Skip to main content

Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

Abstract

The emergence of cloud computing, big data and other technologies has ushered us in a new age of information-based lifestyle and is profoundly changing the global economic ecology. It follows that network security risk has also become one of the most severe economic and national security challenges confronted by various countries in the 21st Century. The recent “PRISM” event has exposed the weakness of the Chinese network information security. Given the huge risks, it is high time that China reconsiders network information security strategy so as to ensure citizen rights, network information security and national security while making the most of new technologies to improve economic efficiency. As such, this paper attempts to analyze the challenges confronted by China in terms of network information security in the context of the “PRISM” event, with a view to constructing the Chinese network information security strategy from the perspective of law.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boyd, D., Crawford, K.:Six Provocations for Big Data, http://softwarestudies.com/cultural_analytics/Six_Provocations_for_Big_Data.pdf

  2. Simmons, J.L.: Buying you: the Government’s use of fourth-parties to launder data about ‘The People’. Columbia Bus. Law Rev. 3, 956 (2009)

    Google Scholar 

  3. Froomkin, A.M.: The internet as a source of regulatory arbitrage. In: Kahin, B., Nesson, C.: Borders in Cyberspace: Information Policy and the Global Information Structure, p. 129. MIT Press, Massachusetts (1997)

    Google Scholar 

  4. Dupont, B.: The Cyber Security Environment to 2022: Trends, Drivers and Implications. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2208548

  5. Rubinstein, I.: Big data: the end of privacy or a new beginning? Int. Data Priv. Law 3(2), 74 (2013)

    Article  Google Scholar 

  6. Kuner, C., Cate, F.H., Millard, C., Svantesson, D.J.B.: The challenge of ‘Big Data’ for data protection. Int. Data Priv. Law 2(2), 47–49 (2012)

    Article  Google Scholar 

  7. Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Northwest. J. Technol. Intellect. Property 5, 261 (2013)

    Google Scholar 

  8. McKinsey Global Institute: Big Data: The Next Frontier for Innovation, Competition, and Productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation

  9. Telang, R., Wattal, S.: impact of software vulnerability announcements on the market value of software vendors-an empirical investigation. IEEE Trans. Softw. Eng. 33, 8 (2007)

    Article  Google Scholar 

  10. Moore, T.: The economics of cybersecurity: principles and policy options. Int. J. Crit. Infrastruct. Prot. 3(3–4), 110 (2010)

    Google Scholar 

  11. Lieyang, Q.: It is Essential to clarify the standard of punishment of infringing personal privacy, PSB Newspaper. http://www.mps.gov.cn/n16/n1237/n1342/n803715/3221182.html

  12. European Union: How will the EU’s data protection reform make international cooperation easier? http://ec.europa.eu/justice/data-protection/document/review2012/factsheets/5_en.pdf

  13. Yan, Z., Xinhe, H.: Cyber security risk and its legal regulation. Study Dialectics Nat. 28(10), 62 (2012)

    Google Scholar 

  14. The White House: Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, J. (2015). Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics