[1] |
KUNER C . Regulation of transborder data flows under data protection and privacy law: past, present, and future[J]. JSSRN Electronic Journal, 2010(10).
|
[2] |
MELTZER J P . The Internet, crossborder data flows and international trade[J]. Asia & the Pacific Policy Studies, 2015,2(1): 90-102.
|
[3] |
许多奇 . 论跨境数据流动规制企业双向合规的法治保障[J]. 东方法学, 2020(2): 185-197.
|
|
XU D Q . Legal guarantee for two-way compliance of enterprises subject to regulation of cross-border data flow[J]. Oriental Law, 2020(2): 185-197.
|
[4] |
ESTADELLA-YUSTE O. . Transborder data flows and the sources of public international law[J]. North Carolina Journal of International Law, 1991.
|
[5] |
单寅, 王亮 . 跨境数据流动监管立足国际, 看国内解法[J]. 通信世界, 2017(14): 24-25.
|
|
SHAN Y , WANG L . Cross-border data flow supervision is based on the international, here are domestic solutions[J]. Communications World, 2017(17): 24-55
|
[6] |
FELDMAN M B , GARCIA D R . National regulation of transborder data flows[J]. North Carolina Journal of International Law and Commercial Regulation, 1982,7(1).
|
[7] |
KUNER C . Regulation of transborder data flows under data protection and privacy law: past, present, and future[J]. TILT Law & Technology Working Paper, 2010.
|
[8] |
许多奇 . 个人数据跨境流动规制的国际格局及中国应对[J]. 法学论坛, 2018(3): 130-137.
|
|
XU D Q . International pattern of personal data cross-border flow regulation and China's response[J]. Legal Forum, 2018(3): 130-137
|
[9] |
付伟, 于长钺 . 美欧跨境数据流动管理机制研究及我国的对策建议[J]. 中国信息化, 2017(6): 55-59.
|
|
FU W , YU C Y . Research on the management mechanism of cross-border data flow between the United States and Europe, and my country’s countermeasures[J]. iChina, 2017(6): 55-59
|
[10] |
CASALINI F , GONZáLEZ J L . Trade and cross-border data flows[J]. OECD Trade Policy Paper, 2019.
|
[11] |
张郁安, 宋恺 . 对新时期数据跨境流动风险的思考[J]. 中国信息安全, 2018(11): 79-82.
|
|
ZHANG Y A , SONG K . houghts on the risks of cross-border data flow in the new era[J]. China Information Security, 2018(11): 79-82
|
[12] |
TRACHTMAN J . Cyberspace, sovereignty, jurisdiction, and modemism[J]. Indiana Journals of Global Legal Studies, 1998,5(2): 566.
|
[13] |
朱扬勇 . 大数据资源[M]. 上海: 上海科学技术出版社, 2018.
|
|
ZHU Y Y . Data resource[M]. Shanghai: Shanghai:Shanghai Scientific & Technical Publishers, 2018.
|
[14] |
朱扬勇 . 旖旎数据——100分钟读懂大数据[M]. 上海: 上海科学技术出版社, 2018.
|
|
ZHU Y Y . Charming data–to understand big data in 100 minutes[M]. Shanghai: Shanghai: Shanghai Scientific & Technical Publishers, 2018.
|
[15] |
BIRNHACK M D . he EU data protection directive: an engine of a global regime[J]. Computer Law & Security Review, 2008,24(6): 508-520.
|
[16] |
National Board of Trade (Sweden). No transfer, no production-a report on crossborder data transfers, global value chains, and the production of goods[R]. 2015.
|
[17] |
刘博 . 国际贸易中的跨境数据流动规制及其对中国的启示[D]. 北京: 对外经济贸易大学, 2016.
|
|
LI B . Transborder data flow regulations in international trade and the enlightenments to China[D]. Beijing: University of International Business and Economics, 2016.
|
[18] |
Centre on Transnational Corporations, United Nations. Transnational corporations and transborder data flows:a technical paper[Z]. 1982.
|
[19] |
SAMARATI P . DI VIMERCATI S D C. Data protection in outsourcing scenarios:issues and directions[C]// The 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM Press, 2010: 1-14.
|
[20] |
DAI H , SHEN Q , WANG C Z ,et al.. Towards satellite-based quantum-secure time transfer[J]. Nature Physics, 2020,16(8): 88-852.
|
[21] |
FLORESCU D , LEVY A Y , MENDELZON A O . Database techniques for the worldwide web: a survey[J]. ACM SIGMOD Record, 1998,27(3): 59-74.
|
[22] |
BERGMAN M K . he deep web: surfacing hidden value[J]. Journal of Electronic Publishing, 2001,7(1).
|
[23] |
ZERFOS P , CHO J , NTOULAS A . Downloading textual hidden web content through keyword queries[C]// The 5th ACM/IEEE-CS Joint Conference on Digital Libraries. Piscataway: IEEE Press, 2005: 100-109.
|
[24] |
OMAR Z M , IBRAHIM J . An overview of darknet, rise and challenges and its assumptions[J]. nternational Journal of Computer Science and Information Technology, 2020,8(3): 110-116.
|
[25] |
沈逸, 姚旭 . 大国战略互信与跨境数据流动管理新模式探索: 以“数据主权”为核心推进网络安全战略建设[J]. 信息安全与通信保密, 2018(12): 12-16.
|
|
SHEN Y , YAO X . Exploration of strategic mutual trust between major powers and a new medel of cross-border data flow management: promoting the construction of cyber security strategy with “data severeignty” as the core[J]. Information Security and Communication Privacy, 2018(12): 12-16
|
[26] |
朱扬勇, 熊贇, 廖志成 ,et al. 数据自治开放模式[J]. 大数据, 20184(2): 3-13.
|
|
ZHU Y Y , XIONG Y , LIAO Z C ,et al. Selfgoverning openness of data[J]. Big Data Research, 20184(2): 3-13
|
[27] |
沈逸, 姚旭, 朱扬勇 . 数据自治开放与治理模式创新[J]. 大数据, 20184(2): 14-20.
|
|
SHEN Y , YAO X , ZHU Y Y . General design of self-governing openness of data and the exploring of the new mode of governance[J]. Big Data Research, 20184(2): 14-20
|