Font Size: a A A

Privacy Dialysis "human Flesh Search"

Posted on:2012-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y LuFull Text:PDF
GTID:2216330368494079Subject:Law
Abstract/Summary:PDF Full Text Request
The present era is the era of rapid development of Internet technology in recent years, as a new kind of Internet phenomenon of"human-powered search"has been more and more attention."human-powered search"is double-edged sword which in the edge of the law and moral, It is in realizing information and communication and social public opinion supervision function also sparked violence from various network, from which the contradictions have become increasingly prominent exposure. Therefore, how to correctly evaluate"human-powered search"social value conflicts and how to protect users'privacy on the network environment has important realistic significance."Human-powered search"itself does not distinguish between right and wrong, is that the network of individual users of non-rational cases of violence caused by the action network so that the"human-powered search"the most controversial. This requires us to reflect their own values, norms guide the"human-powered search"behavior, so that in the framework of the law play a more active role in society, to avoid infringement of lawful rights and interests of citizens.This article is divided into three parts, first part introduces the"human-powered search"the first case, from the case, judgments, and the focus of controversy is described in three aspects. The second part around the"human-powered search"think about a case that the first"human-powered search"positive and negative social effects, privacy internet privacy and the differences between traditional, and the conflict among the right to information and privacy protection. The third section on"human-powered search"in the privacy of the legislative proposals, including legislative proposals and of the United States, the EU privacy model for reference, and finally participants described the regulation of network services, including network and the users themselves.
Keywords/Search Tags:human-powered search, privacy, network infringement
PDF Full Text Request
Related items