The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla...The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security asses...Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data.展开更多
The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is o...The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is often constrained by the complexity of tire force expressions and uncertainties in tire model parameters,particularly under diverse and complex driving conditions.To address these challenges,this paper proposes a novel data enforced unscented Kalman filter(DeUKF)approach for precise TRFC estimation in intelligent chassis systems.First,an Unscented Kalman Filter is constructed using a nominal tire model-based vehicle dynamics formulation.Then,leveraging Willems’Fundamental Lemma and historical real-world driving data,the vehicle dynamics model is adap-tively corrected within the Unscented Kalman Filter framework.This correction effectively mitigates the adverse effects of tire model uncertainties,thereby enhancing TRFC estimation accuracy.Finally,real vehicle experiments are conducted to validate the effectiveness and superiority of the proposed method.展开更多
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro...The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries.展开更多
Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the ...Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the influence of international trade.Based on big data technology,this paper builds an industry chain with cross-border e-commerce members'participation,and analyzes the specific application of big data in the product support,internal operation,external marketing,logistics service and service evaluation of cross-border e-commerce industry chain.The purpose is to effectively promote the healthy development of cross-border e-commerce and improve China's trade and economic level.展开更多
Law enforcement agencies have begun utilizing traffic and crash data to improve traffic law enforcement delivery. However, many agencies often do not have the resources or expertise to harness fully the benefits this ...Law enforcement agencies have begun utilizing traffic and crash data to improve traffic law enforcement delivery. However, many agencies often do not have the resources or expertise to harness fully the benefits this data offers. A free to use, scalable traffic crash hot spot detection tool was developed to aid law enforcement agency decision makers, statewide to the local municipality level. The tool was developed to identify crash hot spots algorithmically with </span><span style="font-family:Verdana;">a range of customizable parameters based on location, date and time, and</span><span style="font-family:Verdana;"> crash factors, enabling quick, dynamic queries. These capabilities provide the ability for law enforcement agencies to conduct “what if” analyses and make data-driven allocation decisions, placing officer resources where they are most needed. The two-step algorithm first identifies potential hot spots based on </span><span style="font-family:Verdana;">crash density and then ranks each hot spot using a standardized z-score </span><span style="font-family:Verdana;">measure of relative significance. To test the viability of the tool, a pilot was conducted identifying 27 hot spots across Wisconsin where targeted enforcement was then deployed. Despite officer skepticism, results from the pilot found officers at sites targeted for speeding and seatbelt violations were nearly twice as likely to initiate traffic stops compared to non-targeted hot spots. Empirical Bayes before-and-after crash analyses found fatal and injury crashes reduced significantly by nearly 11% during the months with targeted enforcement, while property damage crashes and total crashes were unchanged. Overall, the results show the algorithm can identify hotspots where, coupled with targeted enforcement, traffic safety improvements can be made.展开更多
Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limi...Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limited. This study analyzed economic efficiency of wildlife law enforcement in terms of resource used and output generated using three different protected areas (PAs) of Serengeti ecosystem namely Serengeti National Park (SENAPA), Ikorongo/Grumeti Game Reserves (IGGR) and Ikona Wildlife Management Area (IWMA). Three years (2010-2012) monthly data on wildlife law enforcement inputs and outputs were collected from respective PAs authorities and supplemented with key informant interviews and secondary data. Questionnaire surveys were conducted to wildlife law enforcement staff. Shadow prices for non-marketed inputs were estimated, and market prices for marketed inputs. Data Envelopment Analysis (DEA) was used to estimate economic efficiency using Variable Return to Scale (VRS) and Constant Return to Scale (CCR) assumptions. Results revealed that wildlife law enforcement in all PAs was economically inefficient, with less inefficiency observed in IWMA. The less inefficiency in IWMA is likely attributed to existing sense of ownership and responsibility created through community-based conservation which resulted in to decrease in law enforcement costs. A slacks evaluation revealed a potential to reduce fuel consumption, number of patrol vehicles, ration and prosecution efforts at different magnitudes between studied protected areas. There is equal potential to recruit more rangers while maintaining the resting time. These finding forms the bases for monitoring and evaluation with respect to resource usage to enhance efficiency. It is further recommended to enhance community participation in conservation in SENAPA and IGGR to lower law enforcement costs. Collaboration between protected area, police and judiciary is fundamental to enhance enforcement efficiency. Despite old dataset, these findings are relevant since neither conservation policy nor institution framework has changed substantially in the last decade.展开更多
Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digi...Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digital trade negotiations could not accommodate these challenges,China has initiated the concept of secure cross-border data flow and has launched a dual-track multi-level regulatory system,including control system for overseas transfer of important data,system of crossborder provision of personal information,and system of cross-border data request for justice and enforcement.To explore a global regulatory framework for cross-border data flows,legitimate and controllable cross-border data flows should be promoted,supervision should be categorized based on risk concerned,and the rule of law should be coordinated at home and abroad to promote system compatibility.To this end,the key is to build a compatible regulatory framework,which includes clarifying the scope of important data to define the“Negative List”for preventing national security risks,improving the cross-border accountability for protecting personal information rights and interests to ease pre-supervision pressure,and focusing on data access rights instead of data localization for upholding the jurisdiction of justice and enforcement.展开更多
In the context of today's big data and cloud computing,the global flow of data has become a powerful driver for international economic and investment growth.The EU and the U.S.have created two different paths for ...In the context of today's big data and cloud computing,the global flow of data has become a powerful driver for international economic and investment growth.The EU and the U.S.have created two different paths for the legal regulation of the cross-border flow of personal data due to their respective historical traditions and realistic demands.The requirements for data protection have shown significant differences.The EU advocates localization of data and firmly restricts cross-border flow of personal data.The U.S.tends to protect personal data through industry self-regulation and government law enforcement.At the same time,these two paths also merge and supplement with each other.Based on this,China needs to learn from the legal regulatory paths of the EU and the US,respectively,to establish a legal idea that places equal emphasis on personal data protection and the development of the information industry.In terms of domestic law,the Cybersecurity Law of the People's Republic of China needs to be improved and supplemented by relevant supporting legislation to improve the operability of the law;the industry self-discipline guidelines should be established;and various types of cross-border data need to be classified and supervised.In terms of international law,it is necessary to participate in international cooperation based on the priority of data sovereignty and promote the signing of bilateral,multilateral agreements,and international treaties on the cross-border flow of personal data.展开更多
基金This paper is a phased result of the“Research on the Issue of China’s Data Export System”(24SFB3035)a research project of the Ministry of Justice of China on the construction of the rule of law and the study of legal theories at the ministerial level in 2024.
文摘The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
基金support from the National Natural Science Foundation of China(Grant No.:71901169)the Shaanxi Province Innovative Talents Promotion Plan-Youth Science and Technology Nova Project(Grant No.:2022KJXX-50).
文摘Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data.
基金Supported by the China’s National Key R&D Program(Grant No.2022YFB2503103).
文摘The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is often constrained by the complexity of tire force expressions and uncertainties in tire model parameters,particularly under diverse and complex driving conditions.To address these challenges,this paper proposes a novel data enforced unscented Kalman filter(DeUKF)approach for precise TRFC estimation in intelligent chassis systems.First,an Unscented Kalman Filter is constructed using a nominal tire model-based vehicle dynamics formulation.Then,leveraging Willems’Fundamental Lemma and historical real-world driving data,the vehicle dynamics model is adap-tively corrected within the Unscented Kalman Filter framework.This correction effectively mitigates the adverse effects of tire model uncertainties,thereby enhancing TRFC estimation accuracy.Finally,real vehicle experiments are conducted to validate the effectiveness and superiority of the proposed method.
基金a preliminary result of the Chinese Government Scholarship High-level Graduate Program sponsored by China Scholarship Council(Program No.CSC202206310052)。
文摘The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries.
文摘Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the influence of international trade.Based on big data technology,this paper builds an industry chain with cross-border e-commerce members'participation,and analyzes the specific application of big data in the product support,internal operation,external marketing,logistics service and service evaluation of cross-border e-commerce industry chain.The purpose is to effectively promote the healthy development of cross-border e-commerce and improve China's trade and economic level.
文摘Law enforcement agencies have begun utilizing traffic and crash data to improve traffic law enforcement delivery. However, many agencies often do not have the resources or expertise to harness fully the benefits this data offers. A free to use, scalable traffic crash hot spot detection tool was developed to aid law enforcement agency decision makers, statewide to the local municipality level. The tool was developed to identify crash hot spots algorithmically with </span><span style="font-family:Verdana;">a range of customizable parameters based on location, date and time, and</span><span style="font-family:Verdana;"> crash factors, enabling quick, dynamic queries. These capabilities provide the ability for law enforcement agencies to conduct “what if” analyses and make data-driven allocation decisions, placing officer resources where they are most needed. The two-step algorithm first identifies potential hot spots based on </span><span style="font-family:Verdana;">crash density and then ranks each hot spot using a standardized z-score </span><span style="font-family:Verdana;">measure of relative significance. To test the viability of the tool, a pilot was conducted identifying 27 hot spots across Wisconsin where targeted enforcement was then deployed. Despite officer skepticism, results from the pilot found officers at sites targeted for speeding and seatbelt violations were nearly twice as likely to initiate traffic stops compared to non-targeted hot spots. Empirical Bayes before-and-after crash analyses found fatal and injury crashes reduced significantly by nearly 11% during the months with targeted enforcement, while property damage crashes and total crashes were unchanged. Overall, the results show the algorithm can identify hotspots where, coupled with targeted enforcement, traffic safety improvements can be made.
文摘Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limited. This study analyzed economic efficiency of wildlife law enforcement in terms of resource used and output generated using three different protected areas (PAs) of Serengeti ecosystem namely Serengeti National Park (SENAPA), Ikorongo/Grumeti Game Reserves (IGGR) and Ikona Wildlife Management Area (IWMA). Three years (2010-2012) monthly data on wildlife law enforcement inputs and outputs were collected from respective PAs authorities and supplemented with key informant interviews and secondary data. Questionnaire surveys were conducted to wildlife law enforcement staff. Shadow prices for non-marketed inputs were estimated, and market prices for marketed inputs. Data Envelopment Analysis (DEA) was used to estimate economic efficiency using Variable Return to Scale (VRS) and Constant Return to Scale (CCR) assumptions. Results revealed that wildlife law enforcement in all PAs was economically inefficient, with less inefficiency observed in IWMA. The less inefficiency in IWMA is likely attributed to existing sense of ownership and responsibility created through community-based conservation which resulted in to decrease in law enforcement costs. A slacks evaluation revealed a potential to reduce fuel consumption, number of patrol vehicles, ration and prosecution efforts at different magnitudes between studied protected areas. There is equal potential to recruit more rangers while maintaining the resting time. These finding forms the bases for monitoring and evaluation with respect to resource usage to enhance efficiency. It is further recommended to enhance community participation in conservation in SENAPA and IGGR to lower law enforcement costs. Collaboration between protected area, police and judiciary is fundamental to enhance enforcement efficiency. Despite old dataset, these findings are relevant since neither conservation policy nor institution framework has changed substantially in the last decade.
基金This article is funded by National Social Science Foundation’s general project“Theoretical and Practical Research on International Criminal Judicial Assistance in Combating Cybercrime”(Project No.:19BFX073)National Social Science Foundation’s major project“Translation,Research and Database Construction of Cyberspace Policies and Regulations”(Project No.:20&ZD179).
文摘Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digital trade negotiations could not accommodate these challenges,China has initiated the concept of secure cross-border data flow and has launched a dual-track multi-level regulatory system,including control system for overseas transfer of important data,system of crossborder provision of personal information,and system of cross-border data request for justice and enforcement.To explore a global regulatory framework for cross-border data flows,legitimate and controllable cross-border data flows should be promoted,supervision should be categorized based on risk concerned,and the rule of law should be coordinated at home and abroad to promote system compatibility.To this end,the key is to build a compatible regulatory framework,which includes clarifying the scope of important data to define the“Negative List”for preventing national security risks,improving the cross-border accountability for protecting personal information rights and interests to ease pre-supervision pressure,and focusing on data access rights instead of data localization for upholding the jurisdiction of justice and enforcement.
基金This article is supported by Law and Technology Institute,Renmin University of China.All mistakes and omissions are the responsibility of the author.
文摘In the context of today's big data and cloud computing,the global flow of data has become a powerful driver for international economic and investment growth.The EU and the U.S.have created two different paths for the legal regulation of the cross-border flow of personal data due to their respective historical traditions and realistic demands.The requirements for data protection have shown significant differences.The EU advocates localization of data and firmly restricts cross-border flow of personal data.The U.S.tends to protect personal data through industry self-regulation and government law enforcement.At the same time,these two paths also merge and supplement with each other.Based on this,China needs to learn from the legal regulatory paths of the EU and the US,respectively,to establish a legal idea that places equal emphasis on personal data protection and the development of the information industry.In terms of domestic law,the Cybersecurity Law of the People's Republic of China needs to be improved and supplemented by relevant supporting legislation to improve the operability of the law;the industry self-discipline guidelines should be established;and various types of cross-border data need to be classified and supervised.In terms of international law,it is necessary to participate in international cooperation based on the priority of data sovereignty and promote the signing of bilateral,multilateral agreements,and international treaties on the cross-border flow of personal data.