图书情报知识 ›› 2023, Vol. 40 ›› Issue (6): 31-41.doi: 10.13366/j.dik.2023.06.031

• 学术聚焦·数据治理 • 上一篇    下一篇

当我们谈论数据主权时我们在谈论什么?——从文献综述出发

刘妍   

  1. 武汉大学信息管理学院,武汉,430072
  • 出版日期:2023-11-10 发布日期:2023-12-10
  • 通讯作者: 刘妍(ORCID:0000-0002-5402-1988),博士研究生,研究方向:数据主权、知识产权,Email:yanmiko@whu.edu.cn。
  • 基金资助:
    本文系湖南省哲学社会科学基金青年项目“《民法典》背景下机器生成数据重要法律问题研究”(21YBQ070)的研究成果之一。

When We Talk About Data Sovereignty:From a Literature Review

LIU Yan   

  1. School of Information Management, Wuhan University, Wuhan, 430072
  • Online:2023-11-10 Published:2023-12-10
  • Contact: Correspondence should be addressed to LIU Yan, Email:yanmiko@whu.edu.cn,ORCID:0000-0002-5402-1988
  • Supported by:
    This is an outcome of the Youth Project "Research on Important Legal Issues of Machine-Generated Data in the Context of the Civil Code"(21YBQ070)supported by Philosophy and Social Science Foundation of Hunan Province.

摘要: [目的/意义]绘制数据主权国内外研究图景,对数据主权的理解达成粗略共识,消除存在或可能发生的有关数据主权的误解与误用,并揭示现有研究局限、提出未来研究进路。[研究设计/方法]采用内容分析法,设计从概念演进到内涵、价值、主体、权能、应用的研究文本分析框架,整理国内外数据主权文献,展示学界对数据主权的理解程度。[结论/发现]数据主权往往与控制、管辖数据流相关。长久以来学界主权意识强烈,风险感知敏锐,高度重视网络空间安全,但也体现出理论研究贫瘠、风险探讨较为简单、安全建议落地困难等问题,应深化数据主权的法理探讨,深究其风险的内在逻辑,深研其安全建设的方案对策。[创新/价值]通过综述国内外数据主权研究,初步厘定了数据主权的概念以及讨论数据主权时的主要关切,在总结现有研究不足的基础上提出了未来研究的完善方向。

关键词: 数据主权, 数字主权, 网络主权, 数据安全, 数据治理

Abstract: [Purpose/Significance] The purpose of this study is to delineate the domestic and international research landscape of data sovereignty, achieve a broad consensus on the understanding of data sovereignty, eliminate existing or potential misunderstandings and misuse related to data sovereignty, and uncover current research limitations while proposing pathways for future research. [Design/Methodology] Employing content analysis method, the study designs a research framework for textual analysis that spans from the evolution of concepts to connotations, values, subjects, powers, and applications. It compiles data sovereignty literature from both domestic and international sources, showcasing the academic community's level of understanding regarding data sovereignty. [Findings/Conclusion] Data sovereignty is often intertwined with control and governance of data flow. Historically, the academic community has exhibited a strong sense of sovereignty awareness and acute risk perception, and attaches great importance to cyber security. However, this has also revealed issues such as limited theoretical research, simplistic risk exploration, and difficulties in implementing security recommendations. There is a need to delve deeper into the legal exploration of data sovereignty, investigate the inherent logic of its risks, and thoroughly study solutions and strategies for its security development. [Originality/Value] By reviewing data sovereignty research from domestic and international sources, this study preliminarily defines the concept of data sovereignty and the primary concerns when discussing it. Building upon the summary of current research deficiencies, it proposes directions for future research enhancement.

Key words: Data sovereignty, Digital sovereignty, Cyber sovereignty, Data security, Data governance