Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Normative imperative and institutional implications of the EU Data Act from perspective of personal information protection
    • WU Shenkuo, KE Xiaowei
    • Information and Communications Technology and Policy. 2024, 50(1): 2-6. DOI:10.12267/j.issn.2096-5931.2024.01.001
    • Abstract ( 278 ) HTML( 164 )   
    • On November 9, 2023, the European Parliament passed the Data Act. This act specifies the principles of data flow utilization and data governance in line with EU values, ensures the safe and effective flow of data elements in the European single data market, and further balances the link between personal data protection and the free flow of data. To fully release the value of data elements, further improve the standards of data security and personal information protection in the digital era, regulate the sharing and circulation of data, and ensure the orderly and safe development of the data economy, China can learn from it in the aspects such as protecting personal information rights and interests in the digital era, establishing a unified and coordinated data governance mechanism, strengthening technical interconnection and standard construction, and optimizing data security protection supervision.

    • References | Related Articles | Metrics
    • Exploration of personal information transfer and security compliance
    • XIN Jianfeng, ZHANG Xiaomei, BI Qiang, YANG Li, CHEN Shujuan
    • Information and Communications Technology and Policy. 2024, 50(1): 7-12. DOI:10.12267/j.issn.2096-5931.2024.01.002
    • Abstract ( 164 ) HTML( 144 )   
    • Based on the review of domestic regulations and standards related to personal information security, this paper first classifies and studies the transfer methods of personal information. In addition, it sorts out, classifies, and analyzes the actual security compliance problems encountered in the process of personal information transfer. Then, it proposes a security compliance analysis model for personal information transfer. Finally, it gives security compliance suggestions for the personal information transfer activities of personal information controllers.

    • Figures/Tables | References | Related Articles | Metrics
    • Continuous identity authentication of mobile intelligent terminal users via interactive behavior
    • SONG Tianle, LIN Chenhao, GAO Shuxin, ZHAO Junyi, ZHOU Yajie, JI Yingshuai, YANG Minghui, SHEN Chao
    • Information and Communications Technology and Policy. 2024, 50(1): 19-31. DOI:10.12267/j.issn.2096-5931.2024.01.004
    • Abstract ( 241 ) HTML( 180 )   
    • With the development and popularization of mobile intelligent terminals, more and more users are performing activities such as payment, transfer, and storing personal information on mobile terminals, including smartphones and tablets. In order to improve the security and convenience for users to use mobile intelligent terminals, the current development of mobile intelligent terminal identity authentication tends to be continuous authentication. Firstly, the existing identity authentication work based on mobile intelligent terminal is reviewed. Secondly, the current mainstream performance evaluation indicators and industry applications are organized. Finally, a summary and a discussion are conducted on the urgent issues and development trends of continuous identity authentication in mobile intelligent terminals.

    • Figures/Tables | References | Related Articles | Metrics
    • Analysis and suggestions on the standardization path of privacy computing technology
    • WANG Yanhong, KONG Ling, FU Yanyan, LI Jingdian
    • Information and Communications Technology and Policy. 2024, 50(1): 32-36. DOI:10.12267/j.issn.2096-5931.2024.01.005
    • Abstract ( 188 ) HTML( 99 )   
    • In the context of national requirements for personal information protection and efficient flow of data elements, the privacy computing technology has attracted widespread attention as a key technology to solve data security and flow problems. Standardization of privacy computing technology has become an important research topic in the field of personal information protection. This article focuses on the analysis of the standardization path for privacy computing, and discusses the current situation, existing problems, and relevant suggestions of standardization, aiming to provide reference for the standardization construction of privacy computing technology.

    • References | Related Articles | Metrics
    • Practical difficulties and solutions of differential privacy for personal information protection
    • ZHU Yue
    • Information and Communications Technology and Policy. 2024, 50(1): 37-44. DOI:10.12267/j.issn.2096-5931.2024.01.006
    • Abstract ( 361 ) HTML( 185 )   
    • By examining cases where differential privacy(DP) is used for personal information protection in census, digital advertising and large language model, this paper finds that there are still seven practical difficulties in realizing personal information protection through DP, such as unclear definition, unmatched privacy unit, excessively high parameter value, difficulty in accounting, lack of concise explanation, difficulty in verification and audit, and uncertainty of DP’s legal effect. And this paper discusses how to tackle with these difficulties one by one. Solving the practical difficulties of differential privacy can not only strengthen the protection of personal information, but also promote the circulation and utilization of data.

    • References | Related Articles | Metrics
    • Reflections on the concept of privacy: centered on the analysis of private information
    • DENG Li, CHEN Zhao
    • Information and Communications Technology and Policy. 2024, 50(1): 53-58. DOI:10.12267/j.issn.2096-5931.2024.01.008
    • Abstract ( 110 ) HTML( 76 )   
    • Private information is the intermediary between privacy and personal information. In judicial practice, there is ambiguity in the definition of private information. Based on the correlation between private information and privacy and personal information, from the perspective of interpretation theory, it is concluded that private information is identifiable and private. However, the dual nature of private information makes it difficult to answer the question of protection or reasonable use. Based on the principle of reasonable privacy expectation theory and supplemented by scenario theory, the hierarchical distinction of private information is carried out, and sensitive private information is classified into the category of privacy rights, and non-sensitive private information is classified into the category of personal information, so as to solve the problems above.

    • References | Related Articles | Metrics
    • Research and practice of decentralized digital identity authentication technology based on privacy protection
    • JIAO Zhiwei, WU Zhenghao, XU Yijia, WEI Fanxing
    • Information and Communications Technology and Policy. 2024, 50(1): 59-66. DOI:10.12267/j.issn.2096-5931.2024.01.009
    • Abstract ( 309 ) HTML( 196 )   
    • With the development of Web3.0, decentralized digital identity comes into being. Decentralized identity is oriented to decentralized networks, allowing users, institutions, devices and digital assets to access the network, with the characteristics of decentralization, mutual recognition, privacy and security. This paper studies the decentralized digital identity authentication system based on privacy protection, and firstly summarizes its technical architecture, authentication process and technical characteristics. Then,it presents the security protection mechanism based on terminal and the privacy protection scheme based on cryptography. The privacy protection security scheme includes DID authentication based on cryptography and identity attribute authentication. Finally, it introduces the implementation case of the visually impaired user scenario to provide ideas for decentralized digital identity application scenarios and help protect user privacy.

    • Figures/Tables | References | Related Articles | Metrics
    • Information protection issues and detection methods in software development kit
    • CHANG Haolun, LI Xin, ZANG Lei
    • Information and Communications Technology and Policy. 2024, 50(1): 67-72. DOI:10.12267/j.issn.2096-5931.2024.01.010
    • Abstract ( 137 ) HTML( 103 )   
    • In the era of digital economy, China’s mobile Internet is booming. Apps, application distribution platforms, applets, software development kit (SDK) and others continue to develop rapidly and have also become key areas of personal information protection. Among them, SDK, as an essential functional module for app development, not only provides convenience for app development and promotes industrial prosperity, but also causes a series of issues that infringe on user rights. This article summarizes China’s policies and regulations on SDK personal information protection. It analyzes the personal information protection issues and harm caused by the current SDK, and proposes the detection methods and the regulatory governance model.

    • Figures/Tables | References | Related Articles | Metrics
    • An exploration of characteristics of individual information in the process of data factorization
    • ZENG Linhui, LI Zhubin
    • Information and Communications Technology and Policy. 2024, 50(1): 83-89. DOI:10.12267/j.issn.2096-5931.2024.01.012
    • Abstract ( 148 ) HTML( 119 )   
    • The relationship between individuals and society in the digital age is undergoing a transformation from identity interconnection to data interconnection. For the data factor market, this means that individual information becomes a production factor that can realize the value of data. First, this paper clarifies the meaning of individual information in the digital age from the practical perspective of individual information protection. Then, it discusses the social and non-exclusive characteristics of individual information that the process of data factorization has given to individual information. It aims to facilitate the protection of individual information from a theoretical perspective while promoting new balance in the relationship between the individual and the society.

    • References | Related Articles | Metrics
    • Study on how to build data circulation base
    • ZHAO Jiang, JIANG Zhongjun
    • Information and Communications Technology and Policy. 2024, 50(1): 90-96. DOI:10.12267/j.issn.2096-5931.2024.01.013
    • Abstract ( 234 ) HTML( 236 )   
    • With the advent of the digital age, the importance of data circulation has become increasingly prominent, but there is a lack of new infrastructure to ensure data circulation. Based on the practice of a certain city, this paper proposes to build a data circulation base so as to smooth the circulation of data resources. Firstly, it elaborates the necessity of building a data circulation base as well as the concept and functions of a data circulation base. Then, it proposes how to build a data circulation base to achieve three major functions: authorization, connection, and certificate storage. Finally, it proposes that authorization is the key to achieving the functions of the data circulation base, and authorization can be implemented in three dimensions: process, mechanism, and platform. This study provides theoretical support and practical experience for the safe, orderly, and efficient circulation of data.

    • Figures/Tables | References | Related Articles | Metrics