首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration 中国跨境数据传输监管方式的发展:放宽与整合
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105997
Meng Chen (Associate Professor)

This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.

本文阐述了从整体国家安全观到兼顾个人信息保护与数字经济发展的中国跨境数据流动监管制度的发展历程。在数字经济发展和全球数据治理呼声日益高涨的压力下,中国正在逐步完善和修改原有的由政府主导的限制性跨境数据法规。随后的实践以及 2024 年 3 月《关于促进和规范跨境数据传输的若干规定》(PPR)的发布,都释放出对跨境数据流动,尤其是个人信息出境传输限制放宽的明显信号。与《区域全面经济伙伴关系协定》(RCEP)、《跨太平洋伙伴关系全面进步协定》(CPTPP)和《数字经济伙伴关系协定》(DEPA)中的数据条款进行详细比较后发现,即使目前各国的做法各自为政,跨境数据流动的全球治理也是不成形的,但并非不现实。中国已经建立了完整的个人信息保护法律体系,并即将融入跨国合作,建立更广泛的框架。此外,通过协调国家有关跨境数据传输的规定与国际规则,以及在众多自由贸易试验区(PFTZ)试点宽松的跨境数据监管机制,中国已做好准备,逐步发展跨境数据流动法规,为全球数据治理做出贡献。
{"title":"Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration","authors":"Meng Chen (Associate Professor)","doi":"10.1016/j.clsr.2024.105997","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105997","url":null,"abstract":"<div><p>This article illustrates the developing Chinese cross-border data flow regulation regime deriving from a holistic national security conception to its balance with personal information protection and digital economic development. Under the pressuring demand of digital economy development and an increasing appeal to global data governance, China is progressively improving and modifying its original government-led and restrictive cross-border data regulations. Subsequent practices and the publication of the Provisions on Promoting and Regulating Cross-border Data Transfer (PPR) in March 2024 deliver a clear sign of relaxation on restrictions on cross-border data flow, especially on the subject of personal information outbound transfer. Detailed comparison with data provisions in the Regional Comprehensive Economic Partnership (RCEP), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and the Digital Economy Partnership Agreement (DEPA) demonstrates that global governance of cross-border data flows is unshaped but not unrealistic, even with current fragmented national approaches. China has established a complete personal information protection legal regime and is very close to integrating into transnational cooperation for a broader framework. In addition, by coordinating national provisions regarding cross-data transfer with international rules and piloting lenient cross-border data supervision mechanisms in numerous Pilot Free Trade Zone (PFTZ), China is ready to evolve its cross-border data flow regulations and contribute to global data governance step-by-step.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-fungible tokens, tokenization, and ownership 不可兑换代币、代币化和所有权
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105996
Janne Kaisto , Teemu Juutilainen , Joona Kauranen

The emergence of non-fungible tokens (NFTs) in the blockchain environment has prompted many intriguing questions for private law scholars around the world. A question as basic as whether NFTs can be owned has proven difficult in many countries. This is the first research question of our article, which focuses on NFTs created in the Ethereum system by utilizing standard ERC-721. Because these NFTs are identifiable and distinguishable from all other tokens, the notion of owning an NFT is not unthinkable. Yet no universal answer can be offered. Whether NFTs qualify as objects of ownership must be studied at the level of individual legal systems. We argue that NFTs can be owned under Finnish law, with the same probably applying to many other legal systems. Starting with this notion, we pose two further research questions. As the second research question, we ask what problems of a patrimonial law nature may arise in attempts to connect different kinds of rights, even irrevocably, to owning or holding an NFT. Creditor rights seem relatively easy in this respect because most legal systems allow prospective debtors to obligate themselves as they wish. We also study whether a limited liability company could issue an NFT as a share certificate with legal effects corresponding to those of a physical (paper) share certificate. While an affirmative answer could be justified in some legal systems, Finnish law makes it difficult to tokenize a company's shares other than in the framework of a settlement system within the meaning of the European Union's DLT Pilot Regulation. Even greater difficulties arise in attempts to connect the ownership of a (material) thing and of an NFT so that a person who owns a token also owns the thing. Our third and final research question addresses tokenization of digital art, which gives rise to some special questions. We ask what rights the transferee of an NFT can receive in connection with tokenization of digital art. Here, our main finding is that digital art can be meaningfully tokenized even though digital copies are not regarded as possible objects of ownership.

区块链环境中出现的不可篡改代币(NFT)给世界各地的私法学者带来了许多引人入胜的问题。在许多国家,NFT 是否可以被拥有这样一个基本问题已被证明是个难题。这是我们这篇文章的第一个研究问题,它主要关注在以太坊系统中利用标准 ERC-721 创建的 NFT。由于这些 NFT 与其他所有代币都是可识别和可区分的,因此拥有 NFT 的概念并非不可想象。然而,我们无法给出一个普遍的答案。NFT 是否有资格成为所有权的客体,必须在个别法律制度的层面上进行研究。我们认为,根据芬兰法律,可以拥有 NFT,这可能同样适用于许多其他法律体系。从这一概念出发,我们提出了两个进一步的研究问题。作为第二个研究问题,我们要问的是,在试图将不同类型的权利(甚至是不可撤销的权利)与拥有或持有 NFT 联系起来时,可能会出现哪些继承法性质的问题。在这方面,债权人的权利似乎相对容易,因为大多数法律制度允许潜在债务人按照自己的意愿承担义务。我们还研究了有限责任公司是否可以将非流动资金作为股票发行,并具有与实物(纸质)股票相应的法律效力。虽然在某些法律体系中,肯定的答案是合理的,但芬兰法律规定,除了在欧盟 DLT 试点法规意义上的结算系统框架内,很难将公司股份代币化。如果试图将(物质)物品的所有权与 NFT 的所有权联系起来,使拥有代币的人也拥有该物品,则会遇到更大的困难。我们的第三个也是最后一个研究问题涉及数字艺术的代币化,这就产生了一些特殊的问题。我们要问的是,在数字艺术品的代币化过程中,NFT 的受让人可以获得哪些权利。在此,我们的主要发现是,即使数字副本不被视为所有权的可能客体,数字艺术也可以被有意义地标记化。
{"title":"Non-fungible tokens, tokenization, and ownership","authors":"Janne Kaisto ,&nbsp;Teemu Juutilainen ,&nbsp;Joona Kauranen","doi":"10.1016/j.clsr.2024.105996","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105996","url":null,"abstract":"<div><p>The emergence of non-fungible tokens (NFTs) in the blockchain environment has prompted many intriguing questions for private law scholars around the world. A question as basic as whether NFTs can be owned has proven difficult in many countries. This is the first research question of our article, which focuses on NFTs created in the Ethereum system by utilizing standard ERC-721. Because these NFTs are identifiable and distinguishable from all other tokens, the notion of owning an NFT is not unthinkable. Yet no universal answer can be offered. Whether NFTs qualify as objects of ownership must be studied at the level of individual legal systems. We argue that NFTs can be owned under Finnish law, with the same probably applying to many other legal systems. Starting with this notion, we pose two further research questions. As the second research question, we ask what problems of a patrimonial law nature may arise in attempts to connect different kinds of rights, even irrevocably, to owning or holding an NFT. Creditor rights seem relatively easy in this respect because most legal systems allow prospective debtors to obligate themselves as they wish. We also study whether a limited liability company could issue an NFT as a share certificate with legal effects corresponding to those of a physical (paper) share certificate. While an affirmative answer could be justified in some legal systems, Finnish law makes it difficult to tokenize a company's shares other than in the framework of a settlement system within the meaning of the European Union's DLT Pilot Regulation. Even greater difficulties arise in attempts to connect the ownership of a (material) thing and of an NFT so that a person who owns a token also owns the thing. Our third and final research question addresses tokenization of digital art, which gives rise to some special questions. We ask what rights the transferee of an NFT can receive in connection with tokenization of digital art. Here, our main finding is that digital art can be meaningfully tokenized even though digital copies are not regarded as possible objects of ownership.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000633/pdfft?md5=838d6e36f0dd3951b89091ec34f342ef&pid=1-s2.0-S0267364924000633-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China 从布鲁塞尔效应到重力助推:了解受 GDPR 启示的个人信息保护法在中国的发展历程
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-08 DOI: 10.1016/j.clsr.2024.105994
Wenlong Li , Jiahong Chen

This paper explores the evolution of China's Personal Information Protection Law (PIPL) and situates it within the context of global data protection development. It draws inspiration from the theory of ‘Brussels Effect’ and provides a critical account of its application in non-Western jurisdictions, taking China as a prime example. Our objective is not to provide a comparative commentary on China's legal development but to illuminate the intricate dynamics between the Chinese law and the EU's GDPR. We argue that the trajectory of China's Personal Information Protection Law calls into question the applicability of the Brussels Effect: while the GDPR's imprint on the PIPL is evident, a deeper analysis unveils China's nuanced, non-linear adoption that diverges from many assumptions of the Brussels Effect and similar theories. The evolution of the GDPR-inspired PIPL is not as a straightforward outcome of the Brussels Effect but as a nuanced, intricate interplay of external influence and domestic dynamics. We introduce a complementary theory of ‘gravity assist’, which portrays China's strategic instrumentalisation of the GDPR as a template to shape its unique data protection landscape. Our theoretical framework highlights how China navigates through a patchwork of internal considerations, international standards, and strategic choices, ultimately sculpting a data protection regime that has a similar appearance to the GDPR but aligns with its distinct political, cultural and legal landscape. With a detailed historical and policy analysis of the PIPL, coupled with reasonable speculations on its future avenues, our analysis presents a pragmatic, culturally congruent approach to legal development in China. It signals a trajectory that, while potentially converging at a principled level, is likely to diverge significantly in practice, driven by China's broader socio-political and economic agendas rather than the foundational premises of EU data protection law and its global aspirations. It thus indicates the inherent limitations of applying Brussels Effect and other theoretical frameworks to non-Western jurisdictions, highlighting the imperative for integrating complementary theories to more accurately navigate complex legal landscapes.

本文探讨了中国《个人信息保护法》(PIPL)的演变,并将其置于全球数据保护发展的背景之下。本文从 "布鲁塞尔效应 "理论中汲取灵感,以中国为例,对该理论在非西方司法管辖区的应用进行了批判性阐述。我们的目的不是对中国的法律发展进行比较评论,而是阐明中国法律与欧盟 GDPR 之间错综复杂的动态关系。我们认为,中国《个人信息保护法》的发展轨迹令人质疑布鲁塞尔效应的适用性:虽然 GDPR 对中国《个人信息保护法》的影响是显而易见的,但更深入的分析揭示了中国细微的、非线性的采纳情况,这与布鲁塞尔效应和类似理论的许多假设相背离。受 GDPR 启发的 PIPL 的演变并不是布鲁塞尔效应的直接结果,而是外部影响与国内动力之间微妙而复杂的相互作用。我们引入了 "重力辅助 "的补充理论,描绘了中国将 GDPR 作为模板,塑造其独特数据保护格局的战略工具。我们的理论框架强调了中国如何通过内部考虑、国际标准和战略选择的拼凑,最终塑造出一个与 GDPR 外形相似,但符合其独特的政治、文化和法律环境的数据保护制度。通过对 PIPL 的详细历史和政策分析,以及对其未来发展道路的合理推测,我们的分析为中国的法律发展提供了一种务实、与文化相一致的方法。这预示着,虽然在原则层面可能趋于一致,但在实践中可能会出现重大分歧,其驱动力是中国更广泛的社会政治和经济议程,而非欧盟数据保护法的基本前提及其全球抱负。因此,这表明将布鲁塞尔效应和其他理论框架应用于非西方司法管辖区存在固有的局限性,突出了整合互补理论以更准确地驾驭复杂法律环境的必要性。
{"title":"From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China","authors":"Wenlong Li ,&nbsp;Jiahong Chen","doi":"10.1016/j.clsr.2024.105994","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105994","url":null,"abstract":"<div><p>This paper explores the evolution of China's Personal Information Protection Law (PIPL) and situates it within the context of global data protection development. It draws inspiration from the theory of ‘Brussels Effect’ and provides a critical account of its application in non-Western jurisdictions, taking China as a prime example. Our objective is not to provide a comparative commentary on China's legal development but to illuminate the intricate dynamics between the Chinese law and the EU's GDPR. We argue that the trajectory of China's Personal Information Protection Law calls into question the applicability of the Brussels Effect: while the GDPR's imprint on the PIPL is evident, a deeper analysis unveils China's nuanced, non-linear adoption that diverges from many assumptions of the Brussels Effect and similar theories. The evolution of the GDPR-inspired PIPL is not as a straightforward outcome of the Brussels Effect but as a nuanced, intricate interplay of external influence and domestic dynamics. We introduce a complementary theory of ‘gravity assist’, which portrays China's strategic instrumentalisation of the GDPR as a template to shape its unique data protection landscape. Our theoretical framework highlights how China navigates through a patchwork of internal considerations, international standards, and strategic choices, ultimately sculpting a data protection regime that has a similar appearance to the GDPR but aligns with its distinct political, cultural and legal landscape. With a detailed historical and policy analysis of the PIPL, coupled with reasonable speculations on its future avenues, our analysis presents a pragmatic, culturally congruent approach to legal development in China. It signals a trajectory that, while potentially converging at a principled level, is likely to diverge significantly in practice, driven by China's broader socio-political and economic agendas rather than the foundational premises of EU data protection law and its global aspirations. It thus indicates the inherent limitations of applying Brussels Effect and other theoretical frameworks to non-Western jurisdictions, highlighting the imperative for integrating complementary theories to more accurately navigate complex legal landscapes.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S026736492400061X/pdfft?md5=9c7fcdd53bcd61a59b343d95a6550735&pid=1-s2.0-S026736492400061X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141291116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European National News 欧洲国家新闻
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-05 DOI: 10.1016/j.clsr.2024.105998
Nick Pantlin

This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal’s feature articles and briefing notes by keeping readers abreast of what is currently happening "on the ground" at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.

本文跟踪欧洲主要国家在信息技术和通信领域的国家级发展,并提供重要国家发展的简明提示服务。它由赫伯特-斯密-弗里希尔斯律师事务所(Herbert Smith Freehills LLP)协调,并由欧洲各地的律师事务所撰稿。本专栏提供欧洲主要国家重要事态发展的简明提示服务。其部分目的是通过让读者了解目前在国家层面实施欧盟立法和国际公约及条约的 "实地 "情况,从而对《日刊》的专题文章和简报进行补充。如果某条欧洲国家新闻特别重要,CLSR 也可能在当期或后续版本中对其进行更详细的报道。
{"title":"European National News","authors":"Nick Pantlin","doi":"10.1016/j.clsr.2024.105998","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105998","url":null,"abstract":"<div><p>This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal’s feature articles and briefing notes by keeping readers abreast of what is currently happening \"on the ground\" at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141249410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions 为加强欧洲(不)安全而前瞻性地实施人工智能:自动旅行授权决定的推理挑战
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-04 DOI: 10.1016/j.clsr.2024.105995
Erzsébet Csatlós

The European Travel Information and Authorisation System, along with the automated decision-making system for immigration filtering, is soon to become a guardian controlling entry into Europe. In the digital realm of issuing travel authorisations, a central question arises: does streamlining the process of using an authoritative decision through IT tools and artificial intelligence simplify administrative decision-making, or does it raise more profound legal issues? The pressing question is whether algorithms will ultimately determine human destinies, or if we have not reached that point yet. This paper examines the set of rules for making a decision on the refusal of a travel permit, considering the obligations tied to providing reasons for such decisions. It emphasizes that the rationale should be built upon a combination of factual and legal foundations, which would entail revealing data linked to profiling. While explicit rights for explanations might not be granted, having substantial information gives the ability to contest decisions. To ensure decisions are well-founded, the methodology used for profiling must support these determinations, as general system descriptions are inadequate for clarifying specific cases. Therefore, the paper concludes that the complex interaction between the ETIAS screening process, data protection laws, and national security concerns presents a challenging situation for procedural rights. Fundamental rights, such as accessing records and receiving decision explanations, clash with the necessity to safeguard national security and build a so-called security union for Europe, it establishes a feeling of insecurity about respect for EU values.

欧洲旅行信息和授权系统以及移民过滤自动决策系统很快将成为控制进入欧洲的监护人。在签发旅行授权的数字领域,一个核心问题出现了:通过信息技术工具和人工智能简化使用权威决定的过程,是简化了行政决策,还是引发了更深刻的法律问题?当务之急是,算法是否会最终决定人类的命运,或者我们是否还没有到那一步。本文研究了拒绝旅行许可决定的一系列规则,并考虑了为此类决定提供理由的相关义务。本文强调,理由应建立在事实和法律基础的结合之上,这就需要披露与特征分析有关的数据。虽然可能不会赋予明确的解释权,但掌握大量信息就有能力对决定提出质疑。为确保决定有理有据,貌相所使用的方法必须支持这些决定,因为一般的系统描述不足以澄清具体案件。因此,本文的结论是,ETIAS 筛选程序、数据保护法和国家安全关切之间复杂的互动关系给程序性权利带来了挑战。基本权利,如查阅记录和获得决定解释,与保障国家安全和建立所谓的欧洲安全联盟的必要性相冲突,这使人们对尊重欧盟价值观产生了不安全感。
{"title":"Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions","authors":"Erzsébet Csatlós","doi":"10.1016/j.clsr.2024.105995","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105995","url":null,"abstract":"<div><p>The <em>European Travel Information and Authorisation System</em>, along with the automated decision-making system for immigration filtering, is soon to become a guardian controlling entry into Europe. In the digital realm of issuing travel authorisations, a central question arises: does streamlining the process of using an authoritative decision through IT tools and artificial intelligence simplify administrative decision-making, or does it raise more profound legal issues? The pressing question is whether algorithms will ultimately determine human destinies, or if we have not reached that point yet. This paper examines the set of rules for making a decision on the refusal of a travel permit, considering the obligations tied to providing <em>reasons</em> for such decisions. It emphasizes that the rationale should be built upon a combination of factual and legal foundations, which would entail revealing data linked to profiling. While explicit rights for explanations might not be granted, having substantial information gives the ability to contest decisions. To ensure decisions are well-founded, the methodology used for profiling must support these determinations, as general system descriptions are inadequate for clarifying specific cases. Therefore, the paper concludes that the complex interaction between the ETIAS screening process, data protection laws, and national security concerns presents a challenging situation for procedural rights. Fundamental rights, such as accessing records and receiving decision explanations, clash with the necessity to safeguard national security and build a so-called security union for Europe, it establishes a feeling of insecurity about respect for EU values.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asia–Pacific developments 亚太地区的发展
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-03 DOI: 10.1016/j.clsr.2024.105991
Gabriela Kennedy

This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.

本专栏逐国分析亚太地区主要司法管辖区与 IT、媒体和电信行业相关的最新法律发展、案例和问题。本专栏中出现的文章旨在作为 "提醒",而不是作为案件或法律发展的详细分析提交。
{"title":"Asia–Pacific developments","authors":"Gabriela Kennedy","doi":"10.1016/j.clsr.2024.105991","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105991","url":null,"abstract":"<div><p>This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond 网络安全漏洞披露的法律问题:《国家信息安全计划 2》及其他
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-06-03 DOI: 10.1016/j.clsr.2024.105988
Jakub Vostoupal , Václav Stupka , Jakub Harašta , František Kasl , Pavel Loutocký , Kamil Malinka

This paper focuses on the legal aspects of responsible vulnerability disclosure, bug bounty programs and legal risks associated with their implementation in the Czech Republic. Firstly, the authors introduce the basics of vulnerability disclosure procedures, identify different organisational models, and identify risks that may arise on the part of the organisation launching the bug bounty program or the hackers participating in it. The identified risks are divided into those arising from civil law, administrative law, and criminal law. For each identified risk, the authors then propose appropriate technical, organisation or legal solutions that can be applied to eliminate or reduce these risks. Nevertheless, the authors identified two areas that cannot be sufficiently mitigated through existing tools and laws and are likely to require legislative intervention – the matter of safeguarding the anonymity of reporters through confidentiality, and the problematic ability to consent to the testing procedures by the public bodies.

本文重点探讨了负责任的漏洞披露、漏洞悬赏计划的法律问题以及在捷克共和国实施漏洞悬赏计划的相关法律风险。首先,作者介绍了漏洞披露程序的基本原理,确定了不同的组织模式,并指出了发起漏洞悬赏计划的组织或参与计划的黑客可能面临的风险。所确定的风险分为民法、行政法和刑法引起的风险。然后,作者针对每项确定的风险提出了适当的技术、组织或法律解决方案,以消除或降低这些风险。不过,作者发现有两个领域无法通过现有工具和法律充分降低风险,可能需要立法干预--即通过保密来保护报告人的匿名性问题,以及公共机构同意测试程序的能力问题。
{"title":"The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond","authors":"Jakub Vostoupal ,&nbsp;Václav Stupka ,&nbsp;Jakub Harašta ,&nbsp;František Kasl ,&nbsp;Pavel Loutocký ,&nbsp;Kamil Malinka","doi":"10.1016/j.clsr.2024.105988","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105988","url":null,"abstract":"<div><p>This paper focuses on the legal aspects of responsible vulnerability disclosure, bug bounty programs and legal risks associated with their implementation in the Czech Republic. Firstly, the authors introduce the basics of vulnerability disclosure procedures, identify different organisational models, and identify risks that may arise on the part of the organisation launching the bug bounty program or the hackers participating in it. The identified risks are divided into those arising from civil law, administrative law, and criminal law. For each identified risk, the authors then propose appropriate technical, organisation or legal solutions that can be applied to eliminate or reduce these risks. Nevertheless, the authors identified two areas that cannot be sufficiently mitigated through existing tools and laws and are likely to require legislative intervention – the matter of safeguarding the anonymity of reporters through confidentiality, and the problematic ability to consent to the testing procedures by the public bodies.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EU Regulatory approach(es) to AI liability, and its Application to the financial services market 欧盟对人工智能责任的监管方法及其在金融服务市场的应用
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-31 DOI: 10.1016/j.clsr.2024.105984
Maria Lillà Montagnani , Marie-Claire Najjar , Antonio Davola

The continued progress of Artificial Intelligence (AI) can benefit different aspects of society and various fields of the economy, yet pose crucial risks to both those who offer such technologies and those who use them. These risks are emphasized by the unpredictability of developments in AI technology (such as the increased level of autonomy of self-learning systems), which renders it even more difficult to build a comprehensive legal framework accounting for all potential legal and ethical issues arising from the use of AI. As such, enforcement authorities are facing increased difficulties in checking compliance with applicable legislation and assessing liability, due to the specific features of AI, – namely: complexity, opacity, autonomy, unpredictability, openness, data-drivenness, and vulnerability. These problems are particularly significant in areas, such as financial markets, in which consequences arising from malfunctioning of AI systems are likely to have a major impact both in terms of individuals' protection, and of overall market stability. This scenario challenges policymaking in an increasingly digital and global context, where it becomes difficult for regulators to predict and face the impact of AI systems on economy and society, to make sure that they are human-centric, ethical, explainable, sustainable and respectful of fundamental rights and values. The European Union has been dedicating increased attention to filling the gap between the existing legal framework and AI. Some of the legislative proposals in consideration call for preventive legislation and introduce obligations on different actors – such as the AI Act – while others have a compensatory scope and seek to build a liability framework – such as the proposed AI Liability Directive and revised Product Liability Directive. At the same time, cross-sectorial regulations shall coexist with sector-specific initiatives, and the rules they establish. The present paper starts by assessing the fit of the existing European liability regime(s) with the constantly evolving AI landscape, by identifying the normative foundations on which a liability regime for such technology should be built on. It then addresses the proposed additions and revisions to the legislation, focusing on how they seek to govern AI systems, with a major focus on their implications on highly-regulated complex systems such as financial markets. Finally, it considers potential additional measures that could continue to strike a balance between the interests of all parties, namely by seeking to reduce the inherent risks that accompany the use of AI and to leverage its major benefits for our society and economy.

人工智能(AI)的不断进步可以造福于社会的各个方面和经济的各个领域,但同时也给这些技术的提供者和使用者带来了重大风险。这些风险因人工智能技术发展的不可预测性(如自学系统自主性的提高)而变得更加突出,这使得建立一个全面的法律框架来应对人工智能使用过程中可能产生的所有法律和道德问题变得更加困难。因此,由于人工智能的特殊性--即复杂性、不透明性、自主性、不可预测性、开放性、数据驱动性和脆弱性,执法机关在检查适用法律的遵守情况和评估责任方面面临更多困难。这些问题在金融市场等领域尤为突出,因为在这些领域,人工智能系统失灵造成的后果可能会对个人保护和整体市场稳定产生重大影响。这种情况对日益数字化和全球化背景下的政策制定提出了挑战,监管机构难以预测和面对人工智能系统对经济和社会的影响,也难以确保这些系统以人为本、合乎道德、可解释、可持续并尊重基本权利和价值观。欧盟越来越重视填补现有法律框架与人工智能之间的空白。正在审议的一些立法提案要求制定预防性立法,并对不同行为者引入义务--如《人工智能法》,而另一些提案则具有补偿范围,并寻求建立一个责任框架--如拟议的《人工智能责任指令》和经修订的《产品责任指令》。同时,跨部门法规应与具体部门的倡议及其制定的规则共存。本文首先评估了现有欧洲责任制度与不断演变的人工智能环境的契合度,确定了此类技术的责任制度应建立的规范基础。然后,本文讨论了对立法的拟议增补和修订,重点关注它们如何管理人工智能系统,主要侧重于它们对金融市场等高度受监管的复杂系统的影响。最后,它考虑了可能的补充措施,这些措施可以继续平衡各方利益,即设法降低使用人工智能所带来的固有风险,并利用其为我们的社会和经济带来的重大利益。
{"title":"The EU Regulatory approach(es) to AI liability, and its Application to the financial services market","authors":"Maria Lillà Montagnani ,&nbsp;Marie-Claire Najjar ,&nbsp;Antonio Davola","doi":"10.1016/j.clsr.2024.105984","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105984","url":null,"abstract":"<div><p>The continued progress of Artificial Intelligence (AI) can benefit different aspects of society and various fields of the economy, yet pose crucial risks to both those who offer such technologies and those who use them. These risks are emphasized by the unpredictability of developments in AI technology (such as the increased level of autonomy of self-learning systems), which renders it even more difficult to build a comprehensive legal framework accounting for all potential legal and ethical issues arising from the use of AI. As such, enforcement authorities are facing increased difficulties in checking compliance with applicable legislation and assessing liability, due to the specific features of AI, – namely: complexity, opacity, autonomy, unpredictability, openness, data-drivenness, and vulnerability. These problems are particularly significant in areas, such as financial markets, in which consequences arising from malfunctioning of AI systems are likely to have a major impact both in terms of individuals' protection, and of overall market stability. This scenario challenges policymaking in an increasingly digital and global context, where it becomes difficult for regulators to predict and face the impact of AI systems on economy and society, to make sure that they are human-centric, ethical, explainable, sustainable and respectful of fundamental rights and values. The European Union has been dedicating increased attention to filling the gap between the existing legal framework and AI. Some of the legislative proposals in consideration call for preventive legislation and introduce obligations on different actors – such as the AI Act – while others have a compensatory scope and seek to build a liability framework – such as the proposed AI Liability Directive and revised Product Liability Directive. At the same time, cross-sectorial regulations shall coexist with sector-specific initiatives, and the rules they establish. The present paper starts by assessing the fit of the existing European liability regime(s) with the constantly evolving AI landscape, by identifying the normative foundations on which a liability regime for such technology should be built on. It then addresses the proposed additions and revisions to the legislation, focusing on how they seek to govern AI systems, with a major focus on their implications on highly-regulated complex systems such as financial markets. Finally, it considers potential additional measures that could continue to strike a balance between the interests of all parties, namely by seeking to reduce the inherent risks that accompany the use of AI and to leverage its major benefits for our society and economy.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000517/pdfft?md5=f07f39582f3ead443d3362d92bf7c60f&pid=1-s2.0-S0267364924000517-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reporting cybersecurity to stakeholders: A review of CSRD and the EU cyber legal framework 向利益攸关方报告网络安全:审查 CSRD 和欧盟网络法律框架
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-25 DOI: 10.1016/j.clsr.2024.105987
Clara Boggini

The purpose of this article is to explain, through a doctrinal review of the EU sustainability and cybersecurity legal framework, how the cybersecurity obligations contribute to the cybersecurity content and quality of the sustainability reporting. Previous studies are limited to voluntary cybersecurity disclosure in annual reports because they date back to before the adoption of CSRD. The CSRD harmonized sustainability reporting in the EU and introduced the ESRS, the standards for sustainability disclosure. As stated in the ESRS S4, the sustainability reporting should now address how the company manages the risks linked to data usage and data collection. Therefore, cybersecurity measures must be included in the sustainability report. This information can be used by stakeholders to assess the risk appetite and the potential long-term profitability of the company. The cybersecurity measures adopted by companies must comply with the cybersecurity obligations of the EU legal framework. While it is out of the scope of these cybersecurity obligations to inform ex ante the stakeholders of a company of how the company is managing cyber risks, these same obligations can improve the quality and content of the sustainability discourse.

本文旨在通过对欧盟可持续发展和网络安全法律框架的理论回顾,解释网络安全义务如何促进可持续发展报告的网络安全内容和质量。以往的研究仅限于年度报告中的自愿网络安全披露,因为这些研究可以追溯到 CSRD 通过之前。CSRD 统一了欧盟的可持续发展报告,并引入了可持续发展信息披露标准 ESRS。如 ESRS S4 所述,可持续发展报告现在应涉及公司如何管理与数据使用和数据收集相关的风险。因此,可持续发展报告中必须包括网络安全措施。利益相关者可以利用这些信息来评估公司的风险承受能力和潜在的长期盈利能力。公司采取的网络安全措施必须符合欧盟法律框架规定的网络安全义务。虽然事先告知公司利益相关者公司如何管理网络风险不属于这些网络安全义务的范围,但这些义务同样可以提高可持续发展报告的质量和内容。
{"title":"Reporting cybersecurity to stakeholders: A review of CSRD and the EU cyber legal framework","authors":"Clara Boggini","doi":"10.1016/j.clsr.2024.105987","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105987","url":null,"abstract":"<div><p>The purpose of this article is to explain, through a doctrinal review of the EU sustainability and cybersecurity legal framework, how the cybersecurity obligations contribute to the cybersecurity content and quality of the sustainability reporting. Previous studies are limited to voluntary cybersecurity disclosure in annual reports because they date back to before the adoption of CSRD. The CSRD harmonized sustainability reporting in the EU and introduced the ESRS, the standards for sustainability disclosure. As stated in the ESRS S4, the sustainability reporting should now address how the company manages the risks linked to data usage and data collection. Therefore, cybersecurity measures must be included in the sustainability report. This information can be used by stakeholders to assess the risk appetite and the potential long-term profitability of the company. The cybersecurity measures adopted by companies must comply with the cybersecurity obligations of the EU legal framework. While it is out of the scope of these cybersecurity obligations to inform ex ante the stakeholders of a company of how the company is managing cyber risks, these same obligations can improve the quality and content of the sustainability discourse.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000542/pdfft?md5=3fdd089b41814b71824a24238c5e50a8&pid=1-s2.0-S0267364924000542-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141097445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber operations and automatic hack backs under international law on necessity 危急情况国际法下的网络行动和自动黑客反击
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-22 DOI: 10.1016/j.clsr.2024.105992
Samuli Haataja

This article examines the use of automatic hack backs under international law on necessity. Hack backs are a form of active defence measure adopted in response to cybersecurity threats that involve effects outside the victim's systems or networks designed to mitigate or prevent the cybersecurity threat. Automatic hack backs are systems that, once activated, are capable of performing these functions without direct human control. The plea of necessity under international law on State responsibility provides a basis on which States can adopt measures that would otherwise be unlawful in order to respond to cyber operations that constitute a grave and imminent against their essential interests. This article argues that the use of automatic hack backs can be justified on the basis of necessity, however, the system would need to be capable of making a range of complex assessments to ensure it meets the strict criteria required by international law. The complexity of systems capable of making these assessments carries a risk unintended effects and escalation of conflict at machine speed.

本文探讨了根据国际危急情况法使用自动反击的问题。黑客反击是为应对网络安全威胁而采取的一种主动防御措施,涉及受害者系统或网络之外的影响,旨在减轻或预防网络安全威胁。自动反击是指一旦启动就能在没有直接人工控制的情况下执行这些功能的系统。关于国家责任的国际法中的危急情况抗辩提供了一个依据,各国可据此采取本属非法的措施,以应对严重且迫在眉睫地损害其根本利益的网络行动。本文认为,以必要性为由使用自动黑客反击系统是合理的,但该系统需要能够进行一系列复杂的评估,以确保其符合国际法所要求的严格标准。能够进行这些评估的系统的复杂性会带来意外影响和冲突以机器速度升级的风险。
{"title":"Cyber operations and automatic hack backs under international law on necessity","authors":"Samuli Haataja","doi":"10.1016/j.clsr.2024.105992","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105992","url":null,"abstract":"<div><p>This article examines the use of automatic hack backs under international law on necessity. Hack backs are a form of active defence measure adopted in response to cybersecurity threats that involve effects outside the victim's systems or networks designed to mitigate or prevent the cybersecurity threat. Automatic hack backs are systems that, once activated, are capable of performing these functions without direct human control. The plea of necessity under international law on State responsibility provides a basis on which States can adopt measures that would otherwise be unlawful in order to respond to cyber operations that constitute a grave and imminent against their essential interests. This article argues that the use of automatic hack backs can be justified on the basis of necessity, however, the system would need to be capable of making a range of complex assessments to ensure it meets the strict criteria required by international law. The complexity of systems capable of making these assessments carries a risk unintended effects and escalation of conflict at machine speed.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000591/pdfft?md5=6126e1fe75cd581a5ca4f042e65cd4e6&pid=1-s2.0-S0267364924000591-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141083636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1