扩张式、俄罗斯突进式演化的不同数据权利演化模式。以国际模式为参考,我国应进一步完善数据权利体系宏观架构,加强具体权利构建。 展开更多
关键词 数据权利 权利演进模式 数据主权
下载PDF
“数据二十条”下探析数据资源持有权的内涵及框架构建 被引量:3
19
作者 张衠 《信息资源管理学报》 CSSCI 2024年第2期54-67,共14页
《关于构建数据基础制度更好发挥数据要素作用的意见》(简称“数据二十条”)提出了以“数据流通激励”为主旨的数据产权结构性分置制度。对数据资源持有权的合理配置影响到数据利益的第一次分配,是实现数据“共同使用、共享收益”的战... 《关于构建数据基础制度更好发挥数据要素作用的意见》(简称“数据二十条”)提出了以“数据流通激励”为主旨的数据产权结构性分置制度。对数据资源持有权的合理配置影响到数据利益的第一次分配,是实现数据“共同使用、共享收益”的战略性目标的基础。基于传统排他性产权思维下的数据资源持有权分配模式,皆存在加剧数据共同生产者之间利益冲突的可能性。本文提出在数据生产者之间以“1+N”模式配置数据持有权,即“特定数据生产者的在先持有权+N个其他数据生产者的访问权”模式,通过技术治理和透明度治理等工具的支持,探索符合数据经济发展规律的、公平的高效的新型数据产权制度。 展开更多
关键词 数据资源持有权 数据共同生产者 数据产权 访问权 透明度
下载PDF
数据资源持有权的法律解释 被引量:6
20
作者 于海纯 陈润恺 《科技与法律(中英文)》 CSSCI 2024年第2期21-30,共10页
在大数据和人工智能技术的推动下,数据资源从单纯的信息载体转变为独立的价值来源,开始出现财产属性。但其所具有的非排他性、技术依附性等特征使得传统的信息权益与权利保护范式难以适用。数据资源的价值源于对数据的控制状态,这并非... 在大数据和人工智能技术的推动下,数据资源从单纯的信息载体转变为独立的价值来源,开始出现财产属性。但其所具有的非排他性、技术依附性等特征使得传统的信息权益与权利保护范式难以适用。数据资源的价值源于对数据的控制状态,这并非实体权利。数据资源持有权在法律上应解释为“持有主体合法控制数据资源并免受非法干扰和攻击的利益”。持有利益受侵害所造成的损失属于纯粹经济损失,应采用行为主义保护模式,通过侵权法一般条款进行救济。持有主体则应根据具体数据类型遵守相应的行为标准。此外,个人信息数据的相关规则是基于风险防范的考量,对数据所携带信息采取保护措施,个人信息主体属于数据来源者而非数据资源持有主体。 展开更多
关键词 数据产权 数据资源持有权 利益保护 行为主义
下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部