China's data localization Liu, Jinhe
Chinese journal of communication,
01/2020, Volume:
13, Issue:
1
Journal Article
Peer reviewed
China has established a comprehensive cross-border data flow regulatory regime, the core of which is "local storage, outbound assessment." This article offers a theoretical framework for exploring ...the forces that have driven China's data localization. Under the guidance of technological nationalism and the ideology of the Holistic National Security Concept, practical security needs, industrial benefits, and technological development have been the main forces that have driven localization, which has been institutionalized by means of the proposed Internet sovereignty and the government-led regime. China's data localization, which is a typical product of Internet sovereignty, is based on the external environment and its domestic endowments. By understanding China's data localization, we can comprehend China's Internet governance.
In infectious outbreaks, rapid case detection and reporting, coordination, and context-specific strategies are needed for rapid containment. Data sharing between actors, and the speed and content of ...data flows, is essential for expediting epidemic response. In this study, researchers mapped data flows during the 2018 Ebola Virus Disease (EVD) outbreak in Equateur Province in the Democratic Republic of the Congo using semi-structured interviews, ethnographic research, and focus groups with EVD response actors. During this research, we mapped and tracked data collection, transmission, storage, sharing, and use patterns. Target participants included: key organizational actors in the EVD outbreaks responses, including local (primary health, community-based, hospital), provincial (MoPH, DRC Red Cross), and international (WHO, UN organizations, international first-responders) stakeholders. We found that a community-based surveillance system enabled the rapid detection of a hemorrhagic fever outbreak, resulting in the rapid laboratory confirmation of EVD. With the arrival of international organizations to provide support to the EVD response, routine surveillance systems continued to function robustly. However, the establishment of a vertical EVD response architecture created challenges for the response. Data flows during the Equateur outbreak were hampered by numerous challenges in the domains of early warning, line lists of cases, and contact tracing, which impeded surveillance and data flows. We therefore argue that structuring health information systems for preparedness requires taking a person-centered approach to data production, flow, and analysis.
The open nature of Android allows application developers to take full advantage of the system. While the flexibility is brought to developers and users, it may raise significant issues related to ...malicious applications. Traditional malware detection approaches based on signatures or abnormal behaviors are invalid when dealing with novel malware. To solve the problem, machine learning algorithms are used to learn the distinctions between malware and benign apps automatically. Deep learning, as a new area of machine learning, is developing rapidly as its better characterization of samples. We thus propose DeepFlow, a novel deep learning-based approach for identifying malware directly from the data flows in the Android application. We test DeepFlow on thousands of benignware and malware. The results show that DeepFlow can achieve a high detection F1 score of 95.05%, outperforming traditional machine learning-based approaches, which reveals the advantage of deep learning technique in malware detection.
This paper examines whether restrictive data policies are related to trade in services. The authors have collected comparable information on a variety of policy measures that regulate data for a wide ...group of countries for the years 2006–2016. This information is compiled in a weighted index that assesses the restrictiveness of these countries’ data policies. They distinguish between policies regulating the cross-border movement of data and policies regulating the domestic use of data. Using econometric estimations, they show that strict data policies are negatively and significantly associated with imports of data-intense services. Therefore, countries applying restrictive data policies, in particular with respect to the cross-border flow of data, are likely to suffer from lower levels of services traded cross-border. The results of this analysis are significant and hold for various robustness checks.
Abstract
Horizontal and vertical scalability have been widely studied in the context of computational resources. However, with the exponential growth in the number of connected objects, functional ...scalability (in terms of the size of software systems) is rapidly becoming a central challenge for building efficient service-oriented Internet of Things (IoT) systems that generate huge volumes of data continuously. As systems scale up, a centralized approach for moving data between services becomes infeasible because it leads to a single performance bottleneck. A distributed approach avoids such a bottleneck, but it incurs additional network traffic as data streams pass through multiple mediators. Decentralized data exchange is the only solution for realizing totally efficient IoT systems, since it avoids a single performance bottleneck and dramatically minimizes network traffic. In this paper, we present a functionally scalable approach that separates data and control for the realization of decentralized data flows in service-oriented IoT systems. Our approach is evaluated empirically, and the results show that it scales well with the size of IoT systems by substantially reducing both the number of data flows and network traffic in comparison with distributed data flows.
The research is focused on the digitalization in a passenger terminal and presents an approach for Riga International Coach Terminal (RICT) in Latvia. The authors consider a Bus Route Management ...System for RICT, Data Flows and Data Types that are provided from bus users, bus drivers, carriers, and local authorities in charge of bus management through information systems. A key outcome is a before and after analysis of exploiting the advantages of the system implementation in different dimensions which has helped to automate the day-to-day work of the dispatcher's service, to improve the efficiency of the daily work of employees by reducing the amount of manual work, automating repetitive standard operations, and reducing the possibility of human error. The implementation of system redefines the RICT as a efficient and reliable multimodal transport hub in Baltic States.