Paper Status Tracking
Contact us
[email protected]
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

Xiaomi An, professor, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China.
Shuyang Sun, Ph.D. candidate, Key Laboratory Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China..
Wenlin Bai, Ph.D. candidate, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China..
Bin Zhang, professor, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China.
Xiaoyu Huang, associate professor, School of Information Resources Management, Renmin University of China, Beijing, China.
Hepu Deng, professor, School of Information Resources Management, Renmin University of China, Beijing, China/School of Business Information Technology and Logistics, RMIT University, Victoria, Australia.

ABSTRACT

With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information. 

KEYWORDS

information resources management, personal information, personal information protection, public sector, networked environment, China

Cite this paper

References
An, X., Mu, Y., Wang Wei, Liu, J., Wang Wang, & Ye, L. (2011). Analysis of current legal and regulatory requirements for personal information protection and management in China. Beijing Archives, 5, 19-21.
Bai, H. (2011). Studies about legal problems of network personal information protection (Unpublished master’s thesis, Minzu University of China, Beijing, China).
Ding, B., & Ding, Y. (2012). Model of personal information protection based on relationship networks. Library and Information Service, 56(2), 50-54.
Ji, X. (2011). On rational utilization of personal information. Information Research, 11, 20-21.
Jing, S. (2010). Problems of tort of network personal information. Youth Journalist, 3A, pp. 55-56.
Kobayashi, M. (2007). IT development and personal information protection. Beijing: Economic Daily Press.
Kong, L. (2009). Privacy protection of personal data. Wuhan: Wuhan University Press.
Li, L. (2009). Legal development report No.7. Beijing: Social Science Documentation Publishing House.
Li, X. (2009). Logics of network consumer’s personal information right: Evolution of economical patterns. Social Scientist, 10, 67-70. 
Ministries. (2014). Notice of work relevant to fostering implementation of information services project benefit to people. Retrieved from http://www.mof.gov.cn/zhengwuxinxi/zhengcefabu/201401/t20140116_1036140.htm
Ministry of Industry and Information Technology. (2012). The twelfth five year plan of national e-government (Announcement). Retrieved from http://www.miit.gov.cn/n11293472/n11295327/n11297217/14562026.html
Ministry of Industry and Information Technology. (2013a). Notice of the Ministry of Industry and Information Technology on strengthening the network access management of mobile intelligent terminals. Retrieved from http://opinion.news.chengdu.cn/topic/2013-10/31/content_1305121.htm?node=12022
Ministry of Industry and Information Technology. (2013b). Provisions on protecting the personal information of telecommunications and internet users. Retrieved from http://www.miit.gov.cn/n11293472/n11294912/n11296542/15514014.html
Mu, Y., Wang, W., & An, X. (2013). Personal information protection system in government agencies. Information Construction, 1, 22-25.
Shi, J. (2012). Legislation of personal information protection in networked environment. Suzhou University Academic Journal, 6, 85-96.
Standing Committee of the National People’s Congress. (2012). Decision on the standing committee of the national people’s congress on strengthening information protection on networks. Retrieved from http://news.hexun.com/2012-12-28/149603728.html
Tao, J. (2007). Protection of personal data privacy in networked age. Front, 5, 119-121.
The Chinese communist Party Central Committee., & The State Council. (2014). The national new urbanization planning (2014-2020). Retrieved from http://politics.rmlt.com.cn/2014/0317/244361.shtml
The State Administration for Industry and Commerce. (2014). Administrative measures for on line trading. Retrieved from http://www.law-lib.com/law/law_view.asp?id=443546
The State Council. (2013). Opinions on promotion information consumption of China. Retrieved from http://www.js.xinhuanet.com/2013-08/15/c_116951133.htm
Wu, G (2007). On the balanceable relationship between protection and utilization of personal information. Information Science, 25(1), 47-49.
Wu, Y. (2014). Protecting personal data in e-government: A cross-country study. Government Information Quarterly, 31(1), 150-159.
Zhou, H. (2006). Research front of personal information protection. Beijing: Legal Publishing House.
Zhou, S. (2013). Abuse and relief of personal information in network group events. Beijing Social Science, 1, 11-16.

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 001-302-3943358 Email: [email protected]