篇章数

9

引证文献

1 !

参考文献

358

大数据时代个人隐私的分级保护研究图书

Research on the Classified Protection of Personal Privacy in the Age of Big Data

SSAPID:101-2055-7752-20
ISBN:978-7-5201-3912-0
DOI:
ISSN:

[内容简介] 本书通过分析12年间国内外300个数据泄露案例,勾勒出大数据污染的现状;通过审视隐私权的新内涵、新表现、新挑战,剖析大数据隐私侵害的特征;通过比较6大洲92国(地区)的相关法规,探讨全球隐私保护的掣肘。为平衡大数据的机遇和挑战,本书将分级理论引入隐私保护,提出分级保护框架,分别对隐私主体、隐私数据进行分级;并从自我保护的视角,调查中美“千禧一代”隐私保护的意识与行动,提出精准防御的原则与策略。

相关信息

丛书名:
作 者: 王敏
编 辑:张萍
出版社:社会科学文献出版社
出版时间: 2018年12月
语 种:汉文
中图分类:G2 信息与知识传播

 文前辅文

 第一章 大数据时代隐私保护何以成为问题?

  第一节 大数据时代的隐私污染

   一 全球性的隐私侵害

    (一)国内外隐私信息遭到泄露现象成灾

    (二)大数据应用加剧隐私侵害

   二 大数据污染的治理

    (一)大数据时代,个人隐私变“明私”,财产安全隐忧变“明忧”,“大数据污染”亟待治理

    (二)完善的隐私数据保护体系,能保障个人数据的合法交易,促进大数据产业的良性发展

  第二节 隐私保护的多重悖论

   一 隐私悖论无处不在

    (一)“隐私”定义之悖论

    (二)隐私权利与责任之悖论

    (三)隐私保护与其他价值观之冲突

    (四)隐私遮蔽与自我展示之悖论

   二 隐私保护掣肘重重

  第三节 解决隐私悖论的新路径

   一 原路径的失效

   二 新思路的转向

 第二章 重新认识大数据时代的隐私权

  第一节 大数据时代的个人数据处理

   一 收集:原生数据与模拟数据

   二 处理:数据画像与生物识别

  第二节 大数据时代隐私权的新内涵

   一 关涉公民的数字身份

   二 六项权利与八项原则

   三 价值化·暴力化·技术化·全球化

    (一)价值化:隐私权的经济价值凸显

    (二)暴力化:隐私权更易侵犯且危害难控

    (三)技术化:隐私权的侵犯呈现技术高超化、手段隐蔽化、形式多样化等特征

    (四)全球化:隐私权客体范围扩大且有全球化趋势

  第三节 大数据时代隐私侵权的新表现

   一 个人数据的不正当交易

   二 私人活动的全方位监控

   三 私人领域的无障碍侵入

  第四节 大数据时代隐私权的新挑战

   一 以国家安全之名

   二 以信息知情之名

   三 数据无障碍跨境流动

   四 传统道德伦理受侵蚀

 第三章 世界各国隐私保护的有效性分析

  第一节 中美最新隐私法规的比较分析

   一 中国:法规分散与制度创新

   二 美国:分散立法与行业自律

   三 中美隐私法规的比较分析

  第二节 世界主要国家的隐私法规分析

   一 欧洲6国

   二 亚洲3国

   三 大洋洲2国

   四 非洲2国

   五 美洲3国

  第三节 世界各国隐私保护现状与启示

   一 现状:不健全型世界隐私保护地图

   二 启示:“反技术意志”全球新标准

    (一)主要国家的问题总结

    (二)各国共同问题的总结

    (三)相关启示

    (四)基于启示的可行进路

 第四章 有效保护之一:对隐私主体进行分级

  第一节 隐私分级保护的理论框架

   一 分类及其相关理论

   二 分级及其相关应用

   三 隐私分级保护框架

  第二节 隐私主体分级的伦理准则

   一 隐私保护的伦理准则

   二 隐私主体分级的准则

  第三节 隐私主体分级的维度

   一 从性别的角度分级

   二 从年龄的角度分级

   三 从职业的角度分级

  第四节 隐私主体的综合分级

   一 三个维度的综合

   二 其他维度的综合

 第五章 有效保护之二:对隐私数据进行分级

  第一节 个人隐私与敏感数据

   一 数字时代的个人隐私

   二 敏感数据是核心领域

   三 敏感数据鉴定与分类

  第二节 敏感数据的定义模式

   一 敏感数据的法律定义

   二 敏感数据的定义模式

  第三节 敏感数据的现实悖论

   一 理论与现实间的悖论

    (一)理论上,“敏感数据”被视为隐私与数据保护领域的核心,其定义有两种基本模式:“欧盟标准”和“欧盟标准加犯罪记录”

    (二)现实中,“财务数据”被侵害最多,凸显出敏感数据定义的“现实悖论”

   二 现实悖论的两种解释

  第四节 隐私数据的分类分级

 第六章 隐私保护的有效性调查:如何加强自我保护?

  第一节 个人隐私自我保护的伦理原则

   一 关于保护意识的原则

   二 关于保护行动的原则

  第二节 中美“千禧一代”大学生的隐私保护意识比较

   一 框架与模型

    (一)隐私计算理论

    (二)隐私忧虑

    (三)“千禧一代”与隐私保护

   二 中国大学生的隐私保护意识

   三 美国大学生的隐私保护意识

   四 中美大学生隐私保护意识的比较

  第三节 中美“千禧一代”大学生的隐私保护行动比较

   一 中国大学生的隐私保护行动

   二 美国大学生的隐私保护行动

   三 中美大学生隐私保护行动的比较

  第四节 大数据时代隐私自我保护的现状与展望

   一 调研:价值趋同与文化存异

    (一)调研设计

    (二)数据收集与分析

    (三)研究发现与讨论

    (四)结语

   二 现状:隐私保护有意识无行动

   三 展望:小数据思维精准防御

 第七章 永恒之悖论:未完的思考

  第一节 大数据:隐私的魔咒?

  第二节 新技术唤醒暴力与恶

  第三节 人与技术关系的重构

 附录一 中文调查问卷

 附录二 英文调查问卷

入侵隐私是大数据的“基因”,也是大数据应用的阿喀琉斯之踵。公共安全与公众信任是其达摩克利斯之剑。本书通过分析12年间国内外300个数据泄露案例,勾勒出大数据污染的现状;通过审视隐私权的新内涵、新表现、新挑战,剖析大数据隐私侵害的特征;通过比较6大洲92国(地区)的相关法规,探讨全球隐私保护的掣肘。为平衡大数据的机遇和挑战,本书将分级理论引入隐私保护,提出分级保护框架,分别对隐私主体、隐私数据进行分级;并从自我保护的视角,调查中美“千禧一代”隐私保护的意识与行动,提出精准防御的原则与策略。

1.〔美〕查尔斯·都希格:《习惯的力量》,吴奕俊、陈丽丽等译,中信出版社,2013。

2.陈昶屹:《网络人格权侵权责任研究》,北京大学出版社,2014。

3.〔美〕丹尼尔·沙勒夫:《隐私不保的年代》,江苏人民出版社,2011。

4.江作苏、王敏:《新闻法治论》,华中师范大学出版社,2015。

5.蒋坡:《个人数据信息的法律保护》,中国政法大学出版社,2008。

6.〔德〕孔汉思·库舍尔编《全球伦理——世界宗教议会宣言》,四川人民出版社,1997。

7.李德成:《网络隐私权保护制度初论》,中国方正出版社,2001。

8.〔美〕路易斯·D.布兰代斯等:《隐私权》,宦盛奎译,北京大学出版社,2014。

9.梅绍祖:《网络与隐私》,清华大学出版社,2003。

10.〔美〕纳尔逊·安特宁·克劳福德:《新闻伦理学》,江作苏、王敏译,中国传媒大学出版社,2016。

11.全国人大常委会办公厅编《全国人民代表大会常务委员会关于加强网络信息保护的决定》,中国民主法制出版社,2012。

12.王忠:《大数据时代个人数据隐私规制》,社会科学文献出版社,2014。

13.〔英〕维克托·迈尔·舍恩伯格、肯尼思·库克耶:《大数据时代》,盛杨燕、周涛译,浙江人民出版社,2013。

14.向淑君:《敞开与遮蔽:新媒介时代的隐私问题研究》,知识产权出版社,2011。

15.谢永志:《个人数据保护法立法研究》,人民法院出版社,2013。

16.徐子沛:《大数据:正在到来的数据革命,以及它如何改变政府、商业与我们的生活》,广西师范大学出版社,2013。

17.雍桂良:《中国当代社会活动家辞典》,学苑出版社,1990。

18.张民安、宋志斌:《隐私权的比较研究:法国、德国、美国及其他国家的隐私权》,中山大学出版社,2013。

19.张民安主编《公开他人私人事务的隐私侵权》,中山大学出版社,2012。

20.张民安主编《侵扰他人安宁的隐私侵权》,中山大学出版社,2012。

21.张民安主编《信息性隐私权研究:信息性隐私权的产生、发展、适用范围和争议》,中山大学出版社,2014。

22.张民安主编《自治性隐私权研究:自治性隐私权的产生、发展、适用范围和争议》,中山大学出版社,2014。

23.张秀兰:《网络隐私权保护研究》,北京图书馆出版社,2006。

24.赵水忠:《谁偷窥了你的网络隐私》,电子工业出版社,2004。

25.钟瑛:《网络传播伦理》,清华大学出版社,2005。

26.Agamben G.,,Daniel Heller-Roazen trans.,Stanford:Stanford University Press,1998.

27.Allen A L.,,Lanham,MD:Rowman & Littlefield,1988.

28.Babcock,William A.and William H.Freivogel, SAGE Publications,2015.

29.Baker S.A.,,Stanford,CA:Hoover Press,2013.

30.Beck,,London,UK:Sage Publications,1992.

31.Bramer,M.,,Berlin,Germany:Springer,2013.

32.Brin D.,New York:Basic Books,1999.

33.Bygrave L.A.,,Kluwer Law International,2002.

34.Carey P., Oxford:Oxford University Press,Inc.,2009.

35.Cherry D.,Syngress,2014.

36.Chesterman,S.,,Academy Publishing,2014.

37.Christopher Meyers,,Oxford,England:Oxford University Press,2010.

38.Craig T,Ludloff M.E.,,O'Reilly Media,Inc.,2011.

39.DeCew,J.,,Ithaca:Cornell University Press,1997.

40.Elshtain,Jean Bethke,,New York:Basic Books,1995.

41.F.D.Schoeman, Cambridge,UK:Cambridge University Press,1984.

42.Fish E.,,Lanham,MD:Rowman & Littlefield,2015.

43.Friedewald,M.and Pohoryles,R.J.,,London,UK:Routledge,2014.

44.Friedman,Samuel Joshua,,Maryland:University Press of America,2000.

45.Giddens,A.& Pierson,C.,,Palo Alto,CA:Stanford University Press,1998.

46.Gola P.,Schomerus,R.& Klug,C., Beck,2010.

47.Gushee D.P.,,Grand Rapids,Michigan:William B.Eerdmans Publishing,2013.

48.Ingo V.,Benjamin M.C.,,Cambridge,MA:MIT Press,2000.

49.J.R.Pennock & J.W.Chapman,,New York:Atherton Press,1971.

50.Jay R.,Clarke J.,,Cambridgeshire:IT Governance Publishing,2010.

51.Lane,Julia,et al., Cambridge,UK:Cambridge University Press,2014.

52.Lee Wilkins and Clifford G.Christians,,New York:Routledge,2009.

53.Livingstone,S., London,UK:Sage,2002.

54.Low R.,,London:Allen & Unwin,1949.

55.Mayer-Sch?nberger V.,Cukier K.,Houghton Mifflin Harcourt,2013.

56.Mohanty,Hrushikesha,Prachet Bhuyanand Deepak Chenthati,,Springer,2015,Vol.11.

57.National Research Council,,Washington D.C.:National Academies Press,2013.

58.Nissenbaum,H.,,Palo Alto,CA:Stanford University Press,2009.

59.Palfrey J.and Gasser U.,,New York,NY:Basic Books,2013.

60.Photopoulos C.,,Rockland,MA:Syngress,2011.

61.RosemaryTobin,StevenPenk, Wellington:Brookers Ltd.,2010.

62.S.J.Ward & H.Wasserman, London,UK:Routledge,2010.

63.Schneider D., Springer Berlin Heidelberg,2012.

64.Serge G.,Ronald L.et al.,,Netherlands:Springer Netherlands,2013.

65.Shetty Kavitha,Singapore:Stamford Press Pte.Ltd.,2002.

66.Solove,D.J., New York,NY:New York University Press,2004.

67.Strauss,William;Howe,Neil,,New York:Harper Perennial,1991.

68.Sumner S.,,Syngress,2015.

69.Trepte S.,Reinecke L.,,Berlin:Springer-Verlag,2011.

70.Turow,Joseph,New Haven:Yale University Press,2012.

71.Ward,S.J.,,Kingston,Ontario:McGill-Queen's Press-MQUP,2010.

72.William A.Babcock,William H.Freivogel,,London,UK:SAGE Publications,Inc,2015.

73.Zhang,H.,et al.,,Motorola,2008.

74.Zikopoulos,P.C.,et al.,,New York:McGrawHill,2012.

1.白净、 赵莲:《中美儿童网络隐私保护研究》,《新闻界》2014 年第4期。

2.鲍勇剑:《为什么小数据更重要?》,《第一财经日报》2014年1月17日。

3.陈昌凤、虞鑫:《大数据时代的个人隐私保护问题》,《新闻与写作》 2014年第6期。

4.高锡荣、 杨康:《网络隐私保护行为:概念、分类及其影响因素》,《重庆邮电大学学报》(社会科学版)2012年第4期。

5.郭明珠、魏来、魏佳珅:《个性化信息服务中用户隐私保护对策探究》,《图书馆学研究》2010 年第8期。

6.黄辉:《网络隐私权对传统隐私权的若干突破》,《贵州大学学报》2007年第9期。

7.黄荣怀、王晓晨、周颖等:《数字一代学生网络生活方式研究》,《电化教育研究》2014年第1期。

8.黄升民、 刘珊:《“大数据”背景下营销体系的解构与重构》,《现代传播》2011年第11期。

9.李广建、 杨林:《大数据视角下的情报研究与经济社会发展的重大战略领域——大数据的研究现状与科学思考》,《图书与情报》2012年第6期。

10.李国杰、 程学旗:《大数据研究:未来科技及经济社会发展的重大战略领域——大数据的研究现状与科学思考》,《中国科学院院刊》 2012年第6期。

11.李娜:《“棱镜门”暴露大数据时代隐私危机》,《科技导报》2013年第18期。

12.陆高峰:《大数据时代的公众隐私》,《青年记者》2013年第19期。

13.陆珏、薛卿:《“小数据”构建个人健康自画像》,《姑苏晚报》2014年4月21日。

14.路宗远:《价值与隐私:双面大数据》,《互联网周刊》2013年第13期。

15.马晓旭:《欧盟信息保护立法与美国域外取证的冲突和启示》,《法律适用》2014年第3期。

16.孟小峰、 慈祥:《大数据管理:概念、技术与挑战》,《计算机研究与发展》2013年第1期。

17.闵应骅、李斐然:《大数据时代聊聊小数据》,《中国青年报》2014年4月16日。

18.闵应骅:《大数据与小数据以及西医与中医》,《科技导报》2014年第15期。

19.欧广远:《大数据时代金融隐私权保护制度体系建构研究》,《中共郑州市委党校学报》2013年第5期。

20.彭礼堂、饶传平:《网络隐私权的属性:从传统人格权到资讯自决权》,《法学评论》 2006年第1期。

21.邱子恒:《图书资讯分类架构在组织与呈现知识上之应用》,《图书资讯学刊》(台湾)2002年第17期。

22.申琦:《网络素养与网络隐私保护行为研究:以上海市大学生为研究对象》,《新闻大学》2014 年第5期。

23.申琦:《网络信息隐私关注与网络隐私保护行为研究:以上海市大学生为研究对象》,《国际新闻界》 2013 年第2期。

24.申琦:《自我表露与社交网络隐私保护行为研究》,《新闻与传播研究》 2015 年第4期。

25.苏娅:《〈大数据〉作者:做大数据要从小数据做起》,《第一财经日报》2012年11月21日。

26.王全弟、赵丽梅:《论网络隐私权的法律保护》,《复旦学报》(社会科学版)2002年第1期。

27.王文超、石海明、曾华锋:《刍议大数据时代的国家信息安全》,《国防科技》2013年第2期。

28.徐琦:《大数据时代美国隐私保护之困》,《中国传媒科技》2013年第17期。

29.薛孚、陈红兵:《大数据隐私伦理问题探究》,《自然辩证法研究》 2015年第2期。

30.严炜、 邹盼:《面向大数据技术的隐私困境思考》,《江汉论坛》2016年第8期。

31.严瑜:《欧洲为何连遭恐怖袭击》,《人民日报》(海外版)2016年6月7日。

32.张军、 熊枫:《网络隐私保护技术综述》,《计算机应用研究》 2005年第7期。

33.赵华明:《论网络隐私权的法律保护》,《北京大学学报》 2002年专刊。

1.“Generation Gap = Gap in Online Privacy Perceptions? The Case for Singaporean Youths and Their Parents”,International Communication Association,2011.

2.Agarwal,S.,et al.,“Building Rome in a Day”,Communications of the ACM,54:10,2011.

3.Ashworth L.,Free C.,“Marketing Dataveillance and Digital Privacy:Using Theories of Justice to Understand Consumers Online Privacy Concerns”, 2006,67(2).

4.Backstrom,Lars,et al.,“Find Me if You Can:Improving Geographic Prediction with Social and Spatial Proximity”,Proceedings of the 19th International Conference on World Wide Web,2010.

5.Barité M.G.,“The Notion of Category:Its Implications in Subject Analysis and in the Construction and Evaluation of Indexing Languages”, 2000,27(1-2).

6.Barnes S.B.,“A Privacy Paradox:Social Networking in the United States”,,2006,11(9).

7.Billitteri,Thomas J.,et al.,“Social Media Explosion:Do Social Networking Sites Threaten Privacy Rights?”,,2013,23.

8.Bizer C.,et al.,“The Meaningful Use of Big Data:Four Perspectives—Four Challenges”,,2012,40(4).

9.Borgesius,F.J.,Van Eechoud,M.& Gray,J.,“Open Data,Privacy,and Fair Information Principles:Towards a Balancing Framework”,,2015(30).

10.Brown W.,“Reproductive Freedom and the Right to Privacy:A Paradox for Feminists”,Families,Politics,and Public Policy:A Feminist Dialogue on Women and the State,1983.

11.Buchanan T.,Paine C.,Joinson A.N.,et al.,“Development of Measures of Online Privacy Concern and Protection for Use on the Internet”, 2007,58(2).

12.Bughin J.,Chui M.,Manyika Clouds,“Big Data,and Smart Asserts:Ten Tech-enabled Business Trends to Watch”, 2010,56.

13.Butler E.,McCann E.,Thomas J.,“Privacy Setting Awareness on Facebook and Its Effect on User-Posted Content”,,2011,14(1).

14.Buxton B.,et al.,“Big Data:The Next Google,Interview by Duncan Graham-Rowe”,2008,455(7209).

15.Cai X.,Gantz W.,Schwartz N.,et al.,“Children's Website Adherence to the Facts Online Privacy Protection Rule”,,2003,31(4).

16.Cate FH,Cullen P.and Mayer-Schonberger,V.,“Data Protection Principles for the 21st Century:Revising the 1980 OECD Guidelines”,Microsoft Corporation,2013.

17.Catlett,Jenna,“An Analysis of Female University Students'Communicative Management of Privacy Online via Facebook”,National Communication Association,2007.

18.Cavoukian A.,“Privacy by Design:The 7 Foundational Principles”,Information and Privacy Commissioner of Ontario,2011.

19.Chen M.,Mao S.,Liu Y.,“Big Data:A Survey”,,2014,19(2).

20.Choi,E.K.,Padgett,B.C.,Fowler,D.& Goh,B.,“Applying the Theory of Planned Behavior to Chinese Millennials' Purchase Behavior on Foreign Fast Food Restaurants”,Poster Session,2011.

21.Cook V.,“Chinese Millennials Perceptions of Credibility toward Traditional and Social Media”,The Johns Hopkins University,2013.

22.Culnan M.J.,“Protecting Privacy Online:Is Self-Regulation Working?”, 2000,19(1).

23.Debatin B.,Lovejoy J.P.,Horn,Ann-Kathrin,et al.,“Facebook and Online Privacy:Attitudes,Behaviors,and Unintended Consequences”,2009,15(1).

24.Dendrou Calliope A.,Bell John I.,Fugger Lars,“Weighing in on Autoimmune Disease:Big Data Trip the Scale”,,2013,19(2).

25.Doehring C.,Clarke A.,Pargament KI.,Hayes A.,Hammer D.,Nickolas M.and Hughes P.,“Perceiving Sacredness in Life:Correlates and Predictors”, 2009,31(1).

26.E.Butler,E.McCann,J.Thomas.Privacy Setting Awareness on Facebook and Its Effect on User-posted Content”,Human Communication,2011,14(1).

27.Edwards L.,Harbinja E.,“Protecting Post-Mortem Privacy:Reconsidering the Privacy Interests of the Deceased in a Digital World”,2013,32(1).

28.Etzioni,A.,“A Cyber Age Privacy Doctrine:More Coherent,Less Subjective,and Operational”, 2015,80(4).

29.European Commission,“Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data”,1995 O.J.(L 281)31.Art.8(1),Official Journal of European Communities,1995,281(31).

30.Federal Trade Commission,“Android Flashlight App Developer Settles FTC Charges It Deceived Consumers”,Press Release,December 5,2013.

31.Federal Trade Commission,“How to Protect Kids' Privacy Online:A Guide for Teachers”,Washington,D.C.,2000.

32.Federal Trade Commission,“Privacy Online:A Report to Congress”,Washington,D.C,June,1998.

33.George R.Milne,Mary J.Culnan,Henry Greene,“A Longitudinal Assessment of Online Privacy Notice Readability”, 2006,25(2).

34.Gilles Ghesquiere,“The Absence Of Clear Value Chain Positioning Preempts:The Required Cooperation among The American Online Industry Players”,,1989,6(10).

35.Gorman M.,“Privacy in the Digital Environment——Issues for Libraries”,Access to Information,2001.

36.Hannah Ball,Melissa B.,Wanzer,Timothy J.,Servoss,“Parent-Child Communication on Facebook:Family Communication Patterns and Young Adults' Decisions to ‘Friend’ Parents”,,2013,61(5).

37.Hashem I.A.T.,Yaqoob I.,Anuar N.B.,et al.,“The Rise of‘Big Data’on Cloud Computing:Review and Open Research Issues”, 2015,47.

38.Holland H.B.,“Privacy Paradox 2.0”,Widener L.J.,2009,19.

39.Hsu,Chiung-Wen,“Possibility and Impossibility for Global Online Privacy:A Cross-Country Examination”,International Communication Association,2004.

40.Jia H.,Xu H.,“Interpersonal Privacy Nudges for Promoting Privacy Protective Behaviors on Social Network Sites”,The International Workshop on Privacy Preserving Information Retrieval(PIR),2015.

41.Kim Bartel Sheehan Ph.D.,Timothy W.,Gleason Ph.D.,“Online Privacy:Internet Advertising Practitioners' Knowledge and Practices”,,2001,23(1).

42.Kim Bartel Sheehan,Timothy W.,Gleason,“Online Privacy:Internet Advertising Practitioners' Knowledge and Practices”,2001,23(1).

43.Klein R.J.,“Film Censorship:The American and British Experience”, 1966,12.

44.Kwasnik B.H.,“The Role of Classification Structures in Reflecting and Building Theory”, 1992,3(1):63-82.doi:10.7152/acro.v3i1.12597.

45.Ladley John,“Data Governance:How to Design,Deploy and Sustain an Effective Data Governance Program”,Morgan Kaufmann,2012.

46.Lam,J.,et al.,“Urban Scene Extraction from Mobile Ground Based Lidar Data”,Proceedings of 3DPVT,2010.

47.Larose R.,Rifon N.J.,“Promoting I-Safety:Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior”,,2007,41(1).

48.Ledbetter A.,Heiss S.,Sibal K.,et al.,“Parental Privacy Invasions and Children's Defensive Behaviors at Home and Away at College:Mediated Communication and Boundary Management”,National Communication Association,2009.

49.Lipton J.D.,“Digital Multi-Media and the Limits of Privacy Law”,,2010(42).

50.Livingstone S.,“Children's Use of the Internet:Reflections on the Emerging Research Agenda”,,2003,5(2).

51.Lohr Steve,“The Age of Big Data”,,2012-11-01.

52.Machanavajjhala A.,Reiter J.P.,“Big Privacy:Protecting Confidentiality in Big Data”, 2012,19(1).

53.Manyika J.,Chui M.,“Big Data:The Next Frontier for Innovation,Competition and Productivity”,McKinsey Global Institute,2012.

54.Manyika J.,Chui M.,Brown B.,et al.,“Big Data:The Next Frontier for Innovation,Competition,and Productivity”,,2011.

55.McClennan J.,Schick V.O.,“Privacy-Canada's Importance in the Development of the International Data Privacy Regime”, 2006,38.

56.Metzger M.J.,Docter S.,“Public Opinion and Policy Initiatives for Online Privacy Protection”,2003,47(3).

57.Miller H.Gibert,Mork Peter,“From Data to Decisions:A Value Chain for Big Data”, 2013,15(1).

58.Milne,G.R.,Rohm,A.J.& Bahl,S.,“Consumers' Protection of Online Privacy and Identity”,,2004,38(2).

59.Miyazaki A.D.,Stanaland A.J.S.,Lwin M.O.,“Self-Regulatory Safeguards and the Online Privacy of Preteen Children:Implications for the Advertising Industry”, 2009,38(4).

60.Montgomery K.,“Youth and Digital Media:A Policy Research Agenda”, 2000,27(2).

61.Moor J.H.,“The Ethics of Privacy Protection”,1990,39(1-2).

62.Navarro-Arriba,G.and V.Torra.,“Information Fusion in Data Privacy:A Survey”,,2012(13).

63.Noam E.M.,“Privacy and Self-Regulation:Markets for Electronic Privacy”,Privacy and Self-Regulation in the Information Age,1997.

64.Norberg P.A.,Horne D.R.,Horne D.A.,“The Privacy Paradox:Personal Information Disclosure Intentions versus Behaviors”,,2007,41(1).

65.Ojanen T.,“Privacy Is More than Just a Seven-Letter Word:The Court of Justice of the European Union Sets Constitutional Limits on Mass Surveillance:Court of Justice of the European Union Decision of 8 April 2014 in Joined Cases C-293/12 and C-594/12,Digital Rights Ireland and Seitlinger and Others”, 2014,10(3).

66.Petronio S.,“Brief Status Report on Communication Privacy Management Theory”,,2013,13(1).

67.Pollach,Irene,“A Typology of Communicative Strategies in Online Privacy Policies:Ethics,Power and Informed Consent”, 2005,62(3).

68.Polonetsky J.,Tene O.,“Privacy and Big Data:Making Ends Meet”,2013,66.

69.Quinn K.,“An Ecological Approach to Privacy:‘Doing' Online Privacy at Midlife”, 2014,58(4).

70.Raymond Hsieh,et al.,“Online Privacy and Security:The Discrepancy between Online Policies and Consumer Perceptions”,International Communication Association,2004.

71.Ribak R.,Turow J.,“Internet Power and Social Context:A Globalization Approach to Web Privacy Concerns”, 2003,47(3).

72.Rosen,J.,“The Right to Be Forgotten”,,2012,64(88).

73.Rubinstein I.,“Big Data:The End of Privacy or a New Beginning?”,,2013(74).

74.Ryan Lange,Cliff Lampe,“Feeding the Privacy Debate:An Examination of Facebook”,International Communication Association,2008.

75.Sabine Trepte,Leonard Reinecke,“Social Network Site Use and Self-Disclosure Online:A Model of Reciprocal Influences”,International Communication Association,2011.

76.Samatas M.,“The Privacy Paradox”,Second Internal iTrust Workshop on Trust Management in Dynamic Open Systems,2002.

77.Samuel D.,Warren,Louis D.Brandeis,“The Right to Privacy”,,1890,4(5).

78.Satija M.P.,“Classification:Some Fundamentals,Some Myths,Some Realities”,,1998,25(1-2).

79.Satija M.P.,“Library Classification:An Essay in Terminology”,2000,27(4).

80.Sheehan K.B.,Hoy M.G.,“Dimensions of Privacy Concern among Online Consumers”,,2000,19(1).

81.Sheehan K.B.,Hoy M.G.,“Flaming,Complaining,Abstaining:How Online Users Respond to Privacy Concerns”,,1999,28.

82.Shimanek A.E.,“Do You Want Milk with Those Cookies:Complying with the Safe Harbor Privacy Principles”,,2000,26.

83.Simmons C.,“Protecting Children While Silencing Them:The Children's Online Privacy Protection Act and Children's Free Speech Rights”, 2007,12(2).

84.Sisk E.P.,“Technical Difficulties:Protecting Privacy Rights in the Digital Age”, 2016,42.

85.Solove D.J.,“I'v Got Nothing to Hide and Other Misunderstandings of Privacy”,,2007,44.

86.Solove,D.J.,“A Taxonomy of Privacy”,,2006.

87.Szongott C.,Henne B.,von Voigt G.,“Big Data Privacy Issues in Public Social Media”,Digital Ecosystems Technologies(DEST),2012 6th IEEE International Conference on IEEE,2012.

88.Taddicken M.,“The ‘Privacy Paradox’ in the Social Web:The Impact of Privacy Concerns,Individual Characteristics,and the Perceived Social Relevance on Different Forms of Self-disclosure”,,2013,19(2).

89.Tene O.,Polonetsky J.,“Big Data for All:Privacy and User Control in the Age of Analytics”,Northwestern Journal of Technology and Intellectual Property,2013(11).

90.Tene O.,Polonetsky J.,“Privacy in the Age of Big Data:A Time for Big Decisions”,,2012,64.

91.Tene,O.,“Privacy:The New Generations”,2011,1(1).

92.Thill,Brent and Nicole Hayashi,“Big Data = Big Disruption:One of the Most Transformative IT Trends Over the Next Decade”,UBS Securities LLC,October 2013.

93.Tinati Ramine,et al.,“Exploring the Impact of Adopting Open Data in the UK Government”,Digital Futures,2012.

94.Tsesis A.,“Right to Erasure:Privacy,Data Brokers,and the Indefinite Retention of Data”,2014,(49).

95.Turow J.,Hennessy M.,“Internet Privacy and Institutional Trust:Insights from a National Survey”,,2007,9.

96.Turow J.,“Family Boundaries,Commercialism,and the Internet:A Framework for Research”, 2001,22(1).

97.Unified Theory of Information Research Group,“Persona Rights for User-Generated Content:A Normative Framework for Privacy and Intellectual Property Regulation”,,2012,10(1).

98.Utz S.,Kramer N.,“The Privacy Paradox on Social Network Sites Revisited:The Role of Individual Characteristics and Group Norms”,,2009,3(2).

99.Volokh E.,“Freedom of Speech and Information Privacy:The Troubling Implications of a Right to Stop People from Speaking about You”,,2000.

100.Wang Y.,Leon P.G.,Chen X.,et al.,“From Facebook Regrets to Facebook Privacy Nudges”,,2013,74.

101.Wang Y.,Leon P.G.,Scott K.,et al.,“Privacy Nudges for Social Media:An Exploratory Facebook Study”,Proceedings of the 22nd International Conference on World Wide Web,ACM,2013.

102.Ward J.S.,Barker A.,“Undefined by Data:A Survey of Big Data Definitions”,arXiv preprint arXiv:1309.5821,2013.

103.Weiss N.E.,Miller R.S.,“The Target and Other Financial Data Breaches:Frequently Asked Questions”,Congressional Research Service,Prepared for Members and Committees of Congress,February 4,2015.

104.Xiaomei Cai,“Advertisements and Privacy:Comparing For-Profit and Non-Profit Web Sites for Children”,2008,25(1).

105.Yao M.Z.,Dg.L.,“Predicting Self-Protections of Online Privacy”, 2008,11(5).

106.Zizi Papacharissi,Jan Fernback,“Online Privacy and Consumer Protection:An Analysis of Portal Privacy Statements”,,2005,49(3).

107.Zuiderveen Borgesius,F.J.,Van Eechoud,M.& Gray,J.,“Open Data,Privacy,and Fair Information Principles:Towards a Balancing Framework”,,2015,30.

1.《腾讯QQ群数据遭泄露 涉及12亿QQ号个人隐私可秒查》,经济观察网,http://www.eeo.com.cn/2013/1122/252432.shtml。

2.《乌云曝出携程支付日志漏洞 大量用户银行卡信息或会被泄露》,财经网,http://tech.caijing.com.cn/2014-03-22/114032005.html?ep=ACbXFwA2Q%2C1642088277%2CACbXFwA2Q%2C1642088277。

3.《支付宝被指泄露客户信息 官方称为论坛公开信息》,中国新闻网,http://www.chinanews.com/it/2013/03-28/4683584.shtml。

4.《中国电信再曝重大漏洞 可查上亿用户信息》,每经网,http://www.nbd.com.cn/articles/2015-10-30/957606.html。

5.《2015年中国网站安全报告》,360网,http://zt.360.cn/1101061855.php?dtid=1101062368&did=1101536490。

6.陈荞:《45万京籍残疾人将领智能卡新卡保护残疾人隐私》,《京华时报》,http://epaper.jinghua.cn/html/2014-11/29/content_147572.htm。

7.《第二届世界互联网大会开幕式》,世界互联网大会官网,http://www.wicwuzhen.cn/system/2015/12/15/020953822.shtml。

8.鼎宏:《俄罗斯约会网站泄露2000万用户数据》,新浪网,http://tech.sina.com.cn/i/2015-01-26/doc-iawzunex9376035.shtml。

9.杜放、罗政:《新华视点:你的信用卡个人信息“只花5毛钱就能在网上买到”?》,新华网,http://news.xinhuanet.com/fortune/2015-01/11/c_1113952292.htm。

10.高梦蝶:《智联被曝漏洞 致86万用户简历信息泄露》,央广网,http://china.cnr.cn/xwwgf/201412/t20141203_516969592.shtml。

11.高语阳:《侵犯公民个人信息270名“内鬼”落网:缴获非法获取信息290余亿条》,《北京青年报》 2016年9月26日。

12.韩莎莎:《美国第二大医疗保险公司遭黑客攻击 8000万用户资料受影响》,人民网,http://usa.people.com.cn/n/2015/0206/c241376-26519451.html。

13.互联网安全中心:《现代网络诈骗产业链分析报告》,http://zt.360.cn/1101061855.php?dtid=1101062366&did=1101477872。

14.黄琳惠:《最新报告称美国是垃圾邮件第一大国 中国排第三》,国际在线,http://news.ifeng.com/a/20140725/41314715_0.shtml?f=hao123。

15.加文:《加拿大实施最严厉打击垃圾邮件法》,新华网,http://news.xinhuanet.com/yzyd/culture/20140731/c_1111876839.htm。

16.蒋佩芳:《“1号店”90万用户信息500元叫卖》,每经网,http://www.nbd.com.cn/articles/2012-05-25/656191.html。

17.李丹丹:《网传大麦网600万用户信息泄露》,新京报,http://www. bjnews.com.cn/news/2015/08/27/375790.html。

18.李东华、邬林桦:《圆通百万客户信息被实时兜售 被疑有内鬼》,人民网,http://finance.people.com.cn/n/2013/1023/c1004-23295198.html。

19.李季:《贵阳论坛聚焦大数据时代专家:媒体应做驾驭者》,中国新闻网,http://www.chinanews.com/df/2013/07-20/5064686.shtml。

20.李铭:《摩根大通数据泄露影响8300万客户》,新华网,http://news.xinhuanet.com/fortune/2014-10/03/c_1112709411.htm。

21.吕寒伟、钱玲玲、洪恒亮:《5月17个残疾人被骗走近28万元 个人隐私信息遭彻底泄露》,厦门网,http://news.xmnn.cn/xmnn/2016/06/03/100050971.shtml。

22.马闯:《网曝12306用户数据遭泄露 专家建议尽快修改密码》,人民网,http://politics.people.com.cn/n/2014/1225/c70731-26277313.html。

23.马文佳、肖淼:《中国人寿个人信息泄露 80万份保单信息可上网任意查询》,中国广播网,http://china.cnr.cn/ygxw/201302/t20130227_512041969.shtml。

24.《影响中国的公共知识分子50人》,《南方人物周刊》,http://business.sohu.com/s2004/zhishifenzi50.shtml。

25.商西:《应对老龄化中国迎来关键五年》,《老年日报》,http://epaper.hljnews.cn/lnrb/20151207/163778.html。

26.沈婷婷:《预装软件不能删是想窃密?用户状告苹果手机经销商》,《羊城晚报》,http://news.ycwb.com/2014-07/16/content_7217216.htm。

27.石中玉:《越80后“黑客”窃两亿美国人信息获刑》,新华网,http://news.xinhuanet.com/world/2015-07/16/c_128027448.htm。

28.唐慧文:《特别报道:办公室“长眼”电邮IM谈话全暴露》,CNET科技资讯网,http://www.cnetnews.com.cn/2004/1103/150655.shtml。

29.王伶玲:《“锁住”用户隐私需多方协作》,《法制晚报》,http://www.fawan.com/Article/fw3czk/2015/01/09/094532271577.html。

30.王南:《美国有电影审查制度吗?》,美国之音,http://www.voachinese.com/a/movie-censorship-in-us-20100415-90964529/466168.html。

31.温红彦、王比学:《平安中国,打造人民幸福的港湾》,人民网,http://politics.people.com.cn/n/2013/0530/c1001-21666350.html。

32.信莲:《全球最大婚外情网站用户信息遭曝光 逾9成为男性》,《中国日报》,http://world.chinadaily.com.cn/2015-08/20/content_21659562.htm。

33.《徐才厚癌症恶化医治无效死亡》,新华网,http://news.xinhuanet.com/2015-03/16/c_1114645502.htm。

34.严洲:《小米用户资料遭泄露 信息安全望再获关注》,中国证券网,http://news.cnstock.com/news/sns_bwkx/201405/3021378.htm。

35.央视3·15:《招行被曝内部员工出售客户信息》,人民网,http://finance.people.com.cn/bank/GB/17409764.html。

36.杨烨:《数千万社保用户信息或遭泄露》,经济参考网,http://www.jjckb.cn/2015-04/22/c_134172937.htm。

37.杨志强、褚贤君:《盗取留学生QQ号专骗国内亲人钱》,《检察日报》,http://newspaper.jcrb.com/html/2014-05/26/content_159774.htm。

38.叶健、王原:《用户隐私“裸奔”谁之过?》,《中国文化报》,http://epaper.ccdy.cn/html/2014-05/23/content_126529.htm。

39.战钊:《如家、汉庭等大批酒店开房记录被曝遭泄露》,光明网,http://tech.gmw.cn/2013-10/10/content_9134005.htm。

40.张璐瑶:《粤网警好犀利 今年破刑案2万宗》,《羊城晚报》,http://news.ycwb.com/2015-10/22/content_20785673_2.htm。

41.张意轩、于洋:《2013被称为大数据元年:数据就是资源》,新浪网,http://news.sina.com.cn/m/2013-01-17/144526059083.shtml。

42.中国互联网络信息中心:《第35次中国互联网络发展状况统计报告》,http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/201502/P020150203551802054676.pdf。

43.中国互联网新闻研究中心:《互联网发展信息与动态》,http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/mtbg/201312/P020131219359905417826.pdf。

44.中国互联网新闻研究中心:《美国全球监听行动记录》,新华网,http://news.xinhuanet.com/2014-05/26/c_1110865223.htm。

45.周洪:《上海数十万条新生儿信息遭倒卖 卫生局:系外包数据公司所为》,中国广播网,http://native.cnr.cn/city/201208/t20120830_510792426.html。

46.周润健:《搜寻“好莱坞艳照”当心自己“私照”泄露》,新华网,http://news.xinhuanet.com/info/2014-09/03/c_133615931.htm。

47.邹伟、史竞男:《我国首次大规模集中打击侵害公民个人信息犯罪》,《检察日报》,http://newspaper.jcrb.com/html/2012-04/25/content_97881.htm。

1.Agentur Esturias,“Update-Bundesdatenschutzgesetz”,Update-bdsg.com,2016-02-03,http://www.update-bdsg.com/.

2.Alec Christie,et al.,“New Zealand:Data Protection Laws of the World Handbook:Second Edition”,Mondaq.com,2013-04-11,http://www.mondaq.com/NewZealand/x/231560/data+protection/Data+Protection+Laws+of+the+World+Handbook+Second+Edition+New+Zealand.

3.Alec Christie,“Data Protection in Australia:Overview”,Practicallaw.com,2014-07-01,http://uk.practicallaw.com/8-519-8539#a906232.

4.Alyssa Newcomb,“Toy Maker VTech Suffers Security Breach:What You Need to Know”,ABC News,2015-12-01,http://abcnews.go.com/Technology/toy-maker-vtech-suffers-security-breach/story?id=35512412.

5.Andy Greenberg,“Hack Brief:Hackers Steal 15M T-Mobile Customers' Data from Experian”,Wired.com,2015-10-01,http://www.wired.com/2015/10/hack-brief-hackers-steal-15m-t-mobile-customers-data-experian/.

6.Bae,Kim and Lee L.L.C.,“Data Protection Laws of the World:South Korea”,Dlapiperdataprotection.com,2016-01-27.

7.“Basic Law of 21 December 1867 on the General Rights of Nationals in the Kingdoms and L?nder Represented in the Council of the Realm”,https://www.ris.bka.gv.at/Dokumente/Erv/ERV_1867_142/ERV_1867_142.pdf.

8.BBFC,“BBFC Classification Guidelines 2014”,http://www.bbfc.co.uk/sites/default/files/attachments/BBFC%20Classification%20Guidelines%202014.pdf.

9.Belinda Tang,“Data Protection Laws of the World:China”,Dlapiperdataprotection.com,2016-02-29.

10.Bill Marczak,Claudio Guarnieri,et al.,“Mapping Hacking Team's ‘Untraceable’ Spyware”,Citizenlab.org,https://citizenlab.org/wp-content/uploads/2015/03/Mapping-Hacking-Team%E2%80%99s-_Untraceable_-Spyware.pdf.

11.Bruce Horovitz,“After Gen X,Millennials,What Should Next Generation Be?”,Usatoday.com,http://usatoday30.usatoday.com/money/advertising/story/2012-05-03/naming-the-next-generation/54737518/1.

12.Candid Wueest,“Underground Black Market:Thriving Trade in Stolen Data,Malware,and Attack Services”,Symantec.com,2015-11-20,http://www.symantec.com/connect/blogs/underground-black-market-thriving-trade-stolen-data-malware-and-attack-services.

13.Center for Democracy and Technology,“Fourteen Ways to Protect Your Privacy Online”,Cdt.org,2009-10-27,https://cdt.org/insight/cdts-guide-to-online-privacy-tips/.

14.Christina Beck,“Why Are Millennials Forgoing Driving?”,The Christian Science Monitor,http://www.csmonitor.com/USA/USA-Update/2016/0120/Why-are-Millennials-forgoing-driving.

15.Christine Carron,“Canada Amends Federal Data Protection Law,PIPEDA”,Dataprotectionreport.com,http://www.dataprotectionreport.com/2015/06/canada-amends-federal-data-protection-law-pipeda/.

16.Citizen Lab,“Planet Blue Coat:Mapping Global Censorship and Surveillance Tools”,Citizenlab,2013-01-15,Retrieved from https://citizenlab.org/2013/01/planet-blue-coat-mapping-global-censorship-and-surveillance-tools/.

17.Commission Nationale Informatique et Libertés,“ACT N°78-17”,CNIL.com,http://www.cnil.fr/english/data-protection/official-texts/.

18.Cordova-Moyano et al.,“Data Protection Laws of the World:Argentina”,Dlapiperdataprotection.com,2015-01-24.

19.David Kaye,“Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression”,Ohchr.org,2015-05-22,https://view.officeapps.live.com/op/view.aspx?src=http%3A%2F%2Fwww.ohchr.org%2FEN%2FHRBodies%2FHRC%2FRegular Sessions%2FSession29%2FDocuments%2FA.HRC.29.32_AEV.doc.

20.Dlapiper,“Data Protection Laws of the World”,Dlapiperdataprotection.com,2016-03-23.https://www.dlapiperdataprotection.com/index.html#handbook/world-map-section.

21.Erica Wiking H?ger,“Data Protection in Sweden:Overview”,Practicallaw.com,2015-06-01,http://uk.practicallaw.com/8-502-0348#a571787.

22.Estudio Beccar Varela,et al.,“Data Protection in Argentina:Overview”,Practicallaw.com,2015-11-01,http://uk.practicallaw.com/3-586-5566#a372765.

23.European Commisssion,“Reform of EU Data Protection Rules”,europa.eu,2016-02-08,http://ec.europa.eu/justice/data-protection/reform/index_en.htm.

24.European Union,“Council Regulation(EC)No 428/2009”,Official Journal of the European Union,2009-05-29.http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF.

25.Executive Office of the President,“Big Data:Seizing Opportunities,Preserving Values”,Whitehouse.com,May 2014.

26.Fabio Pereira,Valdir De Oliveira Rocha Filho,“Public Consultations for The Regulation of The Brazilian Internet Law(Marco Civil Da Internet)and for the Approval of the Data Protection Bill of Law”,Mondaq.com,2015-02-17,http://www.mondaq.com/brazil/x/375210/Data+Protection+Privacy/Public+Consultations+For+The+Regulation+Of+The+Brazilian+Internet+Law+Marco+Civil+Da+Internet+And+For+The+Approval+Of+The+Data+Protection+Bill+Of+Law.

27.“Federal Act concerning the Protection of Personal Data(DSG 2000)”,https://www.ris.bka.gv.at/Dokumente/Erv/ERV_1999_1_165/ERV_1999_1_165.pdf.

28.Federal Trade Commission,“FTC Staff Revises Online Behavioral Advertising Principles”,Press Release,February 12,2009,http://www.ftc.gov/news-events/press-releases/2009/02/ftc-staff-revises-online-behavioral-advertising-principles.

29.Federal Trade Union,“Children's Online Privacy Protection Rule(‘COPPA’)”,Ftc.gov,2000-04-21,https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule.

30.Gunnar Rensfeldt,“FRA Part of Top-Secret Hacker Project”,Uppdrag Granskning,11 December 2013,http://www.svt.se/ug/fra-part-of-top-secret-hacker-project.

31.Gunnar Rensfeldt,“NSA ‘Asking for’ Specific Exchanges from FRA-Secret Treaty since 1954”,Svt.se,2013-12-08.http://www.svt.se/ug/nsafra4.

32.Harris,Kamala D.,“California Data Breach Report”,February 2016,https://oag.ca.gov/sites/all/files/agweb/pdfs/dbr/2016-data-breach-report.pdf?.

33.Hunton & Williams,“Brazil Releases Draft Personal Data Protection Bill”,Iapp.org.https://iapp.org/resources/article/brazil-personal-data-protection-law-draft-bill/.

34.Hunton,Williams,“Big Data and Analytics:Seeking Foundations for Effective Privacy Guidance”,Centre for Information Policy Leadership,2013,https://www.hunton.com/files/Uploads/Documents/News_files/Big_Data_and_Analytics_February_2013.pdf.

35.Ieuan Jolly,“Data Protection in United States:Overview”,Practicallaw.com,2015-07-01.http://us.practicallaw.com/6-502-0467.

36.“International Principles on the Application of Human Rights to Communications Surveillance”,Necessaryandproportionate.org,2014-05-01,https://en.necessaryandproportionate.org/text.

37.Irina Raicu,“The Ethics of Online Privacy Protection”,https://www.scu.edu/ethics/privacy/the-ethics-of-online-privacy-protection/.

38.Jér?me Philippe,“Data Protection in France:Overview”,Practicallaw.com,http://uk.practicallaw.com/6-502-1481?service=crossborder#a481778.

39.Jim Halpert,et al.,“Data Protection Laws of the World:United States”,Dlapiperdataprotection.com,2016-03-07.

40.Jin Hwan Kim,et al.,“Data Protection in South Korea:Overview”,Practicallaw.com,2015-07-01,http://us.practicallaw.com/2-579-7926#a1008974.

41.Kamala D.,Harris,“California Data Breach Report”,Oag.ca.gov,2016-02,https://oag.ca.gov/breachreport2016.

42.Kevin Rector,“Study Finds ‘Millennials’ Shift away from Driving Is ‘More than Temporary’”,The Baltimore Sun,2016-09-14,http://www.baltimoresun.com/business/bs-md-millenials-driving-report-20141014-story.html.

43.Kim Zetter,“Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones”,2014-06-24,http://www.wired.com/2014/06/remote-control-system-phone-surveillance.

44.Kumaraguru P.,Cranor L.F.,“Privacy Indexes:A Survey of Westin's Studies”,Cs.cmu.edu,2005-12-01,http://www.cs.cmu.edu/~ponguru/CMU-ISRI-05-138.pdf.

45.Legifrance,“Code de la sécurité intérieure”,Legifrance.gouv.fr,2016-01-28,http://www.legifrance.gouv.fr/affichCode.do;jsessionid=1857B46A14522506630 D1138CFCFD600.tpdila13v_1?idSectionTA=LEGISCTA000025508253&cidTexte=LEGITEXT000025503132&dateTexte=20120618.

46.Legifrance,“JORF n°0294 du 19 décembre 2013 page 20570”,Legifrance.gouv.fr,2013-12-18,http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000028338825&categorieLien=id.

47.Library of Congress,“Online Privacy Law:Japan”,Loc.gov,2015-06-05,https://www.loc.gov/law/help/online-privacy-law/japan.php.

48.Lillian Ablon,Martin C.,Libicki & Andrea A.Golay,“Markets for Cybercrime Tools and Stolen Data”,Rand.org,2014-03-01,http://www.rand.org/pubs/research_reports/RR610.html.

49.Mangyo Kinoshita,Shino Asayama,et al.,“Data Protection in Japan:Overview”,Practicallaw.com,2014-11-01,http://uk.practicallaw.com/5-520-1289#.

50.Marissa Xiao Dong,“Data Protection in China:Overview”,Practicallaw.com,2015-08-01,http://uk.practicallaw.com/4-519-9017#a309553.

51.Martin Delgado,“Free Apps Used to Spy on Millions of Phones:Flashlight Program Can Be Used to Secretly Record Location of Phone and Content of Text Messages”,Daily Mail.com,2015-10-25,http://www.dailymail.co.uk/news/article-2808007/Free-apps-used-spy-millions-phones-Flashlight-program-used-secretly-record-location-phone-content-text-messages.html.

52.Michael Malloy,et al.,“Data Protection Laws of the World:Russia”,Dlapiperdataprotection.com,2016-01-27.

53.Mina Andreeva,Natasha Bertaud,“EU Approves New Zealand's Data Protection Standards in Step to Boost Trade”,Europa.eu,2012-12-19,http://europa.eu/rapid/press-release_IP-12-1403_en.htm.

54.Ministry of Economy,Trade and Industry,“Guidelines Targeting Economic and Industrial Sectors Pertaining to the Act on the Protection of Personal Information”,Meti.go.jp,2009-10-09,http://www.meti.go.jp/policy/it_policy/privacy/0910english.pdf.

55.Ministry of Internal Affairs and Telecommunications,“Written Warning Issued to NTT East concerning Leakage of Personal Information”,Soumu.go.jp,2004-08-31,http://www.soumu.go.jp/main_sosiki/joho_tsusin/eng/Releases/Telecommunications/news071220_4.html.

56.Ministry of Justice,“Privacy Act 1993”,Govt.nz,2016-02-16,http://www.justice.govt.nz/policy/constitutional-law-and-human-rights/human-rights/domestic-human-rights-protection/privacy-act-1993.

57.MIT,“Protecting Data”,Mit.edu,https://ist.mit.edu/security/protecting_data.

58.MPAA,“The Film Rating System”,Mpaa.org,http://www.mpaa.org/film-ratings/.

59.Murta Goyanes Advogados,et al.,“Data Protection Laws of the World:Brazil”,Mondaq.com,2012-03,http://www.lexology.com/library/detail.aspx?g=1a6e9e6c-affc-4e40-9270-7256ac9cf2a4.

60.Nicole Perlroth,David Gelles,“Russian Hackers Amass over a Billion Internet Passwords”,New York Times,2014-08-05,http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html.

61.OECD,“OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”,OECD.org,1980-09-23,http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtr ansborderflowsofpersonaldata.htm.

62.Office of the Privacy Commissioner of Canada,“Privacy Legislation in Canada”,Gc.ca,2014-05-15,https://www.priv.gc.ca/resource/fs-fi/02_05_d_15_e.asp.

63.Office of the Privacy Commissioner of Canada,“The Privacy Act”,Gc.ca,2013-03-21,https://www.priv.gc.ca/leg_c/leg_c_a_e.asp.

64.Oliver Hyams,Pupil Barrister,“The Right to Be Forgotten”,1Essex Court,2014-05-15,https://1essexcourt.wordpress.com/2014/05/15/the-right-to-be-forgotten/.

65.Pascal Le Segretain,“Nude Photos of Jennifer Lawrence Leak”,People.com,2014-08-31,http://www.people.com/article/jennifer-lawrence-nude-photos.

66.Personal Data Protection Commission,“Legislation and Guidelines:Overview”,https://www.pdpc.gov.sg/legislation-and-guidelines/overview.

67.Pew Research Center,“Trust and Privacy Online”,Pewinternet.org,2000-08-20,http://www.pewinternet.org/2000/08/20/main-report-28/.

68.PIX11 NEWS,“5 Scams Targeting College Students”,Pix11.com,2016-09-05,http://pix11.com/2016/09/05/5-scams-targeting-college-students/.

69.Polly Sprenger,“Sun on Privacy:‘Get Over It’”,Wired.com,1999-01-26,http://archive.wired.com/politics/law/news/1999/01/17538.

70.President's Council of Advisors on Science and Technology,“Big Data and Privacy:A Technological Perspective”,Whitehouse.com,May 2014.

71.Rocco Panetta,Adriano D'Ottavio,“Data Protection in Italy:Overview”,Practicallaw.com,2015-12-01,http://uk.practicallaw.com/9-502-4794?sd=plc#a296456.

72.Rohan Isaacs,“Data Protection in South Africa:Overview”,Practicallaw.com,2015-02-01,http://uk.practicallaw.com/5-503-0787?sd=plc.

73.Sanja Kelly,“Freedom on the Net 2014”,Freedomhouse.org,2014-12-04,https://www.freedomhouse.org/event/freedom-net-2014.

74.Scott M.Lewis,“The Data Black Market ... What is Your Data Really Worth?”,http://winningtech.com/publications/cked97Dl/the-data-black-market-br-what-is-your-data-really-worth-/.

75.Sergey Medvedev,“Data Protection in Russian Federation:Overview”,Practicallaw.com,http://uk.practicallaw.com/2-502-2227.

76.Simone Lahorgue Nunes,Tiago Soares de Aquino,“Data Protection in Brazil:Overview”,Practicallaw.com,http://uk.practicallaw.com/4-520-1732.

77.Steve Lohr,“Redrawing the Route to Online Privacy”,New York Times,2010-02-27,http://www.nytimes.com/2010/02/28/technology/internet/28unbox.html?_r=0.

78.Steve Ragan,“Database Configuration Issues Expose 191 Million Voter Records”,CSO.com,2015-12-28,http://www.csoonline.com/article/3018592/security/database-configuration-issues-expose-191-million-voter-records.html.

79.The Council of Economic Advisers,“15 Economic Facts about Millennials”,https://www.whitehouse.gov/sites/default/files/docs/millennials_report.pdf.

80.The Intelligence and Security Committee of Parliament,“Privacy and Security:A Modern and Transparent Legal Framework”,independent.gov.uk,2015-03-12,http://isc.independent.gov.uk/committee-reports/special-reports.

81.The Japanese Cabinet,“Act on the Protection of Personal Information Act No.57 of 2003”,Cas.go.jp,2003-05-23,http://www.cas.go.jp/jp/seisaku/hourei/data/APPI.pdf.

82.The Japanese Cabinet,“Cabinet Order for the Enforcement of the Act on the Protection of Personal Information(Japan)”,Worldlii.org,2003-12-10,http://www.worldlii.org/int/other/PrivLRes/2003/2.html.

83.The Law Library of Congress,“Online Privacy Law:Italy”,Loc.gov,2015-05-06,http://www.loc.gov/law/help/online-privacy-law/italy.php#_ftn8.

84.The Secretary of State,“The Privacy and Electronic Communications(EC Directive)(Amendment)Regulations 2015”,Legislation.gov.uk,http://www.legislation.gov.uk/all?title=Privacy.

85.The Senate,“The 2015 Intelligence Bil”,Senat.fr,2015-05-05,http://www.senat.fr/leg/pjl14-424.html.

86.U.S.PIRG Education Fund,“Millennials in Motion”,Uspirg.org,2014-10-14,http://www.uspirg.org/reports/usp/millennials-motion.

87.UK Politics,“Queen's Speech 2015:Bill-by-bill”,BBC.com,2015-05-27,http://www.bbc.com/news/uk-politics-32898443.

88.United Nations Human Rights Office of the High Commission,“Convention on the Rights of the Child”,http://www.ohchr.org/en/professionalinterest/pages/crc.aspx.

89.United Nations Human Rights Office of the High Commissioner,“Human Rights Committee,General Comment 16”,Ohchr.org,8 Feb.2016,http://tbinternet.ohchr.org/_layouts/treatybodyexternal/Download.aspx?symbolno=INT%2fCCPR%2fGEC%2f6624&Lang=en.

90.United Nations,“The Universal Declaration of Human Rights”,http://www.ohchr.org/EN/UDHR/Documents/UDHR_Translations/eng.pdf.

91.USC US-China Institute,“Video:Millennial Minds”,China.usc.edu,2015-04-10,http://china.usc.edu/video-millennialminds.

92.Von Dr.Datenschutz,“Begriff und Geschichte des Datenschutzes”,DatenschutzbeauftragterINFO.com,2014-05-28,https://www.datenschutzbeauftragter-info.de/begriff-und-geschichte-des-datenschutzes/.

93.Wendy J.Wagner,Christopher Oates,“Data Protection in Canada:Overview”,2015-11-01,http://uk.practicallaw.com/6-502-0556.

94.WHO,“Definition of an Older or Elderly Person”,http://www.who.int/healthinfo/survey/ageingdefnolder/en/.

95.Working Party,“Advice Paper on Special Categories of Data(‘Sensitive Data’)”,Ec.europe.eu,2011-04-20,http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2011/2011_04_20_letter_artwp_mme_le_bail_directive_9546ec_annex1_en.pdf.

96.Working Party,“Article 29 Data Protection Working Party”,ec.europa.eu.

97.Xinhua,“Britain to Grant Spies More Access to Citizens' Internet History”,English.news.cn,2015-11-05,http://news.xinhuanet.com/english/2015-11/05/c_134784259.htm.

简 介:本书探讨了数据经济的发展趋势及其风险特征,提出基于“价值-风险”的全面风险管理思想及其分析框架。在此基础上,采用田野调查和问卷调研相结合的研究方法,对部分代表性互联网企业进行了调查分析,提炼风险管理的核心要素并进行结构化分析,建立企业跨境数据流动全面评价指标体系并给出相应的计算方法。最后,从策略规划、机制设计和制度建设...

作者: 惠志斌
出版社:社会科学文献出版社
出版时间: 2018年10月