The Influence of Government, Enterprises, and the Public on the Security of Cross-border Data Flows and Optimization Strategies: An Information Ontological Perspective
DOI:
https://doi.org/10.52152/3128Ključne besede:
Data Cross-border Flow Security; Government Guidance; Corporate Impetus; Public Engagement; Collaborative GovernancePovzetek
In the technology-driven era, the rapid advancement of information technologies, particularly artificial intelligence, has led to an increase in both the scale and complexity of data cross-border flows, thereby elevating data security to a global concern. This paper addresses the issue of data security in cross-border flows by reviewing pertinent literature, delineating the distinct phases of data cross-border flow development along with the challenges encountered at each stage, and introducing the public-private partnership (PPP) theoretical framework. A three-dimensional interactive theoretical framework centered on "government guidance, corporate impetus, and public engagement" is constructed to analyze the interaction mechanisms and influencing factors among government, enterprises, and the public. Based on this analysis, the paper proposes a series of targeted strategies to enhance the coordinated governance system for data cross-border flow security: refining the legal framework and regulatory approaches in policy and supervision; fostering innovation and standardization in technology and innovation; and boosting government credibility, enhancing public participation, and reinforcing interaction mechanisms in the realm of public trust and engagement. These measures aim to facilitate the transition of data cross-border flow security coordinated governance from theoretical discourse to practical application, effectively addressing various risks and challenges while promoting the healthy and orderly growth of the global digital economy.
Literatura
Jung Jaewon.(2022).The Effects of China’s Participation in the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP): A Quantitative Assessment.Sustainability(1),344-344.
Musch Sean,Borrelli Michael Charles & Kerrigan Charles.(2024).Bridging compliance and innovation: A comparative analysis of the EU AI Act and GDPR for enhanced organisational strategy.Journal of Data Protection & Privacy(1),14-40.
Rolf Schwartmann,Tobias Keber,Kai Zenner & Sonja Kurth.(2024).Data Protection Aspects of the Use of Artificial Intelligence — Initial overview of the intersection between GDPR and AI Act.Computer Law Review International(5),145-150.
Wang Anna.(2022).Challenges faced by Russian companies involved in cross-border data flows.The Frontiers of Society, Science and Technology(7.0),
Chakraborty Nilanjan.(2020).Data Security and Privacy of Individuals in Data Mining: A Critical Analysis of Data Mining in India.International Journal of Data Mining And Emerging Technologies(1),1-7.
Nguyen Mau,Dinh MBA,Nguyen Hien,Master Master,Nguyen Bao & Mac Mac.(2020).Factors Affecting Disclosure of Accounting Information and Tax Rates Effects on The Risk Level of Listed Viet Nam Medicine Firms During Global Economic Crisis - And Roles of IT governance and Data Security in Risk Management- And Rol.Journal of Complementary Medicine Research(1),139.
BMJ Publishing Group Limited.(2018).Data compliance in practice.Veterinary Record(8),214-214.
B. Hema Kumari & V. Surya Narayana Reddy.(2019).Data Synthesis and Importance of Big Data Security Analytics for Securing the Enterprise Data.International Journal of Recent Technology and Engineering (IJRTE)(2),4808-4811.
David DiMolfetta.(2024).Flaws in public records management tool could let hackers nab sensitive data linked to requests.Nextgov.com (Online)
Rains Tim.(2020).Cybersecurity Threats, Malware Trends, and Strategies:Learn to mitigate exploits, malware, phishing, and other social engineering attacks.
Enrico Del Re.(2024).Technologies of Data Protection and Institutional Decisions for Data Sovereignty.Information(8),444-444.
Emmanuel Kasseris,Kasseris Emmanuel,Goteti Naga Srujana,Kumari Sapna,Clinton Bentley,Engelkemier Seiji... & Gençer Emre.(2020).Highlighting and overcoming data barriers: creating open data for retrospective analysis of US electric power systems by consolidating publicly available sources.Environmental Research Communications(11),115001-.
Rongxin Bao,Zhikui Chen & Mohammad S. Obaidat.(2018).Challenges and techniques in Big data security and privacy: A review.Security and Privacy(4),n/a-n/a.
Titilayo Modupe Kolade,Nsidibe Taiwo Aideyan,Seun Michael Oyekunle,Olumide Samuel Ogungbemi,Dooshima Louisa Dapo Oyewole & Oluwaseun Oladeji Olaniyi.(2024).Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security.Asian Journal of Research in Computer Science(12),36-57.
Gyanchandani Vandana.(2024).Cross-border flow of personal data (digital trade) ought to have data protection.Journal of Data Protection & Privacy(1),61-79.
Satish Rupraoji Billewar,Karuna Jadhav,V.P. Sriram,Dr. A. Arun,Sikandar Mohd Abdul,Kamal Gulati & Dr Narinder Kumar Kumar Bhasin.(2021).The rise of 3D E-Commerce: the online shopping gets real with virtual reality and augmented reality during COVID-19.World Journal of Engineering(2),244-253.
Labadie Clément & Legner Christine.(2023).Building data management capabilities to address data protection regulations: Learnings from EU-GDPR.Journal of Information Technology(1),16-44.
MolnárGábor Fruzsina.(2023).[Protecting the rights and freedoms of individuals with regard to health data processing: the risk approach of the EU General Data Protection Regulation (GDPR)]..Bundesgesundheitsblatt, Gesundheitsforschung, Gesundheitsschutz(2),143-153.
Jie Tan& Zhirong Jerry Zhao.(2024).Cost-Saving or Cream-Skimming? Partner Ownership and the Project Returns of Public-Private Partnerships in China.Journal of Chinese Political Science(prepublish),1-21.
Jiang Lu & Wu Zetao.(2019). International Development Cooperation PPP: A New Model of More Effective Development Cooperation? International Outlook (06),46-67+151-152.
[Liu W. (2015). Theoretical interpretation of PPP model and practical examples.] Reform (01),78-89.
Nadine Nibigira,Vincent Havyarimana & Zhu Xiao.(2024).Sensitive Information Security Based on Elliptic Curves.World Journal of Engineering and Technology(02),274-285.
Haodi Deng.(2024).Paradigm shift of commercial data protection: From an IP approach to a sui generis approach.Academic Journal of Humanities & Social Sciences(2),
Kirstie Ball,Sara Degli Esposti,Sally Dibb,Vincenzo Pavone & Elvira Santiago‐Gomez.(2019).Institutional trustworthiness and national security governance: Evidence from six European countries.Governance(1),103-121.
Glasze Georg,Cattaruzza Amaël,Douzet Frédérick,Dammann Finn,Bertran Marie Gabrielle,Bômont Clotilde... & Zanin Caroline.(2023).Contested Spatialities of Digital Sovereignty.Geopolitics(2),919-958.
Varda Mone & Sugana Mitharwal.(2024).Guardians of privacy: exploring the viability of a United Nations-backed global data governance.International Journal of Intellectual Property Management(2),194-216.
Matusiak Matthew C,Cavanaugh Michael R & Stephenson Matthew.(2020).An Assessment of Officer-Involved Shooting Data Transparency in the United States..Journal of interpersonal violence(1-2),886260520913646.
Rosilah Hassan,Wahiza Wahi,Nurul Halimatul Asmak Ismail & Samer Adnan Bani Awwad.(2022).Data Security Awareness in Online Learning.International Journal of Advanced Computer Science and Applications (IJACSA)(4),
Chensha Wang,Yu Li & Lijing Liu.(2024).Algorithm Innovation and Integration with Big Data Technology in the Field of Information Security: Current Status and Future Development.Academic Journal of Engineering and Technology Science(2),
Prenosi
Objavljeno
Številka
Rubrika
Licenca
Avtorske pravice (c) 2025 Lex localis - Journal of Local Self-Government

To delo je licencirano pod Creative Commons Priznanje avtorstva-Nekomercialno-Brez predelav 4.0 mednarodno licenco.