Protection of personal information is a significant issue in the construction of legal systems in various countries in the information age.Introducing a balanced approach for protecting personal information is an impo...Protection of personal information is a significant issue in the construction of legal systems in various countries in the information age.Introducing a balanced approach for protecting personal information is an important goal of basic human rights protection and data legislation.Personal information protection involves comprehensive considerations among various values,and the balanced structure between personal information rights and other rights systems has become the key to legislation on personal information protection.The“news exception”is a prominent example representing the balanced structure of personal information protection.As a societal instrument,news not only pursues commercial value but also advocates freedom of expression and public value.There exists a natural tension between news and personal information protection.The“news exception”of the balanced structure has become a fundamental requirement and important connotation for constructing a system for protecting personal information.The balanced structure of the“news exception”requires a reasonable definition of the concept and purpose of news,and both the self-discipline within the news industry and the judicial intervention are necessary factors.China has preliminarily completed the top-level legislative design of personal information protection through laws such as the Civil Code of the People’s Republic of China(PRC)and the Personal Information Protection Law of the People’s Republic of China.However,the balanced mechanism of the“news exception”has not yet been fully established in China.A“news exception”based on the ideas of balance and the improvement of the institutional system is the fundamental principle for the development of China’s personal information protection system.展开更多
The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessmen...The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.展开更多
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat...It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .展开更多
Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in t...Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests.展开更多
The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy r...The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.展开更多
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua...In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.展开更多
Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, t...Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios, the system makes use of the existent specification of FOAF (Friend- of-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites. Ticket-based Access Authorization System (TAAS) is provided to grant permission to acquire resources on personal portal. Meanwhile, the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios.展开更多
With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as so...With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.展开更多
The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong...The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong, and Finland. This paper presents the included 12 questions and discusses the collected answers. It was discovered, e.g., that 38 out of the 50 answerers use social media every day and share versatile personal information on the Internet. Half of the answerers also share information about other people on the Internet. It was also discovered that compared to male answerers, the female answerers were more active in sharing information about other people. There was a significant variety in opinions: what should be the age limit for sharing personal information online, while 22 out of the 50 answerers felt that there is no need for an age limit at all. According to the answers, only a few people use social media for making new friends. Instead, an important reason for using social media is that their existing friends are using. An interesting finding was that the answerers see the Internet as a part of the real world;the privacy that you have on the Internet is the privacy that you have in the real world.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing ...The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection.展开更多
Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research ...Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research concludespreliminary results to get immense knowledge from visual and Audio(sound) modality. To overcome the deficiency, we proposed the Deep BimodalFusion (DBF) approach to predict five traits of personality-agreeableness,extraversion, openness, conscientiousness and neuroticism. In the proposedframework, regarding visual modality, the modified convolution neural networks(CNN), more specifically Descriptor Aggregator Model (DAN) areused to attain significant visual modality. The proposed model extracts audiorepresentations for greater efficiency to construct the long short-termmemory(LSTM) for the audio modality. Moreover, employing modality-based neuralnetworks allows this framework to independently determine the traits beforecombining them with weighted fusion to achieve a conclusive prediction of thegiven traits. The proposed approach attains the optimal mean accuracy score,which is 0.9183. It is achieved based on the average of five personality traitsand is thus better than previously proposed frameworks.展开更多
The formation of personality comes from people’s choices and pursuit of self-realization,which is influenced by objective factors but not determined by them,so personality does not belong to the domain of objectivity...The formation of personality comes from people’s choices and pursuit of self-realization,which is influenced by objective factors but not determined by them,so personality does not belong to the domain of objectivity.The concept of general personality rights in the German Constitution was initially premised on the objective determinability in the field of personality,but in constitutional jurisprudence,it gradually shifted to something with individual autonomy as the core and personal self-realization as the goal,and the scope of relevant rights expanded accordingly,so that they could not be clearly distinguished from general freedom of action and thus became the general principle of constitutional rights.The protection of constitutional personality rights in the United States and Japan can also confirm this process,providing evidence for the constitutional nature of personality rights.Deeper research shows that constitutional personality rights actually manifest the highest value of modern constitutions—human dignity.In contrast,the theoretical justification of personality rights in civil law just lies in the objectivity and defensive nature of personality elements.展开更多
Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: T...Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR.展开更多
The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have ...The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have the following two shortcomings:On the one hand,they mostly use global average pooling to generate context descriptors,without highlighting the guiding role of salient information on descriptor generation,resulting in insufficient ability of the final generated attention mask representation;On the other hand,the design of most attention modules is complicated,which greatly increases the computational cost of the model.To solve these problems,this paper proposes an attention module called self-supervised recalibration(SR)block,which introduces both global and local information through adaptive weighted fusion to generate a more refined attention mask.In particular,a special"Squeeze-Excitation"(SE)unit is designed in the SR block to further process the generated intermediate masks,both for nonlinearizations of the features and for constraint of the resulting computation by controlling the number of channels.Furthermore,we combine the most commonly used Res Net-50 to construct the instantiation model of the SR block,and verify its effectiveness on multiple Re-ID datasets,especially the mean Average Precision(m AP)on the Occluded-Duke dataset exceeds the state-of-the-art(SOTA)algorithm by 4.49%.展开更多
With the continuous development and progress of economy,people's living standard and culture level have been improved,but with it,there are also various kinds of life stress,study stress and work stress,which make...With the continuous development and progress of economy,people's living standard and culture level have been improved,but with it,there are also various kinds of life stress,study stress and work stress,which make people's mental health problems in life more andmore prominent,and how to improve students'mental health level is the main task of each education stage.The current psychology discipline system has been perfected,including personality psychology and social psychology,which are effectively applied in the actual mental health education or psychological guidance work,and are key disciplines to improve people's mental health.The theoretical system of personality and social psychology consists of three theories:the theory of planned behavior,the theory of explanatory levels,and the theory of self-determination,all of which have an irreplaceable influence on mental health.In this regard,this paper combines relevant literature and work experience to study in depth the influence of personality ansocial psychology on mental health.展开更多
Accessibility is the basis and prerequisite for persons with disabilities to enjoy and exercise all human rights and fundamental freedoms With the rapid development of the internet, providing and promoting informatio...Accessibility is the basis and prerequisite for persons with disabilities to enjoy and exercise all human rights and fundamental freedoms With the rapid development of the internet, providing and promoting information accessibility is considered an important obligation for the State In the process of transforming international human rights law into domestic law, how to deal with the human rights protection of persons with disabilities and the obligations of the private sector to ensure persons with disabilities receive services and products that meet the requirements and principles of information accessibility has become a development issue in the new era Against the backdrop of the Convention on the Rights of Persons with Disabilities and in the context of the booming development of the cause of persons with disabilities in China, legal scholars, persons with disabilities, and organizations have jointly proposed the Beijing Initiative on the Principles of Information Accessibility for Science and Technology Products It clarifies that the private sector should embrace the human rights model advocated by the Convention in terms of information accessibility, and provide equal participation for persons with disabilities in the process of designing, producing and selling scientific and technological products The Initiative also states that the private sector should keep pace with the United Nation’s sustainable development goals and the basic national policy of building a well-to-do society in an all round way, ensuring persons with disabilities are included within a moderately well-off society It also provides civil opinions on the formulation and clarification of relevant laws in the future.展开更多
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ...The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.展开更多
In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.How...In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.However,com⁃pensatory damages remain a contentious issue,both in theory and in practice,within the legal framework of personal in⁃formation public interest litigation.Through an empirical study conducted within China's judicial practice,this paper reveals that the pending issue concerning the nature and function of compensatory damages has caused highly contra⁃dictory verdicts regarding their calculation and allocation,as well as their relationship with other forms of pecuniary li⁃abilities.Only by acknowledging the role of compensatory damages imposed in personal information public interest liti⁃gation as"Skimming off Excess Profits",and affirming their function as deterrence rather than compensation can they truly achieve the broader objective of safeguarding personal information security and promoting public welfare,as well as avoid disrupting the harmony of the existing legal landscape.展开更多
文摘Protection of personal information is a significant issue in the construction of legal systems in various countries in the information age.Introducing a balanced approach for protecting personal information is an important goal of basic human rights protection and data legislation.Personal information protection involves comprehensive considerations among various values,and the balanced structure between personal information rights and other rights systems has become the key to legislation on personal information protection.The“news exception”is a prominent example representing the balanced structure of personal information protection.As a societal instrument,news not only pursues commercial value but also advocates freedom of expression and public value.There exists a natural tension between news and personal information protection.The“news exception”of the balanced structure has become a fundamental requirement and important connotation for constructing a system for protecting personal information.The balanced structure of the“news exception”requires a reasonable definition of the concept and purpose of news,and both the self-discipline within the news industry and the judicial intervention are necessary factors.China has preliminarily completed the top-level legislative design of personal information protection through laws such as the Civil Code of the People’s Republic of China(PRC)and the Personal Information Protection Law of the People’s Republic of China.However,the balanced mechanism of the“news exception”has not yet been fully established in China.A“news exception”based on the ideas of balance and the improvement of the institutional system is the fundamental principle for the development of China’s personal information protection system.
基金the“Application of the Dynamic System Theory in the Determination of Infringement Liability for Immaterial Personality Rights in the Civil Code”(Project Approval Number 2022MFXH006)a project of the young scholar research program of the Civil Law Society of CLS in 2022。
文摘The advent of the big data era has presented unprecedented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is unable to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive elements and general clauses.It both overcomes the rigidity of the“allor-nothing”legal effect evaluation mechanism of the“element-effect”model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringement under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation elements,this framework can achieve a flexible evaluation of the constitutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of personal information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted.
文摘It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .
文摘Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests.
文摘The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
文摘In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.
基金supported by the National Natural Science Foundation of China under Grant No.61272521the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20110005130001
文摘Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios, the system makes use of the existent specification of FOAF (Friend- of-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites. Ticket-based Access Authorization System (TAAS) is provided to grant permission to acquire resources on personal portal. Meanwhile, the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios.
基金Project Supported: Beijing National Social Science Foundation (Project number: 13ZHB013), the Chinese National Social Science Foundation (Project number: 12&ZD220 & 13 &ZD 184), and the Chinese National Natural Science Foundation (Project number: 71133006/G0314).
文摘With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.
文摘The goal of this research was to study how people feel about sharing personal information on social networks. The research was done by interviews;50 people were interviewed, mostly from China's Mainland, Hong Kong, and Finland. This paper presents the included 12 questions and discusses the collected answers. It was discovered, e.g., that 38 out of the 50 answerers use social media every day and share versatile personal information on the Internet. Half of the answerers also share information about other people on the Internet. It was also discovered that compared to male answerers, the female answerers were more active in sharing information about other people. There was a significant variety in opinions: what should be the age limit for sharing personal information online, while 22 out of the 50 answerers felt that there is no need for an age limit at all. According to the answers, only a few people use social media for making new friends. Instead, an important reason for using social media is that their existing friends are using. An interesting finding was that the answerers see the Internet as a part of the real world;the privacy that you have on the Internet is the privacy that you have in the real world.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
文摘The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection.
文摘Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research concludespreliminary results to get immense knowledge from visual and Audio(sound) modality. To overcome the deficiency, we proposed the Deep BimodalFusion (DBF) approach to predict five traits of personality-agreeableness,extraversion, openness, conscientiousness and neuroticism. In the proposedframework, regarding visual modality, the modified convolution neural networks(CNN), more specifically Descriptor Aggregator Model (DAN) areused to attain significant visual modality. The proposed model extracts audiorepresentations for greater efficiency to construct the long short-termmemory(LSTM) for the audio modality. Moreover, employing modality-based neuralnetworks allows this framework to independently determine the traits beforecombining them with weighted fusion to achieve a conclusive prediction of thegiven traits. The proposed approach attains the optimal mean accuracy score,which is 0.9183. It is achieved based on the average of five personality traitsand is thus better than previously proposed frameworks.
文摘The formation of personality comes from people’s choices and pursuit of self-realization,which is influenced by objective factors but not determined by them,so personality does not belong to the domain of objectivity.The concept of general personality rights in the German Constitution was initially premised on the objective determinability in the field of personality,but in constitutional jurisprudence,it gradually shifted to something with individual autonomy as the core and personal self-realization as the goal,and the scope of relevant rights expanded accordingly,so that they could not be clearly distinguished from general freedom of action and thus became the general principle of constitutional rights.The protection of constitutional personality rights in the United States and Japan can also confirm this process,providing evidence for the constitutional nature of personality rights.Deeper research shows that constitutional personality rights actually manifest the highest value of modern constitutions—human dignity.In contrast,the theoretical justification of personality rights in civil law just lies in the objectivity and defensive nature of personality elements.
文摘Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR.
基金supported in part by the Natural Science Foundation of Xinjiang Uygur Autonomous Region(Grant No.2022D01B186 and No.2022D01B05)。
文摘The attention mechanism can extract salient features in images,which has been proved to be effective in improving the performance of person re-identification(Re-ID).However,most of the existing attention modules have the following two shortcomings:On the one hand,they mostly use global average pooling to generate context descriptors,without highlighting the guiding role of salient information on descriptor generation,resulting in insufficient ability of the final generated attention mask representation;On the other hand,the design of most attention modules is complicated,which greatly increases the computational cost of the model.To solve these problems,this paper proposes an attention module called self-supervised recalibration(SR)block,which introduces both global and local information through adaptive weighted fusion to generate a more refined attention mask.In particular,a special"Squeeze-Excitation"(SE)unit is designed in the SR block to further process the generated intermediate masks,both for nonlinearizations of the features and for constraint of the resulting computation by controlling the number of channels.Furthermore,we combine the most commonly used Res Net-50 to construct the instantiation model of the SR block,and verify its effectiveness on multiple Re-ID datasets,especially the mean Average Precision(m AP)on the Occluded-Duke dataset exceeds the state-of-the-art(SOTA)algorithm by 4.49%.
文摘With the continuous development and progress of economy,people's living standard and culture level have been improved,but with it,there are also various kinds of life stress,study stress and work stress,which make people's mental health problems in life more andmore prominent,and how to improve students'mental health level is the main task of each education stage.The current psychology discipline system has been perfected,including personality psychology and social psychology,which are effectively applied in the actual mental health education or psychological guidance work,and are key disciplines to improve people's mental health.The theoretical system of personality and social psychology consists of three theories:the theory of planned behavior,the theory of explanatory levels,and the theory of self-determination,all of which have an irreplaceable influence on mental health.In this regard,this paper combines relevant literature and work experience to study in depth the influence of personality ansocial psychology on mental health.
文摘Accessibility is the basis and prerequisite for persons with disabilities to enjoy and exercise all human rights and fundamental freedoms With the rapid development of the internet, providing and promoting information accessibility is considered an important obligation for the State In the process of transforming international human rights law into domestic law, how to deal with the human rights protection of persons with disabilities and the obligations of the private sector to ensure persons with disabilities receive services and products that meet the requirements and principles of information accessibility has become a development issue in the new era Against the backdrop of the Convention on the Rights of Persons with Disabilities and in the context of the booming development of the cause of persons with disabilities in China, legal scholars, persons with disabilities, and organizations have jointly proposed the Beijing Initiative on the Principles of Information Accessibility for Science and Technology Products It clarifies that the private sector should embrace the human rights model advocated by the Convention in terms of information accessibility, and provide equal participation for persons with disabilities in the process of designing, producing and selling scientific and technological products The Initiative also states that the private sector should keep pace with the United Nation’s sustainable development goals and the basic national policy of building a well-to-do society in an all round way, ensuring persons with disabilities are included within a moderately well-off society It also provides civil opinions on the formulation and clarification of relevant laws in the future.
文摘The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.
文摘In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.However,com⁃pensatory damages remain a contentious issue,both in theory and in practice,within the legal framework of personal in⁃formation public interest litigation.Through an empirical study conducted within China's judicial practice,this paper reveals that the pending issue concerning the nature and function of compensatory damages has caused highly contra⁃dictory verdicts regarding their calculation and allocation,as well as their relationship with other forms of pecuniary li⁃abilities.Only by acknowledging the role of compensatory damages imposed in personal information public interest liti⁃gation as"Skimming off Excess Profits",and affirming their function as deterrence rather than compensation can they truly achieve the broader objective of safeguarding personal information security and promoting public welfare,as well as avoid disrupting the harmony of the existing legal landscape.