Research on the Infringement of Citizens' Privacy Rights by Human Flesh Search in China
DOI:
https://doi.org/10.24203/ajhss.v8i4.6265Keywords:
human flesh search, privacy, privacy rights, protectionAbstract
Human flesh search, as a special way of information search,has more and more influence on modern people's life and work. On the one hand, human flesh search does have its positive influences. Some public officials have been removed from their positions after human flesh searches led to corruption investigations. But if human flesh search is abused, it is very likely to infringe on citizens' privacy. To resist the negative effects of human flesh search, China must improve relevant legislation, strengthen network supervision and enhance citizens' self-protection awareness.
References
. Dong Jie, “On the Protection of Civil Rights in ‘Human Flesh Search’ -From the Perspective of the Conflict Between Privacy and Freedom of Speech”, Journal of Yancheng Institute of Technology (Social Science Edition), vol.9, no.4, pp.78-79, 2018.
. Ding Zhaoyue, “Analysis of the Causes of Network Violence Caused by ‘Human Flesh Search’”, Journal of News Research, vol.26, no.23, pp.41-43, 2018.
. Chen Tianqi, “On Privacy Protection Law from the Perspective of ‘Cyber Manhunt’”, Journal of Harbin University, vol.40, no.7, pp.69-71, 2019.
. Wang Lili, Zhou Xinli, “Research on the Protection of Network Privacy-Thinking from the Cases of Human Flesh Search”, Ability and Wisdom, vol.28, no.31, pp.218-219, 2017.
. Han Rubo, “Sins of the Flesh”, The World of Chinese, vol.20, no.3, pp. 41-45, 2018.
. Tang Yue, “Protection of Internet Personal Information in the Age of ‘Big Data’ —Taking ‘Cyber Manhunt’ as an Example”, Hebei Normal University of Science & Technology( Social Sciences ), vol.17, no.2, pp.69-74, 2018.
. Zhang Li, “Legal Protection of Internet Privacy Rights under the Background of Big Data”, Journal of Heilongjiang Administrative Cadre College of Politics And Law, vol.12, no.4, pp.70-73, 2018.
. Dong Bin, Zheng Linli, “‘Human Flesh Search’: Cyber Violence or Public Opinion Supervision”, Social Sciences Review, vol.31, no.12, pp.128-132, 2016.
. Qi Peng, Cui Shujie, Wu Yu, “Reflection upon the protection of Personal Information Right in China from the Perspective of ‘Human Flesh Search’”, Journal of Lanzhou University(Social Sciences), vol.44, no.4, pp.161-170, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 Meixiang LI
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.