|
|
Path Selection of Data Security Governance from the Perspective of Overall National Security |
Li Xiaodong1, Dong Shaoping2, Wu Jing1 |
1. School of Grammar and Law,Yanshan University,Qinhuangdao 066000,China; 2. Zhongnan University of Economics and Law,Wuhan 430073,China |
|
|
Abstract Data security in the digital era has become an important aspect of the overall national security concept,but in data security governance,there are practical dilemmas with vagueness in the application of data sovereignty,dynamic scope of data security,multifaceted protection of digital human rights as the core,and theoretical dilemmas with the dispute between data security and data freedom as the core.It is necessary to find a new theoretical supply to solve the above dilemma.Combined with the theoretical guidance of the overall national security concept and the theoretical strain in the digital field,the third path of data security governance can be formed.Taking the overall national security concept as the basic guide,the basic principles of data security governance are condensed,which are based on security practice,overall governance mode and people's security value goal.“Node theory”“data life cycle theory”and“synergy theory”,on the basis of inheriting basic principles,can systematically solve the problems of“by whom to govern”“what to govern”and“how to govern”in digital security governance,and finally build the third path of data security governance.
|
Received: 17 April 2023
|
|
|
|
|
[1]冯硕.TikTok被禁中的数据博弈与法律回应[J].东方法学,2021 (1):74-89. [2]宋瑞娟.大数据时代我国网络安全治理:特征、挑战及应对[J].中州学刊,2021 (11):162-167. [3]蔡士林.我国数据安全法益保护:域外经验与立法路径[J].深圳大学学报 (人文社会科学版),2022,39 (6):97-106. [4]申卫星.让数据共享在信息社会中发挥积极作用[N].社会科学报,2021-11-18 (1). [5]许可.数据主权视野中的CLOUD法案[J].中国信息安全,2018 (4):40-42. [6]劳伦斯·莱斯格.思想的未来[M].李旭,译.北京:中信出版社,2004:23. [7]翟志勇.数据安全法的体系定位[J].苏州大学学报 (哲学社会科学版),2021,42 (1):73-83. [8]劳伦斯·莱斯格.代码2.0:网络空间中的法律[M].李旭,沈伟伟,译.北京:清华大学出版社,2009:6. [9]王锡锌.个人信息国家保护义务及展开[J].中国法学,2021 (1):145-166. [10]SCHMITTED M.Tallinn manual 2.0 on the international law applicable to cyber operations[M].Cambridge:Cambridge University Press,2017:69. [11]约翰·巴洛.网络独立宣言[M].李旭,李小武,译.北京:清华大学出版社,2004:98. [12]马长山.智慧社会背景下的“第四代人权”及其保障[J].中国法学,2019 (5):5-24. [13]郑戈.人工智能与法律的未来[J].探索与争鸣,2017 (10):78-84. [14]刘志强.论“数字人权”不构成第四代人权[J].法学研究,2021,43 (1):20-34. [15]HARTMANN S.Russia-measures concerning traffic in transit (WTO)[J].International legal materials,2019,58 (5):899-1027. [16]许可.数据安全法:定位、立场与制度构造[J].经贸法律评论,2019 (3):52-66. [17]洪延青.推进“一带一路”数据跨境流动的中国方案:以美欧范式为背景的展开[J].中国法律评论,2021 (2):30-42. [18]焦俊峰,李晓东.大数据时代个人信息保护的治理体系研究:基于技术信任和专家系统的二分框架[J].电子政务,2022 (12):35-45. [19]中共中央宣传部.习近平新时代中国特色社会主义思想学习纲要[M].北京:学习出版社,人民出版社,2019:178. [20]徐惠,李晓东.大数据证据之证据属性证成研究[J].中国人民公安大学学报 (社会科学版),2020,36 (1):47-57. |
|
|
|