%0 Journal Article %T 大数据时代下个人信息面临的新风险与制度应对
The New Risks and System Response of Personal Information in the Age of Big Data %A 王德夫 %J 西安交通大学学报(社会科学版) %D 2019 %R 10.15896/j.xjtuskxb.201906015 %X 大数据作为一种现代化的信息处理方式,以广泛内容的数据信息作为原料,以对这些数据信息的分析和预测作为手段,正愈发深入地改变着整个社会的面貌,并对传统的个人信息保护制度产生冲击:它对一切数据信息提出经济利用的需求,并以“预测”的方式勾画出对象的各方面信息,也规避了传统的“侵犯个人信息”行为和基于此而构建的法律约束框架。此时,技术的进步会使得传统个人信息乃至个人隐私相关信息的定义与范畴不再清晰,并给相关权利的行使带来更大的障碍。对此,应重新审视个人信息保护制度,研判新环境下个人信息所面临的新风险,在尽量满足大数据应用的效率需求的同时,从人身安全和生活安宁的角度考察个人信息保护在大数据应用中的重要意义,探寻新的时代背景下实现数据信息利用和个人信息保护时所应恪守的合理边界。
Big data, as a modern information processing method, takes a wide range of data information as a raw material, and the analysis and prediction of these data information as a means is increasingly changing the face of the society as a whole, and the impact on traditional personal information protection system: it carries out all the data information.The demand for economic utilization is given, and the information of all aspects of the object is outlined in the way of “prediction”, and the traditional “infringement of personal information” behavior and the legal framework of construction based on this are also avoided.At this time, advances in technology will make the definitions and categories of traditional personal information and even personal privacy related information unclear, and will cause greater obstacles to the exercise of related rights.In this regard, the personal information protection system should be re-examined, and the new risks faced by the personal information under the new environment should be studied.While satisfying the efficiency requirements of big data applications as much as possible, personal information protection in big data should be viewed from the perspective of personal safety and life security.The significance of the application is to explore the reasonable boundaries that should be observed when realizing the use of data information and personal information in the new era %K 个人信息 %K 大数据 %K 隐私信息 %K 信息保护 %K 信息利用
personal information %K big data %K privacy information %K information protection %K information utilization %U http://skxb.xjtu.edu.cn/oa/DArticle.aspx?type=view&id=201906015