Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • 2018, Vol. 44, No. 6 Published:15 June 2018 Next Issue
    • Thinking of data management on base of trends of the times
    • FANG Yu, LIU Shan
    • Information and Communications Technology and Policy. 2018, 44(6): 1-4.
    • Abstract ( 213 )   
    • Data management is a problem that arises with the development of technology. In the designing of rules, it is necessary to consider the factors of various aspects and enable multiple subjects to participate. The digital economy is leading the new momentum of China's economy, data ownership, personal information protection and other issues have brought challenges to data management. The problem of data ownership involves the basic civil rights system, and it will take time to polish it. The problem of personal information protection has experienced the vicissitude of several periods, the connotation and the essence have changed correspondingly. A whole design should be planned under the time background to solve the proposition of data management, to respond to balance the relationship between security and development, to protect information security,and to promote industrial development and protection of rights and interests of the user’srequest.
    • Related Articles | Related Articles | Metrics
    • Preliminary thinking on the problems related to artificial intelligence governance
    • LUN Yi
    • Information and Communications Technology and Policy. 2018, 44(6): 5-9.
    • Abstract ( 197 )   
    • With the development of Artificial Intelligence, the influence on economy and society also comes. Artificial intelligence,Internet and other technologies are similar but different.The most obvious difference lies in the difficulties to predict and explain the results,which could lead to greater social governance issues,such as product definition and access, algorithm discrimination, product liability, privacy protection and so on.All these issues should be discussed and regulated in advance. At present, major countries have already noticed these issues and launched national strategies, reports or other measures, also have done things on the important applications of A rtificial intelligence, such as autonomous driving and other areas. In July 2017, China released“The New Generation of a development plan”, pointed out the importance of implementing law, ethics, privacy, international rules and other aspects to make AI have a better development. Considering the governance of Artificial Intelligence, the author suggests that regulators, enterprises and users should keep a cool head, focus on the governance problem just brought by Artificial Intelligence, stick to the technology development stage and route, and strengthen the assessment of economic and social impact, solve the most urgent obstacles in the development of the society eventually.

    • Related Articles | Related Articles | Metrics
    • Thevalue, constraints and countermeasures of Internet platform enterprises’ participation in social governance
    • HUANGJin, LI Naiqing
    • Information and Communications Technology and Policy. 2018, 44(6): 10-13.
    • Abstract ( 178 )   
    • In the information society, Internet platform enterprises have multiple advantages such as technology, data, and massive users. Their participation in social governance can effectively improve the modernization level of governance. At present, Internet platform enterprises have made initial explorations in social governance and have achieved some positive results.However, the lack of attention given by the government and enterprises, the imperfect information infrastructure, and unsound participation mechanisms have severely limited their functions.Therefore, the government urgently needs to innovate ideas and remove obstacles, and to create a good environment for Internet platform enterprises to participate in social governance.
    • Related Articles | Related Articles | Metrics
    • The problems existing in the development of shared bicycles and the treatment suggestions
    • LIU Guanghao, WANG Tiantian
    • Information and Communications Technology and Policy. 2018, 44(6): 14-18.
    • Abstract ( 430 )   
    • In the past year, shared bicycles have quickly gained popularity and penetration in large and medium-sized cities throughout the country with advantages such as low rental prices and free and convenient parking. It is undeniable that the emergence of shared bicycles has brought great convenience to people's short- distance travel and effectively alleviated the“last mile”transfer connection problem. However, problems such as over- distribution by enterprises and random disposal by users have been highlighted, and the phenomenon of“siege-ridden”bicycles has occurred from time to time, bringing new challenges to urban management. At the same time, with the closure of many shared bicycle companies, the deposit could not be returned to the users in a timely manner. The issue of deposit security again caused the society to question the sharing of bicycles. This article focuses on two issues in the process of development of shared bicycles that are over- discharged, disorderly parked, and deposit safe, and analyzes the deep- seated causes of the problems. Based on the actual experience of local supervision, the relevant policy recommendations are proposed.
    • Related Articles | Related Articles | Metrics
    • Theenlightenment to China of EUInternet governance
    • FUKai, CHENShiyang, JIANGYuze, GuoJiaying, GUOJiannan
    • Information and Communications Technology and Policy. 2018, 44(6): 19-22.
    • Abstract ( 178 )   
    • As the further development of the“Internet+”,the Internet has became the most concerning field of majority countries with integrating into the national critical fields such as politics, economy, culture and so on. While Internet making great contributions to economic development and social progress, the security problems should not be ignored as well. Especially, the new type of the cyber and information security problem which derived from the blending of the cyber security problem and traditional problems, such as fraud and terrorism are becoming more complex . To deal with above issues, this paper analyzes the development ofEUInternet governance, and proposessomepolicy suggestionsonChinese Internet governance .
    • Related Articles | Related Articles | Metrics
    • ResearchonChina’s personal information protection system in the Era of big data
    • YANGJie
    • Information and Communications Technology and Policy. 2018, 44(6): 23-27.
    • Abstract ( 145 )   
    • in response to the difficulties and challenges of personal information protection in the context of the era of big data, the global personal information protection legislation process has been rapidly advancing. With the rapid development of information technology, the drive of economic interests, and the combination of institutional internal factors and objective external factors, the phenomenon of infringement of citizens’personal information has become increasingly prominent. The situation of personal information protection in China is grave. This article starts from four aspects of legislation, government, business, and individuals, and suggests that China’s personal information protection system be involved in order to promote and improve personal information protection in China.
    • Related Articles | Related Articles | Metrics
    • A study on the defination of personal information
    • HE Bo
    • Information and Communications Technology and Policy. 2018, 44(6): 38-42.
    • Abstract ( 321 )   
    • The concept of personal information is the essential question in the legislation of personal information protection. There exist three basic theories for the defination of personal information, including identification, linkage as well as context. This article analyzes the legal practice both in domestic law and overseas legislations, and suggests to establish the concept of personal information on the basis of identification theory in the coming Chinese personal information preotection law.
    • Related Articles | Related Articles | Metrics
    • The interpretation and enlightenment of first connected toys infringement on children’s privacy case settled by US FTC
    • SHEN Da
    • Information and Communications Technology and Policy. 2018, 44(6): 54-57.
    • Abstract ( 280 )   
    • In early 2018, the US Federal Trade Commission (FTC) brought its first-ever children’s privacy case involving connected toys. The relevant practice of the US on the Children’s Online Privacy Protection has an important reference value to our country. This article has carried on the interpretation to this case, has mainly analyzed the case fact and the law rules involved in it, to obtain the enlightenment to our country through this law enforcement practice. On one hand, at the enterprise level, companies that conduct child-related businesses involving the US should exercise cautious compliance obligations. On the other hand, our government should learn from the experience of countries outside the territory, urgently establishing a unified and specialized personal information protection supervision institution, exploring and improving the data breach notification system and strengthening the protection of children’s online privacy.
    • Related Articles | Related Articles | Metrics
    • Enlightenments of Facebook data breach event
    • SUNCuifeng
    • Information and Communications Technology and Policy. 2018, 44(6): 58-61.
    • Abstract ( 144 )   
    • This paper introduced the Facebook data breach event happened on April 20, 2018. Then it described the newest development tendency of this event and the response of Facebook. After that, this paper analyzed the problems existed in Facebook about data privacy protection that led to this data breach event. On the basis of problems analysis, the paper gives the important enlightenments of this event from three aspects: to strengthen legal and industry self regulation, to improve user privacy protection standard and assess system, and to improve regulationmechanismand technology tools.
    • Related Articles | Related Articles | Metrics
    • Wireless router evaluation report
    • LUO Dan, HAO Ye, YUAN Binbin
    • Information and Communications Technology and Policy. 2018, 44(6): 79-83.
    • Abstract ( 199 )   
    • With the development of the mobile Internet, wireless routers have become more and more popular. Users are also paying more and more attention to the transmission speed and security of wireless routers. This article introduces tests of several models of common wireless routers on the market, and compares several features that users are more concerned about. Each type of device has its own characteristics. Users can choose the right device according to their own needs.
    • Related Articles | Related Articles | Metrics
    • Business modelanalysis and coping strategies of unlimited flow packages
    • LIUYi, GUOBao, ZHANGYang
    • Information and Communications Technology and Policy. 2018, 44(6): 90-94.
    • Abstract ( 153 )   
    • With the further reduction of the flow rate, especially the launch of the unlimited flow set, the user behavior and consumption pattern of the University scenes have changed, and the demand for the network capacity and the user's perception is increasing. In order to match the development of the user's business, this paper deeply analyzes the change of the university business model after the launch of the unlimited flow package, and establishes anewcapacity evaluation and expansion model of the University. It is more targeted around the user experience, and studies and discusses the strategy of accurate coverage of the partition error frequency, the number of language service stratification and the multi frequency coordination optimization strategy to enhance network capacity and user experience, protect the user perception of public praise scene.
    • Related Articles | Related Articles | Metrics