期刊文献+
共找到920篇文章
< 1 2 46 >
每页显示 20 50 100
Data Flow&Transaction Mode Classification and An Explorative Estimation on Data Storage&Transaction Volume 被引量:4
1
作者 Cai Yuezhou Liu Yuexin 《中国经济学人(中英文)》 2022年第6期78-112,共35页
The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete p... The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete picture of data flaw and transaction,this paper presents a systematic overview of the flow and transaction of personal,corporate and public data on the basis of data factor classification from various perspectives.By utilizing various sources of information,this paper estimates the volume of data generation&storage and the volume&trend of data market transactions for major economies in the world with the following findings:(i)Data classification is diverse due to a broad variety of applying scenarios,and data transaction and profit distribution are complex due to heterogenous entities,ownerships,information density and other attributes of different data types.(ii)Global data transaction has presented with the characteristics of productization,servitization and platform-based mode.(iii)For major economies,there is a commonly observed disequilibrium between data generation scale and storage scale,which is particularly striking for China.(i^v)The global data market is in a nascent stage of rapid development with a transaction volume of about 100 billion US dollars,and China s data market is even more underdeveloped and only accounts for some 10%of the world total.All sectors of the society should be flly aware of the diversity and complexity of data factor classification and data transactions,as well as the arduous and long-term nature of developing and improving relevant institutional systems.Adapting to such features,efforts should be made to improve data classification,enhance computing infrastructure development,foster professional data transaction and development institutions,and perfect the data governance system. 展开更多
关键词 data factor data classification data transaction mode data generation&storage volume data transaction volume
在线阅读 下载PDF
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage 被引量:1
2
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions transaction assi gnment
在线阅读 下载PDF
A blockchain-based transaction system for private data sharing and trading 被引量:1
3
作者 Wei Cui Yu Pan Zhendong Ai 《Control Theory and Technology》 EI CSCD 2022年第3期291-302,共12页
To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The... To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The proposed system formulates multiple private data access control strategies,and realizes data trading and sharing through on-chain transactions,which makes transaction records transparent and immutable.In our system,the private data are encrypted,and the role-based account model ensures that access to the data requires owner’s authorization.Moreover,a new consensus protocol named Proof of Transactions(PoT)proposed by ourselves has been used to improve consensus efficiency.The value of Ecare is not only that it aggregates telemedicine,data transactions,and other features,but also that it translates these actions into transaction events stored in the blockchain,making them transparent and immutable to all participants.The proposed system can be extended to more general big data privacy protection and data transaction scenarios. 展开更多
关键词 Private data sharing Blockchain data access control Proof of transactions
原文传递
A Surfing Concurrence Transaction Model for Key-Value NoSQL Databases
4
作者 Changqing Li Jianhua Gu 《Journal of Software Engineering and Applications》 2018年第10期467-485,共19页
As more and more application systems related to big data were developed, NoSQL (Not Only SQL) database systems are becoming more and more popular. In order to add transaction features for some NoSQL database systems, ... As more and more application systems related to big data were developed, NoSQL (Not Only SQL) database systems are becoming more and more popular. In order to add transaction features for some NoSQL database systems, many scholars have tried different techniques. Unfortunately, there is a lack of research on Redis’s transaction in the existing literatures. This paper proposes a transaction model for key-value NoSQL databases including Redis to make possible allowing users to access data in the ACID (Atomicity, Consistency, Isolation and Durability) way, and this model is vividly called the surfing concurrence transaction model. The architecture, important features and implementation principle are described in detail. The key algorithms also were given in the form of pseudo program code, and the performance also was evaluated. With the proposed model, the transactions of Key-Value NoSQL databases can be performed in a lock free and MVCC (Multi-Version Concurrency Control) free manner. This is the result of further research on the related topic, which fills the gap ignored by relevant scholars in this field to make a little contribution to the further development of NoSQL technology. 展开更多
关键词 NOSQL Big data SURFING CONCURRENCE transaction Model KEY-VALUE NOSQL databases REDIS
暂未订购
Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments
5
作者 Boram Kim Guebin Choi 《Computers, Materials & Continua》 2026年第4期1771-1787,共17页
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen... Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios. 展开更多
关键词 Anomaly detection credit card transactions fraud detection graph convolutional networks non-euclidean data
在线阅读 下载PDF
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview 被引量:3
6
作者 Yue Zhou Xin Luo MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1105-1121,共17页
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C... Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field. 展开更多
关键词 Big data analysis cryptocurrency transaction network embedding(CTNE) dynamic network network embedding network representation static network
在线阅读 下载PDF
MR-CLOPE: A Map Reduce based transactional clustering algorithm for DNS query log analysis 被引量:2
7
作者 李晔锋 乐嘉锦 +2 位作者 王梅 张滨 刘良旭 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第9期3485-3494,共10页
DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the alg... DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the algorithm is inefficient when processing large scale data. The MR-CLOPE algorithm is proposed, which is an extension and improvement on CLOPE based on Map Reduce. Different from the previous parallel clustering method, a two-stage Map Reduce implementation framework is proposed. Each of the stage is implemented by one kind Map Reduce task. In the first stage, the DNS query logs are divided into multiple splits and the CLOPE algorithm is executed on each split. The second stage usually tends to iterate many times to merge the small clusters into bigger satisfactory ones. In these two stages, a novel partition process is designed to randomly spread out original sub clusters, which will be moved and merged in the map phrase of the second phase according to the defined merge criteria. In such way, the advantage of the original CLOPE algorithm is kept and its disadvantages are dealt with in the proposed framework to achieve more excellent clustering performance. The experiment results show that MR-CLOPE is not only faster but also has better clustering quality on DNS query logs compared with CLOPE. 展开更多
关键词 DNS data mining MR-CLOPE algorithm transactional clustering algorithm Map Reduce framework
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
8
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication data Integrity transaction Confidentiality Trust Economy
在线阅读 下载PDF
The Role of Big Data Analysis in Digital Currency Systems
9
作者 Zhengkun Xiu 《Proceedings of Business and Economic Studies》 2025年第1期1-5,共5页
In the contemporary era,characterized by the Internet and digitalization as fundamental features,the operation and application of digital currency have gradually developed into a comprehensive structural system.This s... In the contemporary era,characterized by the Internet and digitalization as fundamental features,the operation and application of digital currency have gradually developed into a comprehensive structural system.This system restores the essential characteristics of currency while providing auxiliary services related to the formation,circulation,storage,application,and promotion of digital currency.Compared to traditional currency management technologies,big data analysis technology,which is primarily embedded in digital currency systems,enables the rapid acquisition of information.This facilitates the identification of standard associations within currency data and provides technical support for the operational framework of digital currency. 展开更多
关键词 Big data Digital currency Computational methods transaction speed
在线阅读 下载PDF
数据产品交易定价的现实障碍及因应 被引量:1
10
作者 邓社民 管涛 《中国流通经济》 北大核心 2026年第2期104-116,共13页
数据产品定价是数据作为新型生产要素实现高效能资源配置、提高数据产品流通质量与效率的关键环节。在数字经济浪潮下,构建科学、公平、高效的数据产品交易定价机制,不仅是激活数据要素潜能的内在要求,也是推进数据要素市场化配置改革... 数据产品定价是数据作为新型生产要素实现高效能资源配置、提高数据产品流通质量与效率的关键环节。在数字经济浪潮下,构建科学、公平、高效的数据产品交易定价机制,不仅是激活数据要素潜能的内在要求,也是推进数据要素市场化配置改革的重大战略课题。当前数据产品交易定价的体系性、科学性、协同性不足,集中表现为交易定价的主体不明,易产生权责不清、监管职责不明等问题;价值评估机制缺乏,导致评估范围模糊、标准不一、可信数据来源匮乏;交易定价的利益配置失衡,严重挫伤参与方的积极性,导致交易定价监管机制不完善,容易造成市场失序。究其根源,上述困境集中体现为交易定价机制所面临的深层规制张力。一方面,数据产品的特殊属性要求其定价活动必须置于政府的有效规制中,防止关键数据资源被滥用或不当逐利;另一方面,数据要素的价值释放又不能过度依赖自发议价和短期逐利,防止因交易定价失序引致的目的异化和风险衍生。因此,作为特殊的政策性市场,数据产品定价须从定价主体、评估机制、利益配置与监管机制方面明确规制内容。一是明晰三权分置下数据产品交易定价主体为数据交易所,避免数据产权误用引致的定价混乱;二是完善数据产品交易的价值评估机制,克服“一事一议”的局限性;三是构建按贡献分配的利益共享机制,推动数据定价从小作坊式向结构化、规范化模式转型;四是建立体系化的数据产品交易定价穿透式监管机制,促进数据要素市场的健康、规范与有序发展。 展开更多
关键词 数据产品 数据要素 交易定价 数据流通 数据价值释放
在线阅读 下载PDF
基于两种交易模式数据产品核算的比较
11
作者 贾小爱 韩振华 李云发 《统计与决策》 北大核心 2026年第3期35-40,共6页
根据交易过程是转移所有权还是仅转移使用权,可将数据产品分为货物型数据产品和服务型数据产品。文章基于国民经济核算理论,从生产、收入分配和使用三个层面探讨这两种数据产品的核算区别。研究发现:货物型数据产品的产出类似于货物,按... 根据交易过程是转移所有权还是仅转移使用权,可将数据产品分为货物型数据产品和服务型数据产品。文章基于国民经济核算理论,从生产、收入分配和使用三个层面探讨这两种数据产品的核算区别。研究发现:货物型数据产品的产出类似于货物,按销售数据库缴纳增值税,消费方式为消费者直接获得产品,它形成的数据资产不存在确切的使用年限,资产所有者有权对其进行处置或者买卖,转移资产所有权发生的费用是其固定资本形成的一部分。服务型数据产品的产出类似于服务,按销售服务缴纳增值税,进口缴纳的税收实质上是国内消费税或销售税。服务型数据产品也可以形成固定资产,这种资产是存在确切使用年限的使用许可,持有者无权对其进行处置或者买卖,数据内容发生重大改变或者更新是其固定资本形成的一种方式。两种数据产品的成本和数据内容价值不同,导致二者的价值形成也不同。 展开更多
关键词 数据产品 交易权属 交易模式 核算区别
原文传递
数据资产跨链交易系统架构研究
12
作者 李守伟 唐潇雨 张嘉政 《信息安全研究》 北大核心 2026年第4期366-375,共10页
在数字化时代背景下数据已成为关键生产要素,其交易和管理对促进社会经济增长至关重要.旨在解决现有数据资产所面临的非同一平台跨链交易挑战,分析了数据资产的价值转换路径和交易主体,设计了一个包含系统架构、网络结构和功能流程的跨... 在数字化时代背景下数据已成为关键生产要素,其交易和管理对促进社会经济增长至关重要.旨在解决现有数据资产所面临的非同一平台跨链交易挑战,分析了数据资产的价值转换路径和交易主体,设计了一个包含系统架构、网络结构和功能流程的跨链交易模型.该模型通过区分数据的所有者,建立资产交易链与个人授权链进行跨链数据交易,提高了数据交易的效率和监管的便利性.在此基础上通过构建一个安全、可靠的数据资产跨链交易平台,确保交易的公正性和透明度,同时保护参与者的隐私和数据安全,为数据资产交易市场的稳定发展提供理论和实践上的支持,推动数字经济的进一步发展. 展开更多
关键词 数据资产 数字经济 个人数据 数据交易 跨链
在线阅读 下载PDF
System dynamics based evolutionary game model for data transaction quality regulation
13
作者 Jian YANG Taotao YANG Congcong ZHANG 《Frontiers of Computer Science》 2026年第3期169-172,共4页
1 Introduction.With the rapid development of emerging technologies such as the Internet of Things(IoT)and artificial intelligence(AI),data has become an indispensable key asset and core resource across various industr... 1 Introduction.With the rapid development of emerging technologies such as the Internet of Things(IoT)and artificial intelligence(AI),data has become an indispensable key asset and core resource across various industries[1].Data trading as an emerging business model,relies on high-quality data products for its healthy development[2,3]. 展开更多
关键词 emerging technologies internet things iot system dynamics data transaction quality evolutionary game model internet things business modelrelies artificial intelligence ai data
原文传递
基于区块链的多权威属性基加密方案
14
作者 李杰 马海英 +1 位作者 孙国荣 杨及坤 《计算机应用与软件》 北大核心 2026年第2期356-362,370,共8页
针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间... 针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间的映射关系,实现属性私钥分布式分发和撤销,使得属性撤销无需属性私钥更新,减少用户计算开销。安全性证明和效率分析表明,该方案不仅提高属性私钥撤销的效率,且保障数据的前向和后向安全性。 展开更多
关键词 区块链 多权威属性基加密 细粒度授权 属性撤销 物联网数据交易
在线阅读 下载PDF
国际数据市场的交易机制与定价策略
15
作者 崔璐 魏静怡 +1 位作者 杨凯瑞 钟书华 《科技管理研究》 2026年第4期234-243,共10页
为系统研究国际数据市场的交易机制与定价策略,本文基于文献研究法与案例分析法,梳理了“一对一”(one-to-one)、“多对多”(many-to-many)、“一对多”(one-to-many)、“多对一”(many-to-one)4类市场的运作模式与定价机制。研究结果发... 为系统研究国际数据市场的交易机制与定价策略,本文基于文献研究法与案例分析法,梳理了“一对一”(one-to-one)、“多对多”(many-to-many)、“一对多”(one-to-many)、“多对一”(many-to-one)4类市场的运作模式与定价机制。研究结果发现:“一对一”市场采取协商与套餐定价方式,以满足个性化需求;“多对多”市场借助区块链实现去中心化交易,定价多为卖方主导;“一对多”市场通过标准化应用编程接口与分级定价支持数据分发;“多对一”市场以数据换取服务为主要形式,价格隐含于服务补偿中。各类模式在交易透明度、定价公平性和激励有效性上具有不同特点,其中“一对一”与“多对多”市场在交易安全与数据可控性上表现较好,“一对多”市场效率较高,而“多对一”市场易获取数据。进一步分析表明,数据市场健康发展的核心在于构建公平透明的交易机制、科学合理的定价体系、有效激励制度、第三方监督及数据主权保护框架。基于此,本文从统一市场规划、健全法律保障、建立收益共享与价格发现机制等方面,为我国数据市场发展提出对策建议。 展开更多
关键词 数据 定价机制 数据市场 交易机制 定价策略
在线阅读 下载PDF
电力行业数据要素发展及数据交易关键支撑技术分析
16
作者 李彬 易宸乐 +3 位作者 胡俊豪 张文艳 任婕 康毅 《内蒙古电力技术》 2026年第1期35-44,共10页
以电力行业数据要素发展及数据交易关键支撑技术为研究对象,提出面向电力数据交易的四维核心支撑体系。该体系主要由跨行业多主体数据安全共享、数据撮合交易、数据价值评估及数据使用监督审计技术构成。数据安全共享技术通过多方安全... 以电力行业数据要素发展及数据交易关键支撑技术为研究对象,提出面向电力数据交易的四维核心支撑体系。该体系主要由跨行业多主体数据安全共享、数据撮合交易、数据价值评估及数据使用监督审计技术构成。数据安全共享技术通过多方安全计算与隐私增强机制打破跨行业电力数据壁垒;数据撮合交易技术融合数据经纪人服务与智能撮合交易技术,提升交易效率与匹配精度;数据价值评估技术持续深化电力数据“三化”(资源化、资产化、资本化)路径,同时推动建立电力行业级评估标准体系;数据使用监督审计技术依托数据使用监督审计架构,确保数据防泄露、防滥用和可审计。当前,电力行业面临数据安全与协同增效的深层矛盾,亟需通过联邦学习与可信计算等技术突破、跨域协同机制创新及全生命周期安全管理体系构建,实现安全与效能的动态平衡。 展开更多
关键词 数据要素 数据交易 跨行业安全共享 撮合交易 数据价值评估 监督审计
在线阅读 下载PDF
数据交易平台能促进数据资产形成吗?
17
作者 刘道钦 陈志斌 黄冠华 《中南财经政法大学学报》 北大核心 2026年第1期76-91,共16页
加快数据资产流通交易是推动企业数据资产形成的重要举措。本文选取2011—2023年A股上市公司作为研究样本,构建准自然实验,探讨了数据交易平台对企业数据资产的影响。研究发现,数据交易平台能够促进企业数据资产形成。机制检验表明,数... 加快数据资产流通交易是推动企业数据资产形成的重要举措。本文选取2011—2023年A股上市公司作为研究样本,构建准自然实验,探讨了数据交易平台对企业数据资产的影响。研究发现,数据交易平台能够促进企业数据资产形成。机制检验表明,数据交易平台通过降低交易成本和提高政府创新补助来提升企业数据资产。异质性分析显示,当企业属于高新技术企业,或者处于数据密集型行业、较高的要素市场发育程度地区、较好的市场中介组织发育和法律制度环境时,数据交易平台对企业数据资产的影响效应更显著。经济后果分析表明,数据资产能提高企业价值和推动高质量发展,且数据交易平台能强化这两种影响。本文丰富了数据交易平台的政策效应评估研究,也拓展了数据资产增长的制度动因研究。 展开更多
关键词 数据交易平台 数据资产 交易成本 政府创新补助 数据要素市场化建设
在线阅读 下载PDF
平台经济视角下个人数据交易利益冲突与平衡路径
18
作者 汪晓华 《河北法学》 北大核心 2026年第5期106-128,共23页
数字经济时代个人数据蕴含着巨大的经济价值,但由于其复杂特性导致个人数据交易颇受争议。在构建全国统一大市场过程中,个人数据交易面临诸多问题,这些问题的本质在于利益冲突。基于阿列克西权重方程,对个人数据交易场景下的平台企业与... 数字经济时代个人数据蕴含着巨大的经济价值,但由于其复杂特性导致个人数据交易颇受争议。在构建全国统一大市场过程中,个人数据交易面临诸多问题,这些问题的本质在于利益冲突。基于阿列克西权重方程,对个人数据交易场景下的平台企业与数据来源者、平台企业与数据需求者、平台企业与数据监管者的三种利益冲突类型进行分析,发现其存在利益冲突失衡情形。探究成因可见,个人数据要素特性引发数据确权难题、平台企业和数据需求者之间的信任困境,平台企业数据互联互通的监管边界不明共同导致多元主体之间的利益失衡。故此,宜从重塑个人数据确权的双重权益结构、构建多元的个人数据交易可信体系、优化平台企业数据互联互通监管三方面平衡个人数据交易的利益冲突。 展开更多
关键词 个人数据交易 利益冲突 平台企业 阿列克西权重方程 公私合作
原文传递
上一页 1 2 46 下一页 到第
使用帮助 返回顶部