Abstract
The emergence of cloud computing, big data and other technologies has ushered us in a new age of information-based lifestyle and is profoundly changing the global economic ecology. It follows that network security risk has also become one of the most severe economic and national security challenges confronted by various countries in the 21st Century. The recent “PRISM” event has exposed the weakness of the Chinese network information security. Given the huge risks, it is high time that China reconsiders network information security strategy so as to ensure citizen rights, network information security and national security while making the most of new technologies to improve economic efficiency. As such, this paper attempts to analyze the challenges confronted by China in terms of network information security in the context of the “PRISM” event, with a view to constructing the Chinese network information security strategy from the perspective of law.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boyd, D., Crawford, K.:Six Provocations for Big Data, http://softwarestudies.com/cultural_analytics/Six_Provocations_for_Big_Data.pdf
Simmons, J.L.: Buying you: the Government’s use of fourth-parties to launder data about ‘The People’. Columbia Bus. Law Rev. 3, 956 (2009)
Froomkin, A.M.: The internet as a source of regulatory arbitrage. In: Kahin, B., Nesson, C.: Borders in Cyberspace: Information Policy and the Global Information Structure, p. 129. MIT Press, Massachusetts (1997)
Dupont, B.: The Cyber Security Environment to 2022: Trends, Drivers and Implications. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2208548
Rubinstein, I.: Big data: the end of privacy or a new beginning? Int. Data Priv. Law 3(2), 74 (2013)
Kuner, C., Cate, F.H., Millard, C., Svantesson, D.J.B.: The challenge of ‘Big Data’ for data protection. Int. Data Priv. Law 2(2), 47–49 (2012)
Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Northwest. J. Technol. Intellect. Property 5, 261 (2013)
McKinsey Global Institute: Big Data: The Next Frontier for Innovation, Competition, and Productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation
Telang, R., Wattal, S.: impact of software vulnerability announcements on the market value of software vendors-an empirical investigation. IEEE Trans. Softw. Eng. 33, 8 (2007)
Moore, T.: The economics of cybersecurity: principles and policy options. Int. J. Crit. Infrastruct. Prot. 3(3–4), 110 (2010)
Lieyang, Q.: It is Essential to clarify the standard of punishment of infringing personal privacy, PSB Newspaper. http://www.mps.gov.cn/n16/n1237/n1342/n803715/3221182.html
European Union: How will the EU’s data protection reform make international cooperation easier? http://ec.europa.eu/justice/data-protection/document/review2012/factsheets/5_en.pdf
Yan, Z., Xinhe, H.: Cyber security risk and its legal regulation. Study Dialectics Nat. 28(10), 62 (2012)
The White House: Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, J. (2015). Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-27051-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27050-0
Online ISBN: 978-3-319-27051-7
eBook Packages: Computer ScienceComputer Science (R0)