Liu et al., 2024 - Google Patents
A triple-layered comparative approach to understanding new privacy policy practices of digital platforms and users in China after implementation of the PIPLLiu et al., 2024
View HTML- Document ID
- 11093098425318620018
- Author
- Liu L
- Chen Y
- Publication year
- Publication venue
- Social Media+ Society
External Links
Snippet
China enacted its first Personal Information Protection Law (PIPL) on 1 November 2021. However, there is a dearth of systematic research examining the implementation of new privacy policies exercised by digital platforms and user engagement with these policies. This …
- 238000013459 approach 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Creemers | China’s emerging data protection framework | |
Sannon et al. | Privacy research with marginalized groups: what we know, what's needed, and what's next | |
Hintz et al. | Digital citizenship in a datafied society | |
Hartzog | PrivacyOs Blueprint: The Battle to Control the Design of New Technologies | |
Lane et al. | Privacy, big data, and the public good: Frameworks for engagement | |
Ohm | Sensitive information | |
Sampson et al. | Ubiquitous and mobile learning in the digital age | |
Ciocchetti | E-Commerce and information privacy: Privacy policies as personal information protectors | |
Weber | Cloud computing in education | |
Gonçalves | The EU data protection reform and the challenges of big data: remaining uncertainties and ways forward | |
Stardust et al. | Surveillance does not equal safety: Police, data and consent on dating apps | |
Paik et al. | Invasive yet inevitable? Privacy normalization trends in biometric technology | |
Lenz | Big data: Ethics and law | |
Duffourc et al. | Privacy of personal data in the generative AI data lifecycle | |
Duke | Building responsible AI algorithms | |
Magrani et al. | The ethical and legal challenges of recommender systems driven by artificial intelligence | |
de Souza et al. | Legal issues and user experience in ubiquitous systems from a privacy perspective | |
Liu et al. | A triple-layered comparative approach to understanding new privacy policy practices of digital platforms and users in China after implementation of the PIPL | |
Livingstone et al. | Children’s rights and online age assurance systems: The way forward | |
Ryutov et al. | Predicting information security policy compliance intentions and behavior for six employee-based risks | |
Kulshrestha et al. | Cyber Crime, Regulation and Security: Contemporary Issues and Challenges | |
Gashu et al. | Ethics in Public Health Informatics | |
Newell et al. | Regulating the data market: The material scope of american consumer data privacy law | |
Yadav et al. | Protecting privacy in the digital marketplace: A comparative study of legal mechanisms for consumer rights in the metaverse | |
Bazanye | Factors influencing user adherence towards privacy standards in the usage of Internet of Things devices in South Africa |