Advertisement

Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9483)

Abstract

The emergence of cloud computing, big data and other technologies has ushered us in a new age of information-based lifestyle and is profoundly changing the global economic ecology. It follows that network security risk has also become one of the most severe economic and national security challenges confronted by various countries in the 21st Century. The recent “PRISM” event has exposed the weakness of the Chinese network information security. Given the huge risks, it is high time that China reconsiders network information security strategy so as to ensure citizen rights, network information security and national security while making the most of new technologies to improve economic efficiency. As such, this paper attempts to analyze the challenges confronted by China in terms of network information security in the context of the “PRISM” event, with a view to constructing the Chinese network information security strategy from the perspective of law.

Keywords

Personal data and privacy Cyber governance Network information security Chinese network information security strategy 

References

  1. 1.
    Boyd, D., Crawford, K.:Six Provocations for Big Data, http://softwarestudies.com/cultural_analytics/Six_Provocations_for_Big_Data.pdf
  2. 2.
    Simmons, J.L.: Buying you: the Government’s use of fourth-parties to launder data about ‘The People’. Columbia Bus. Law Rev. 3, 956 (2009)Google Scholar
  3. 3.
    Froomkin, A.M.: The internet as a source of regulatory arbitrage. In: Kahin, B., Nesson, C.: Borders in Cyberspace: Information Policy and the Global Information Structure, p. 129. MIT Press, Massachusetts (1997)Google Scholar
  4. 4.
    Dupont, B.: The Cyber Security Environment to 2022: Trends, Drivers and Implications. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2208548
  5. 5.
    Rubinstein, I.: Big data: the end of privacy or a new beginning? Int. Data Priv. Law 3(2), 74 (2013)CrossRefGoogle Scholar
  6. 6.
    Kuner, C., Cate, F.H., Millard, C., Svantesson, D.J.B.: The challenge of ‘Big Data’ for data protection. Int. Data Priv. Law 2(2), 47–49 (2012)CrossRefGoogle Scholar
  7. 7.
    Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Northwest. J. Technol. Intellect. Property 5, 261 (2013)Google Scholar
  8. 8.
    McKinsey Global Institute: Big Data: The Next Frontier for Innovation, Competition, and Productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation
  9. 9.
    Telang, R., Wattal, S.: impact of software vulnerability announcements on the market value of software vendors-an empirical investigation. IEEE Trans. Softw. Eng. 33, 8 (2007)CrossRefGoogle Scholar
  10. 10.
    Moore, T.: The economics of cybersecurity: principles and policy options. Int. J. Crit. Infrastruct. Prot. 3(3–4), 110 (2010)Google Scholar
  11. 11.
    Lieyang, Q.: It is Essential to clarify the standard of punishment of infringing personal privacy, PSB Newspaper. http://www.mps.gov.cn/n16/n1237/n1342/n803715/3221182.html
  12. 12.
    European Union: How will the EU’s data protection reform make international cooperation easier? http://ec.europa.eu/justice/data-protection/document/review2012/factsheets/5_en.pdf
  13. 13.
    Yan, Z., Xinhe, H.: Cyber security risk and its legal regulation. Study Dialectics Nat. 28(10), 62 (2012)Google Scholar
  14. 14.
    The White House: Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Intellectual Property Research Institute of Xiamen UniversityXiamenChina

Personalised recommendations