Open Journal of Social Sciences

Volume 11, Issue 11 (November 2023)

ISSN Print: 2327-5952   ISSN Online: 2327-5960

Google-based Impact Factor: 0.73  Citations  

The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example

HTML  XML Download Download as PDF (Size: 313KB)  PP. 533-550  
DOI: 10.4236/jss.2023.1111035    38 Downloads   128 Views  
Author(s)

ABSTRACT

Against the backdrop of the continuous development of the data economy and the widespread application of algorithm technology, the protection of data security and privacy has increasingly become a concern for countries, society, enterprises, and individuals. As a new algorithm technology, privacy computing is known as the “optimal solution for data security and privacy protection” due to its “available and invisible” technical characteristics and wide applicability. However, the issue of immature privacy computing technology is becoming increasingly prominent, and the deep-seated contradiction between data utilization and data protection cannot be fundamentally resolved, which seriously restricts the practicality of privacy computing application scenarios. The risks faced by privacy computing not only have their own technological flaws, but also traditional risk prevention and regulation methods still have incompatibilities in addressing compliance issues in privacy computing. There are a series of risks such as unclear legal status of participating methods, high cost of algorithm interpretation, and inaccurate calculation results. Resolving these risks requires starting from the current development status of privacy computing. Targeted modifications and improvements should be made to the application difficulties of China’s risk regulation methods for privacy computing, in order to explore the establishment of a data governance compliance system to solve algorithmic problems and promote the practicality of new algorithmic technologies represented by privacy computing.

Share and Cite:

Liu, X. (2023) The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example. Open Journal of Social Sciences, 11, 533-550. doi: 10.4236/jss.2023.1111035.

Cited by

No relevant information.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.