TITLE:
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
AUTHORS:
Xinhui Liu
KEYWORDS:
Privacy Computing, Data Security, Technical Compliance, China
JOURNAL NAME:
Open Journal of Social Sciences,
Vol.11 No.11,
November
30,
2023
ABSTRACT: Against the backdrop of the continuous development of the data economy
and the widespread application of algorithm technology, the protection of data
security and privacy has increasingly become a concern for countries, society,
enterprises, and individuals. As a new algorithm technology, privacy computing
is known as the “optimal solution for data security and privacy protection” due
to its “available and invisible” technical characteristics and wide
applicability. However, the issue of immature privacy computing technology is
becoming increasingly prominent, and the deep-seated contradiction between data
utilization and data protection cannot be fundamentally resolved, which
seriously restricts the practicality of privacy computing application
scenarios. The risks faced by privacy computing not only have their own
technological flaws, but also traditional risk prevention and regulation
methods still have incompatibilities in addressing compliance issues in privacy
computing. There are a series of risks such as unclear legal status of
participating methods, high cost of algorithm interpretation, and inaccurate
calculation results. Resolving these risks requires starting from the current
development status of privacy computing. Targeted modifications and
improvements should be made to the application difficulties of China’s risk
regulation methods for privacy computing, in order to explore the establishment
of a data governance compliance system to solve algorithmic problems and
promote the practicality of new algorithmic technologies represented by privacy
computing.