Xiaomi An, professor, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China.
Shuyang Sun, Ph.D. candidate, Key Laboratory Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China..
Wenlin Bai, Ph.D. candidate, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China..
Bin Zhang, professor, Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin University of China/School of Information Resources Management, Renmin University of China, Beijing, China.
Xiaoyu Huang, associate professor, School of Information Resources Management, Renmin University of China, Beijing, China.
Hepu Deng, professor, School of Information Resources Management, Renmin University of China, Beijing, China/School of Business Information Technology and Logistics, RMIT University, Victoria, Australia.
information resources management, personal information, personal information protection, public sector, networked environment, China
An, X., Mu, Y., Wang Wei, Liu, J., Wang Wang, & Ye, L. (2011). Analysis of current legal and regulatory requirements for personal information protection and management in China. Beijing Archives, 5, 19-21.
Bai, H. (2011). Studies about legal problems of network personal information protection (Unpublished master’s thesis, Minzu University of China, Beijing, China).
Ding, B., & Ding, Y. (2012). Model of personal information protection based on relationship networks. Library and Information Service, 56(2), 50-54.
Ji, X. (2011). On rational utilization of personal information. Information Research, 11, 20-21.
Jing, S. (2010). Problems of tort of network personal information. Youth Journalist, 3A, pp. 55-56.
Kobayashi, M. (2007). IT development and personal information protection. Beijing: Economic Daily Press.
Kong, L. (2009). Privacy protection of personal data. Wuhan: Wuhan University Press.
Li, L. (2009). Legal development report No.7. Beijing: Social Science Documentation Publishing House.
Li, X. (2009). Logics of network consumer’s personal information right: Evolution of economical patterns. Social Scientist, 10, 67-70.
Ministries. (2014). Notice of work relevant to fostering implementation of information services project benefit to people. Retrieved from http://www.mof.gov.cn/zhengwuxinxi/zhengcefabu/201401/t20140116_1036140.htm
Ministry of Industry and Information Technology. (2012). The twelfth five year plan of national e-government (Announcement). Retrieved from http://www.miit.gov.cn/n11293472/n11295327/n11297217/14562026.html
Ministry of Industry and Information Technology. (2013a). Notice of the Ministry of Industry and Information Technology on strengthening the network access management of mobile intelligent terminals. Retrieved from http://opinion.news.chengdu.cn/topic/2013-10/31/content_1305121.htm?node=12022
Ministry of Industry and Information Technology. (2013b). Provisions on protecting the personal information of telecommunications and internet users. Retrieved from http://www.miit.gov.cn/n11293472/n11294912/n11296542/15514014.html
Mu, Y., Wang, W., & An, X. (2013). Personal information protection system in government agencies. Information Construction, 1, 22-25.
Shi, J. (2012). Legislation of personal information protection in networked environment. Suzhou University Academic Journal, 6, 85-96.
Standing Committee of the National People’s Congress. (2012). Decision on the standing committee of the national people’s congress on strengthening information protection on networks. Retrieved from http://news.hexun.com/2012-12-28/149603728.html
Tao, J. (2007). Protection of personal data privacy in networked age. Front, 5, 119-121.
The Chinese communist Party Central Committee., & The State Council. (2014). The national new urbanization planning (2014-2020). Retrieved from http://politics.rmlt.com.cn/2014/0317/244361.shtml
The State Administration for Industry and Commerce. (2014). Administrative measures for on line trading. Retrieved from http://www.law-lib.com/law/law_view.asp?id=443546
The State Council. (2013). Opinions on promotion information consumption of China. Retrieved from http://www.js.xinhuanet.com/2013-08/15/c_116951133.htm
Wu, G (2007). On the balanceable relationship between protection and utilization of personal information. Information Science, 25(1), 47-49.
Wu, Y. (2014). Protecting personal data in e-government: A cross-country study. Government Information Quarterly, 31(1), 150-159.
Zhou, H. (2006). Research front of personal information protection. Beijing: Legal Publishing House.
Zhou, S. (2013). Abuse and relief of personal information in network group events. Beijing Social Science, 1, 11-16.