Author |
Dong Sh., Li X. |
Title of article |
Protection of user’s personal information on social networks: dilemmas of law enforcement practice in China |
Section |
Comparative studies and foreign experience |
Issue, year |
4 (34) 2015 |
Abstract |
The results of the study of characteristic features of social networks in the light of ensuring privacy, protection from criminal encroachments and potential victimization of users in China and other countries of the world are presented. The definition of social networks is given. The tendency of increase in social networking crimes is shown. Various risks and threats to personal user information posted on social networks are analyzed: besides its deliberate disclosure, passive disclosure of such information is also widespread due to the underestimation of threats (unauthorized access to accounts, hacking and violating privacy, the abuse of anonymity of users). Network communication is a subject to various privacy threats: both previously known and new ones. Taking into account the law enforcement practice of China and the experience of other countries, two approaches to ensure privacy in networks are presented (the first one is based on the anonymity of users, the second one – on their real identification). Dilemmas in the field of protection of user information and mode of use of the service are inherent in both approaches. The situation is complicated by significant differences in social and cultural traditions of users and legal and political concepts of different states. In terms of differences in national legislation it’s impossible to create some transnational rules. In this case the international initiative depends on the best way to protect the confidentiality and more successful law enforcement. Only practice can answer the question of whether such protection should be based on the anonymity of user or require universal real identification. |
Keywords |
social networks; security; commission of crime; confidentiality; personal information; law enforcement practice in China. |
References |
1. Ai, H., Maiga, A. & Aimeur, E. (2009). Privacy Protection Issues in Social Networking Sites. In Proceedings of The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009. doi: 10.1109/AICCSA.2009.5069336. 2. Boyd, D. & Ellison, N. (2007). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13 (1), article 11. 3. China National Internet Information Office. (2015). Internet User Account Name Management Regulations. Beijing: China National Internet Information Office. 4. Doyle, J. (2012). A Facebook crime every 40 minutes: From Killings to Grooming as 12,300 Cases Are Linked to the Site. Retrieved 30 May, 2015. Available at: http://www.dailymail.co.uk/news/article-2154624/A-Facebook-crime-40-minutes-12-300-cases-linked-site.html 5. FBI (The Federal Bureau of Investigation). (2015). Internet Social Networking Risks. Retrieved 30 May 2015. Available at: http://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks 6. He, L. & Ma, Y. (2014). Liyong Weixin Fanzui Anjian Pinfa, Guangdong Fayuan Jianyi SHiming Renzheng. People’s Daily. 11 August, 2014, p. 4. 7. International Telecommunication Union (ITU). (2015). ICT Facts & Figures 2015. Switzerland: International Telecommunication Union. 8. Kaye, D. (2015). Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. Geneva, Austria: The United Nations Human Rights Council 29th Session. 9. Li, X. (2008). Cybercrime and Deterrence: Networking Legal Systems in the Networked Information Society, doctoral dissertation, Turku, Finland: University of Turku, Faculty of Law. 10. Li, X. (2009). Social Order in Cyberspace. Hyderabad, India: ICFAI University Press. 11. Li. X. (2014). Phenomenal Exploration into Impact of Anonymity on Law and Order in Cyberspace. Kriminologija i socijalna integracija, vol.22, no. 2. pp. 102-123. 12. Pew Research Center. (2015). Social Networking Fact Sheet. Retrieved 30 May, 2015. Available at: http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/ 13. United Nations Office on Drugs and Crime (UNODC). (2012). The Use of the Internet for Terrorist Purposes. Vienna: United Nations Office on Drugs and Crime. 14. Weisburd, A. A. (2011). Jihadist Use of Social Media: How to Prevent Terrorism and Preserve Innovation, testimony of A. Aaron Weisburd, Director, Society for Internet Research, before the United States House of Representatives Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence, 6 December 2011. |