The right to security pays attention to “the security of human”. The citizen security of network information forms a specified security right in the field of Internet. Although the Cyber-Safety Act of China is of great importance for the protection of the network information security, there exists some conflict between its nationalism and the protection of the citizen security of network information. To solve this problem, two measures may be taken, namely the systematic prevention and the human rights remedy. The systematic prevention focuses on updating the security concept for a purpose of multiple governance. The necessity of the human rights remedy may be justified from the aspects of value, norm and fact. Specifically, the right relief of citizen security of network information includes political right, personality right and property right.
Key words
security of network information /
the right to security /
human rights relief /
Cyber-Safety Act of China
{{custom_keyword}} /
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
References
[1] 王世伟.论信息安全、网络安全、网络空间安全[J].中国图书馆学报,2015(2):78-79.
[2] 姚建宗,等.新兴权利研究[M].北京:中国人民大学出版社,2011:125.
[3] 巴瑞·布赞,奥利·维夫,迪·怀尔德.新安全论[M].朱宁,译.杭州:浙江人民出版社,2003:54.
[4] 封永平.安全维度转向:人的安全[J].现代国际关系,2006(6):56-61.
[5] United States Development Programme. Human Development Report[M]. New York:Oxford University Press,1994:22-24.
[6] STEINBRUNER J D. Principles of Global Security[M]. Washington D.C.:Brookings Institution Press, 2000:2-3.
[7] BAY C. The Structure of Freedom[M].California: Stanford University Press,1958:19.
[8] 博登海默.法理学:法律哲学与法律方法[M].邓正来,译.北京:中国政法大学出版社,1999:293.
[9] POSNER R A. Our Domestic Intelligence Crisis[N]. The Washington Post, 2005-12-21(A31).
[10] 梅夏英.数据的法律属性及其民法定位[J].中国社会科学,2016(9):164-183,209.
[11] 马志刚.中外互联网管理体制研究[M].北京:北京大学出版社,2014:280-281。
[12] 丁道勤,卿昱,杨秋华,等.“上天入地”还是“度权量利”——《网络安全法》(草案)述评[J].中国矿业大学学报(社会科学版),2016(5):34-41.
[13] 董贵山,卿昱,杨秋华,等.国外信息保障体系发展综述与启示[J].信息安全与通信保密,2014(12):95-100.
[14] 洪延青.“以管理为基础的规制”——对网络运营者安全保护义务的重构[J].环球法律评论,2016(4):20-40.
[15] THAW D. The Efficacy of Cybersecurity Regulation[J]. Georgia State University Law Review:2014,30(2):302.
[16] ZHENG D E, CARTER W. The Evolution of Cybersecurity Requirements for the U.S. Financial Industry,Center for Strategic and International Studies[EB/OL].[2016-11-18]. https://www.csis.org/analysis/evolution-cybersecurity-re-quirements-us-financial-industry.
[17] LIBICKI M,ABLON L,WEBB T. The Defender’s Dilemma. Charting a Course Toward Cybersecurity[EB/OL].[2016-11-18].http://www.rand—org/pubs/research—reports/RR1024.html.
[18] CARTHY M C. The Rights of Publicity and Privacy[M].New York:Clark Boardman,1987:114.
[19] 王志荣.信息法概论[M].北京:中国法制出版社,2003:273.
[20] 刘德良.论个人信息的财产权保护[M].北京:人民法院出版社,2008:4.
{{custom_fnGroup.title_en}}
Footnotes
{{custom_fn.content}}