[1] |
《信息安全技术个人信息安全规范》(GB/T 35273-2017)[S]. 2018. .
|
|
Information security technology-personal information (GB/T 35273-2017)[S]. 2018. .
|
[2] |
RUBINSTEIN I S . Big data:the end of privacy or a new beginning[J]. International Data Privacy Law, 2013,3(2): 74-87.
|
[3] |
NISSENBAUM H . Privacy as contextual integrity[J]. Wash L Rev, 2004,79: 101-139.
|
[4] |
KUNER C ,et al. Risk management in data protection(2015)[J]. 5 International Data Privacy Law 95,98.
|
[5] |
范为 . 大数据时代个人信息保护的路径重构[J]. 环球法律评论, 2016(5): 92-115.
|
|
FAN W . The path reconstruction of personal information protection in the age of big data[J]. Global Law Review, 2016(5): 92-115.
|
[6] |
杨秀 . 网络服务商个人信息保护制度的缺陷及其完善一以新浪微博诉脉脉案为例[J]. 国际新闻界, 2017(8): 140-155.
|
|
YANG X . Defects and perfection of personal information protection system of network service providers:take the ‘sina micro-blog prosecuted maimai’ as an example[J]. Chinese Journal of Journalism& Communication, 2017(8): 140-155.
|
[7] |
张敏, 马民虎 . 欧盟数据保护立法改革之发展趋势分析[J].,2016(2):00030-1 网络与信息安全学报, 2016(2): 00030-1.
|
|
MA M , MA M H . Analysis on the development trend of EU data protection legislation reform[J]. Chinese Journal of Network and Information Security, 2016,2(2): 8-15.
|
[8] |
WADHWA K , RODRIGUES R . Evaluating privacy impact assessments[J]. Innovation:The European Journal of Social Science Research, 2013,26(1-2): 161-180.
|
[9] |
BENNETT C J . Regulating privacy:data protection and public policy in Europe and the United States[M]. Cornell University Press, 1992:112.
|
[10] |
HOFFMAN L J . Security and privacy in computer systems[M]. Los Angeles: MelvillePress, 1973:125.
|
[11] |
CLARKE R . Privacy impact assessment:its origins and development[J]. Computer Law &Security Review, 2009,25: 123-135.
|
[12] |
DE HERT P , . A human rights perspective on privacy and data protection impact assessments[C]// Privacy Impact Assessment. Springer,Dordrecht, 2012: 33-76.
|
[13] |
WEBER R H . Privacy management practices in the proposed EU regulation[J]. International Data Privacy Law, 2014,4(4):290.
|
[14] |
WRIGHT D , DE HERT P . Privacy impact assessment[M]. Springer, 2011: 5-6.
|
[15] |
CLARKE R . Privacy impact assessment:its origins and development[J]. Computer Law &Security Review, 2009,25: 123-135.
|
[16] |
CLARKE R . PIAs in Australia:a work-in-progress report privacy impact assessment[M]. Springer,Dordrecht, 2012: 119-148.
|
[17] |
BAMBERGER K A , MULLIGAN D K . Privacy decision-making in administrative agencies[J]. The University of Chicago Law Review, 2008,75(1): 75-107.
|
[18] |
WRIGHT D , FINN R , RODRIGUES R . A comparative analysis of privacy impact assessment in six countries[J]. Journal of Contemporary European Research, 2013,9(1): 160-180.
|
[19] |
TANCOCK D , PEARSON S , CHARLESWORTH A . Analysis of privacy impact assessments within major jurisdictions[C]// Privacy Security and Trust (PST),2010 Eighth Annual International Conference on. IEEE, 2010: 118-125.
|
[20] |
WRIGHT D , WADHWA K . Introducing a privacy impact assessment policy in the EU member states[J]. International Data Privacy Law, 2012,3(1): 13-28.
|
[21] |
WRIGHT D , FINN R , RODRIGUES R . A comparative analysis of privacy impact assessment in six countries[J]. Journal of Contemporary European Research, 2013,9(1): 160-180.
|
[22] |
BAMBERGER K A , MULLIGAN D K . PIA requirements and privacy decision-making in US government agencies privacy impact assessment[M]. Springer Netherlands, 2012: 225-250.
|