|
[1]
|
王俊豪. 中国特色政府监管理论体系: 需求分析、构建导向与整体框架[J]. 管理世界, 2021(2): 148-164+184.
|
|
[2]
|
蒋洁. 人脸识别技术应用的侵权风险与控制策略[J]. 图书与情报, 2019(5): 58-64.
|
|
[3]
|
林伟. AI数据安全风险及应对[J]. 情报杂志, 2022, 41(10): 105-111.
|
|
[4]
|
Krafft, M., Arden, C.M. and Verhoef, P.C. (2017) Permission Marketing and Privacy Concerns—Why Do Customers (not) Grant Permissions? Journal of Interactive Marketing, 39, 39-54. [Google Scholar] [CrossRef]
|
|
[5]
|
郭海, 李永慧. 数字经济背景下政府与平台的合作监管模式研究[J]. 中国行政管理, 2019(10): 56-61.
|
|
[6]
|
刘素华. 论手机自动记录用户行动轨迹与个人信息保护[J]. 法学评论, 2020(5): 101-111.
|
|
[7]
|
顾理平. 大数据时代隐私信息安全的四重困境[J]. 社会科学辑刊, 2019(1): 96-101.
|
|
[8]
|
Mothersbaugh, D.L., Foxx, W.K., Beatty, S.E. and Wang, S. (2012) Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information. Journal of Service Research, 15, 76-98. [Google Scholar] [CrossRef]
|
|
[9]
|
张先贵, 邱炳晟. 自动驾驶汽车数据安全风险及其治理[J]. 安徽师范大学学报, 2025, 53(5): 125-135.
|
|
[10]
|
和军, 李江涛. 人工智能数据风险及其治理[J]. 中国特色社会主义研究, 2024(6): 42-51.
|
|
[11]
|
Crandall, D.J., Backstrom, L., Cosley, D., Suri, S., Huttenlocher, D. and Kleinberg, J. (2010) Inferring Social Ties from Geographic Coincidences. Proceedings of the National Academy of Sciences, 107, 22436-22441. [Google Scholar] [CrossRef] [PubMed]
|
|
[12]
|
Bleier, A. and Eisenbeiss, M. (2015) Personalized Online Advertising Effectiveness: The Interplay of What, When, and Where. Marketing Science, 34, 669-688. [Google Scholar] [CrossRef]
|
|
[13]
|
Acquisti, A. and Gross, R. (2009) Predicting Social Security Numbers from Public Data. Proceedings of the National Academy of Sciences, 106, 10975-10980. [Google Scholar] [CrossRef] [PubMed]
|
|
[14]
|
Rafieian, O. and Yoganarasimhan, H. (2020) Targeting and Privacy in Mobile Advertising. Marketing Science, 40, 193-218. [Google Scholar] [CrossRef]
|
|
[15]
|
黄蒙苏. AI大模型训练数据的版权风险与治理路径[J]. 湖北大学学报, 2025, 52(5): 185-193.
|
|
[16]
|
刘裕, 周毅, 农顔清. 网络信息服务平台用户个人信息安全风险及其治理——基于 117个APP 隐私政策文本的内容分析[J]. 图书情报工作, 2022, 66(5): 33-43.
|
|
[17]
|
阮荣彬, 陈菀. 企业科技向善: 内涵、量表开发与检验[J]. 科学学研究, 2023, 41(3): 511-520.
|
|
[18]
|
Boivie, S., Withers, M.C., Graffin, S.D. and Corley, K.G. (2021) Corporate Directors’ Implicit Theories of the Roles and Duties of Boards. Strategic Management Journal, 42, 1662-1695. [Google Scholar] [CrossRef]
|
|
[19]
|
Koppenjan, J.F.M. and Klijn, E.H. (2004) Managing Uncertainties in Networks: A Network Approach to Problem Solving and Decision Making. Routledge.
|
|
[20]
|
张新宝. 个人信息收集: 告知同意原则适用的限制[J]. 比较法研究, 2019(6): 1-20.
|
|
[21]
|
Tang, C.M. (2022) Privacy Protection Dilemma and Improved Algorithm Construction Based on Deep Learning in the Era of AI. Security and Communication Networks, 2022, 1-9. [Google Scholar] [CrossRef]
|
|
[22]
|
贺小石. 大数据背景下公民信息安全保障体系构建——兼论隐私政策的规制原理及其本土化议题[J]. 中国特色社会主义研究, 2021(6): 100-109.
|
|
[23]
|
张海柱. 新兴科技风险、责任伦理与国家监管——以人类基因编辑风险为例[J]. 人文杂志, 2021(8): 114-121.
|
|
[24]
|
任蓉. 算法嵌入政府治理的风险及其防控[J]. 电子政务, 2021(7): 31-41.
|
|
[25]
|
张勇, 冯明显. 数据安全刑事合规的责任伦理[J]. 河南社会科学, 2022, 30(8): 105-114.
|
|
[26]
|
Wang, C., Zhang, J., Lassi, N. and Zhang, X. (2022) Privacy Protection in Using Artificial Intelligence for Healthcare: Chinese Regulation in Comparative Perspective. Healthcare, 10, Article 1878. [Google Scholar] [CrossRef] [PubMed]
|
|
[27]
|
Saltz, J.S. and Dewar, N. (2019) Data Science Ethical Considerations: A Systematic Literature Review and Proposed Project Framework. Ethics and Information Technology, 21, 197-208. [Google Scholar] [CrossRef]
|
|
[28]
|
Buhmann, A. and Fieseler, C. (2022) Deep Learning Meets Deep Democracy: Deliberative Governance and Responsible Innovation in Artificial Intelligence. Business Ethics Quarterly, 33, 146-179. [Google Scholar] [CrossRef]
|
|
[29]
|
梅傲, 李坤佳. 日本数据安全治理制度述评及其启示[J]. 情报理论与实践, 2023, 46(7): 195-200.
|
|
[30]
|
宋保振. 数字时代信息公平失衡的类型化规制[J]. 法治研究, 2021(6): 80-92.
|
|
[31]
|
丁晓东. 个人信息私法保护的困境与出路[J]. 法学研究, 2018(6): 195.
|
|
[32]
|
蒋都都, 杨解君. 大数据时代的信息公益诉讼探讨——以公众的个人信息保护为聚焦[J]. 广西社会科学, 2019(5): 107-115.
|
|
[33]
|
陈奇伟, 聂琳峰. 技术+法律: 区块链时代个人信息权的法律保护[J]. 江西社会科学, 2020, 40(6): 166-175.
|
|
[34]
|
[德]马克斯·韦伯. 学术与政治[M]. 北京: 三联书店, 1998: 116.
|
|
[35]
|
Raab, C.D. (2020) Information Privacy, Impact Assessment, and the Place of Ethics. Computer Law & Security Review, 37, Article 105404. [Google Scholar] [CrossRef]
|