Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views14 pages

A New Decade For Soci Al Changes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views14 pages

A New Decade For Soci Al Changes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Vol

.58/
2024
ANewDecadef
orSoci
alChanges
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

Research on the Protection of machine-generated data under


the background of data element marketization

Li Jie
Hunan University of Technology and Business

[email protected]

Abstract. Introduction: The study emphasizes non-personal data protection and proposes a way
tailored to China's particular requirements for machine-generated data legal protection.
Integrating foreign experiences into legislation is the goal. Aim and objectives: This study
examines machine-generated data legal protections throughout data marketization to understand
and improve its protection in changing digital environments. Method: This study compared
China's growing data protection rules to Europe's GDPR and the US's CCPA. The study uses the
Penta Helix framework to evaluate non-personal data in Shenzhen, Southern China, using
document reviews, field observations, interviews, and surveys. Data quality, commercial sector
compliance, public sector effect, academic contributions, civil society involvement, innovation,
and ethics are evaluated. Result: This study compares Chinese and American non-personal data
governance. The Cybersecurity and Data Security Law in China and the California Consumer
Privacy Act in the US are highlighted. Clear frameworks and international coordination are
needed to define and protect non-personal data. The private sector needs, public sector
governance, academia's concerns, and civil society's participation. Both countries must balance
data-driven innovation with privacy, security, and ethics. Conclusion: Safeguarding China's non-
personal data rights, particularly machine-generated data, is imperative, requiring global
perspectives, rigorous legal analysis, and collaboration to navigate challenges

Keywords. Digital ecosystems, Penta Helix framework, AI applications, data-driven innovation


(DDI)

Introduction
The paradigm and modern business practices have changed with the introduction of
data-centric efforts at the beginning of the twenty-first century. Within the digital ecosystem,
data-driven innovation (DDI) techniques have spurred the development of new products,
business models, and opportunities [1]. The digital ecosystem is made up In online markets
where data, or information produced as a result of user behavior, is kept. After that, this data
may be examined to look for trends and patterns. Similarly, In response, new advances in
information and data sciences have led to the creation of sophisticated business data
management strategies, the application of concepts from data robotics, intelligence for
marketing and business intelligence, as well as the ability to use artificial intelligence to make
a range of predictions [2]. Digital markets today include social networks, large marketplaces,
and any electronic platform that combines traffic from many users who are identifiable through

100
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

online communities. Online communities are frequently formed by users, where they discuss
businesses, exchange issues and interests in goods and services, and engage in other activities
that encourage participation [3]. The term "user-generated data" (UGD) refers to the data that
these user actions create. All forms of information and data that consumers individually
generate as a result of interacting with the elements that make up any particular digital market
are included in user-generated content (UGD), including reviews, comments, experiences,
feelings, and actions. Overall, a great deal of research has been done on data analysis techniques
in the literature [4]. These and related studies provide an overview of the techniques used to
collect, arrange, analyze, and understand enormous amounts of data. The concept of analyzing
vast volumes of data contextualizes all of these methods. In general, Numerous studies on data
analysis methods have been conducted in the literature. These and related studies provide an
overview of the techniques used to collect, arrange, analyze, and understand enormous amounts
of data. Every one of these methods is explained in the context of the Businesses developing
plans under the BDA and UGD frameworks with the goal of increasing their profits in the digital
markets [5]. Still, there may be privacy issues with these tactics. This occurs as a result of
companies placing their financial objectives ahead of usefulness, practical information
architecture, and overall user experience while upholding ethical design principles [6]—Big
Data Analytics idea. Numerous earlier Studies have underlined the importance of concepts like
ethical design and surveillance capitalism in social networks since users may not be aware that
they have been manipulated in online markets by means of behavior prediction, information
architecture, or advertising. DDI frequently causes these strategies, which businesses explore
in their digital ecosystems [7].
Under the general heading of "machine-generated data," Data generated by robots and
sensors has emerged as a new type of data. The growing volume of data generated by private
businesses has drawn the attention of regulators and the market to this emerging category. Data
that is automatically produced by a computer program, method, or other mechanism with no
direct involvement of a human is referred to as machine-generated data [8]. The Web and the
Internet of Everything provide the most notable instances, as their method of operation involves
automatically collecting user data to improve services and user experience. In reality, the
volume of data generated, gathered, and processed has already caused major disruptions in a
number of commercial areas [9]. For example, data gathering and processing are essential to
the operation of autonomous automobiles since they enable the vehicle to fulfill fundamental
functions and offer enhanced services [10]. Similar to this, A combination of networked and
Internet-connected gadgets make up smart homes. That gather and process data to provide
services that maximize efficiency and comfort. Additionally, smart thermostats provide energy
savings by learning the routines and behaviors of their users and allowing for remote
temperature adjustment. Smart farming equipment has completely changed the agricultural
industry's production and economic landscape by enabling the gathering, analyzing, and sharing
of data on farming operations [11].
This current study outlines a comprehensive approach to the legal Protection of
machine-generated data within the context of data marketization in China. It begins by
emphasizing the importance of understanding non-personal data protection and delving into
progressive levels of data comprehension. The focus then shifts to deconstructing the logical
content of machine-generated data, redefining attribution subjects and protection scopes based
on legal interests. The ultimate goal is to integrate normative interpretation, understanding, and
application of data legal interests in response to evolving social and economic landscapes.

101
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

The research content encompasses the necessity of legal interest protection, logical
construction, and a proposed Chinese path. Key issues include integrating foreign legislative
systems, improving China's legal interest protection theory, and addressing controversies
surrounding the ownership and protection scope of machine-generated data. The paper seeks to
contribute to the legislative conception and construction of relevant systems in China by
exploring foreign experiences and tailoring solutions to the country's unique conditions.

Method
The current discussion concerns people-centered smart cities and the suitability of data
governance frameworks across geographies. Different city typologies, cultural elements, urban
traditions, degrees of development, and political systems complicate the smart city approach.
However, these characteristics are rooted in a particular setting, making extrapolation or
generalization problematic. Hence, simplifying regional typologies may hinder generalizations
regarding data governance structures. The GDPR in Europe is one of the strongest privacy
legislation. Another privacy law that emerged in USA is California Consumer Privacy Act
(CCPA). GDPR in Europe was enacted from 2018 while CCPA was enacted from 2020. China
lacks a data protection law that is as all-encompassing as the EU's General Data Protection
Regulation (GDPR). Nonetheless, China has passed several rules and statutes addressing
various parts of data protection.
Cybersecurity Law (CSL): Data localization requirements and protection of personal
information are two of the many duties imposed on network operators by the CSL, which was
passed in 2017 with the goal of protecting the country's cyberspace.
Data Security Law (DSL): The effective date of this law, which was passed in June of
2021, is September 1, 2021. Important data is the primary emphasis, and companies are
obligated to classify data and implement appropriate security measures.
Personal Information Protection Law (PIPL): With its effective date of November 1,
2021, this law grants individuals certain rights with respect to their non-personal data and is
primarily concerned with protecting such data. Data subject rights, permission, and
international data transfers are all part of it.
California Consumer Privacy Act (CCPA): The CCPA, which was passed in 2018 and
it was into effect on January 1, 2020, offers certain protections to individuals residing in
California with respect to their non-personal information and places duties on companies that
handle this data.
Health Insurance Portability and Accountability Act (HIPAA): HIPAA, enacted in
1996, primarily aims to safeguard the confidentiality and integrity of medical data.
Gramm-Leach-Bliley Act (GLBA): The Gramm-Leach-Bliley Act (GLBA), passed in
1999, mandates that financial organisations must guarantee the protection and privacy of
consumer nonpublic personal information.
Children's Online Privacy Protection Act (COPPA): COPPA, implemented in 1998,
aims to safeguard the privacy of children under 13 by controlling the gathering of their personal
information on websites.

Procedure of Data Collection and Evaluation


Selection of Study Area: Choose southern China, specifically Shenzhen, due to its
prominence in high-tech firms and rapid urbanization. Non-personal data gathering and
evaluation begin with study area selection. Define the goals, scope, and parameters of the non-
personal data that plan to collect in a certain industry or domain. Establish a data utilisation

102
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

framework including processes and tools. Create a data-collecting plan using surveys,
observations, or automated technologies.
Framework Utilization: Employ the Penta Helix framework, encompassing public,
private, academic, civic society, and social entrepreneur perspectives. Design framework-
specific instruments that meet study goals. Data collection should be done carefully using
technology. Check and verify non-personal data after collection. Use the right analytical
methods to get insights, interpret data, and make recommendations. Maintain ethical standards,
respect privacy, and comply with data protection legislation, recognising non-personal data's
unique qualities.

Data Collection
Document Review: Systematic non-personal data collection uses numerous ways.
Document review entails reviewing study-related records, publications, and materials.
Field Observations: Conduct on-site visits in Shenzhen, observing the transformation
of the Special Business Zone and its impact on data governance. Field observations provide
real-time insights on non-personal data in its natural surroundings. Focused interviews with
experts or stakeholders can provide significant insights on non-personal data.
Interviews and Surveys: Engage with stakeholders from public, private, academic,
civic society, and social entrepreneur sectors to gather diverse perspectives on PIPL
implementation. Surveys collect quantitative or qualitative data from a predefined sample in
person or online. Document reviews, field observations, interviews, and surveys capture
different non-personal data. These methods provide a complete understanding of the topic,
enabling strong analysis and valuable insights. Ethical considerations, data accuracy, and
regulatory compliance should guide these activities.

Data Evaluation
Quantitative Analysis: Summarize private sector compliance with non-personal using
Table 1, highlighting key points and implications for data governance.
Qualitative Analysis: Analyze Tables 2, 3, 4, and 5 to understand the impact of non-
personal on the public sector, academia, civil society, and social entrepreneurs. Identify key
points and implications for data governance.

Findings and Evaluation


Data Sources and Quality: Determine the many non-personal data sources for a
complete picture.
Check the correctness, completeness, and relevance of non-personal data.
Utilization and Compliance: Assess commercial sector operational use of non-personal
data.
Compliance with data protection laws and ethical use should be assessed.
Public Sector Impact: Examine how non-personal data affects public sector
policymaking.
Assess government programs that use non-personal data for public good.
Academic Contributions: Consider how non-personal data affects academic research
and understanding. Evaluate academic non-personal data issues and prospects.
Civil Society Engagement: Examine how civil society organisations advocate and raise
awareness using non-personal data. Assess civil society participation in non-personal data
debates for transparency and inclusion.

103
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

Innovation and Social Impact: Explore how non-personal data promotes creativity in
social entrepreneurship. Examine activists' use of non-personal data for advocacy and change.
Ethical Considerations: Consider ethical issues regarding non-personal data gathering,
exchange, and use. Analyse non-personal data fairness, openness, and accountability measures.

Result Findings
Cybersecurity, Data Security, and Personal Information Protection Laws in China
safeguard non-personal data. The 2017 CSL requires network operators to localise data and
protect personal data. Since September 1, 2021, the DSL requires enterprises to classify and
secure sensitive data. Since November 1, 2021, the PIPL has focused on data subject rights,
authorization, and international data transfers. These measures show China's commitment to
data privacy, but there is no comprehensive statute like the EU's GDPR. Sector-specific
regulations rather than a nationwide statute govern non-personal data in the US. The 2020
California Consumer Privacy Act (CCPA) protects California residents' personal data.
Furthermore, sector-specific laws like HIPAA and GLBA protect data in specialised businesses.
Nonetheless, these initiatives leave a fragmented regulatory framework for non-personal data
protection without a federal statute. Both countries struggle to balance data-driven innovation
with privacy and security.
Table 1 highlights private sector non-personal data essentials. It defines non-personal
data as electronic information without personally identifiable details and stresses the necessity
for explicit legislative standards to avoid re-identification. Non-personal data, from
meteorological data to anonymised personal data, highlights the need for appropriate
anonymization and pseudoanonymization techniques. Non-personal data has economic worth,
emphasising the need for data exchange and collaboration while balancing business interests
and privacy concerns. The EU's Free Flow of Non-Personal Data Regulation requires legal and
ethical frameworks to control non-personal data to ensure innovation meets societal needs. Re-
identification issues highlight the need for strong security and data reduction. Finally, the social
impact of non-personal data, both for public good and possible discrimination, emphasises
ethical and responsible usage, bias mitigation, and data governance openness and
accountability.

Table 1: Aspects of the Private Sector


Implications for Data
Aspect Key Points/Evidence
Governance
Clearly define what constitutes
Electronic data that does not contain any
"non-personal data" in regulations
Definition information that can be used to identify a
and policies, considering potential
specific natural person.
for re-identification.
- Data with no inherent personal information
Develop protocols for
(e.g., weather data, stock prices, IoT sensor
anonymization and
data). - Personal data that has been
Sources pseudoanonymization that ensure
anonymized (irreversible removal of
effective de-identification while
identifiers) or pseudoanonymized (identifiers
preserving data utility.
replaced with non-identifiable values).
Economic Can be leveraged for diverse applications Encourage data sharing and
Value (e.g., research, personalized collaboration while balancing

104
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

recommendations, AI development) and drive legitimate business interests with


economic growth. data privacy concerns.
Develop appropriate legal and
Emerging regulatory frameworks, like the
ethical frameworks for non-
Regulatory EU's Regulation on the Free Flow of Non-
personal data governance,
Landscape Personal Data, aim to promote data sharing
balancing innovation with
while preventing misuse.
protection of societal interests.
Implement robust security
Non-personal data can be combined with measures and data-minimization
Security Risks other data sources to potentially re-identify practices to protect against
individuals. unauthorized access and re-
identification attempts.
Ensure non-personal data is used
Can be used for public good (e.g., improving ethically and responsibly,
Social Impact public services, environmental monitoring) mitigating potential bias and
but also for discriminatory practices. discrimination in algorithms and
applications.
Clearly communicate how non-
Transparency personal data is collected, used,
Data governance practices should be
and and shared, and establish
transparent and accountable to stakeholders.
Accountability mechanisms for oversight and
recourse.

Table 2 contrasts US and Chinese public sector data governance elements. China's
Cybersecurity Law, Data Security Law, and Personal Information Protection Law and the US's
Federal Trade Commission Act and sector-specific legislation like HIPAA address data security
and privacy. Non-personal data is in a regulatory grey area in both countries because no laws
regulate it. A shared need for a clearer definition and scope exists in China, where non-personal
data is often described by what it isn't, and in the US, where it is mostly focused on personal
and "de-identified" data. Different data ownership and control systems could affect
collaboration, and encouraging data sharing for national objectives with differing government
monitoring underscores the need for clear frameworks to balance public interest with
commercial potential. Both nations face anonymization and pseudonymization issues,
highlighting the necessity for strong norms and monitoring. Personal and non-personal data
security and breach notification differ in both nations, emphasising the need for improved data
protection and comparable reporting regulations. China and the US need to increase data misuse
enforcement and punishments, even for non-personal data.

Table 2: Aspects of the Public Sector


Implications for Data
Aspect China USA
Governance
- Cybersecurity Law - Federal Trade Focus on data security and
(2016) - Data Security Commission Act (FTC personal privacy, leaving
Legal Framework
Law (2021) - Personal Act) - Sector-specific non-personal data in a
Information Protection regulations (e.g., regulatory grey area.

105
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

Law (PIPL) (2021) - No HIPAA) - No specific


specific law for non- law for non-personal
personal data data
Limited mention, often
Unclear, often defined by Need for clearer definition
Definition of Non- focused on personal
"what it isn't" (e.g., not and scope of non-personal
Personal Data data and "de-identified"
identifiable). data in both countries.
data.
State claims ultimate Emphasis on private
Different approaches to
ownership of all data, property rights, with
Data Ownership data ownership could
including non-personal. companies and
and Control impact data sharing and
Companies act as data individuals owning
collaboration.
processors. data.
No general right for
Encouraged for "national government access, but Need for clear frameworks
Data Sharing and interests," with sector-specific on data sharing, balancing
Monetization government oversight regulations and data public interest with
and potential restrictions. breach reporting commercial opportunities.
requirements.
Need for robust
Data Guidelines exist, but
No specific regulations, anonymization and
Anonymization concerns about re-
but common practice in pseudonymization
and identification and lack of
certain sectors. standards and oversight
Pseudonymization transparency.
mechanisms.
Mandatory security Varying requirements Need for stronger data
controls and breach based on sector and security measures and
Security Measures
reporting requirements data sensitivity, but no consistent breach reporting
and Breach
for personal data, but less specific breach requirements for both
Notification
clear for non-personal notification for non- personal and non-personal
data. personal data. data.
Potential
Penalties for penalties for unfair Need for stronger
data breaches and business practices and enforcement mechanisms
Enforcem
violations, but data breaches under and clear penalties for data
ent and Penalties
enforcement can be FTC Act, but misuse, including non-
inconsistent. enforcement depends personal data.
on specific cases.

Table 3 summarises academia's data governance issues. It emphasises the diversity of


research data kinds and sources and the necessity for explicit data collecting, storage, sharing,
and reuse procedures that address ethical and privacy concerns. Data sharing and collaboration,
important for innovation, require trusted repositories and secure platforms, especially in
international partnerships with different data protection standards. Anonymization and privacy
protection are popular, but re-identification threats require robust anonymization methods and
informed permission processes for sensitive data. Cybersecurity infrastructure, people training,
and breach prevention processes are crucial in academic institutions due to data breaches and

106
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

resource constraints. Ethical data use rules and oversight procedures are essential for trust and
ethics. Finally, the growing demand for open access to research data requires a careful balance
between transparency, data privacy, and intellectual property rights, requiring clear policies and
support for data stewardship and management to promote transparency in research methods and
data analysis.

Table 3: Aspects of Academia


Implications for Data
Aspect Key Points/Evidence
Governance
Develop clear policies and
- Research datasets collected through
protocols for data collection,
Data Types and surveys, experiments, sensors, and online
storage, sharing, and reuse,
Sources platforms. - Open access data repositories
considering ethical and privacy
and institutional databases.
concerns.
- Sharing data can accelerate research and
innovation, but concerns about ownership, Establish trusted data repositories
Data Sharing and privacy, and misuse exist. - Collaborative and secure data sharing platforms.
Collaboration research often involves international Implement strong data access
partners with different data protection controls and user agreements.
regulations.
- Anonymization and pseudonymization are Develop and implement robust
Data
common practices, but risks of re- anonymization techniques and
Anonymization
identification remain. - Balancing research data minimization practices.
and Privacy
benefit with data privacy, especially for Ensure informed consent
Protection
sensitive data (e.g., health data). processes for data subjects.
- Academic institutions may lack resources Invest in cyber security
Data Security and and expertise for robust data security infrastructure and personnel
Breach measures. - Potential for data breaches with training. Implement data breach
Prevention sensitive research data impacting research notification procedures and
integrity and privacy. response plans.
- Responsible data use promotes public trust Develop ethical guidelines for
Ethical in research and academia. - Concerns about data collection, analysis, and
Considerations potential for bias and discrimination in dissemination. Establish
and Trust algorithms and research using non-personal oversight mechanisms and
data. accountability measures.
- Increasing demand for open access to Develop clear policies on data
research data to promote transparency and openness and provide support for
Open Access and
reproducibility. - Balancing open access data stewardship and management.
Transparency
with data privacy and intellectual property Foster transparency in research
rights. methods and data analysis.

Table 4 highlights civic society's use of non-personal data. NGO and civil society
organisations use non-personal data for environmental monitoring and human rights
campaigning, however there are concerns about misuse for social control. Data governance
implications highlight the need for civil society data use frameworks that promote openness,

107
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

accountability, and public interest. The table also emphasises the need for data literacy and
awareness education and training to improve public knowledge and responsible use of data.
Civil society's request for open government data is acknowledged, with business interests and
privacy considerations balanced. The table also highlights civil society's crucial role in
combating algorithmic bias and prejudice, fostering transparency, and holding decision-makers
accountable. Finally, civil society advocacy for individual data rights and participation in non-
personal data governance policymaking processes are stressed, encouraging meaningful
engagement and effective data protection policies.

Table 4: Aspects of Civil Society


Implications for Data
Aspect Key Points/Evidence
Governance
- NGOs and civil society organizations
leverage non-personal data for social good Develop frameworks for
(e.g., environmental monitoring, disaster responsible data use by civil
Data Use for
response, human rights advocacy). - Concerns society, ensuring transparency,
Public Good
about potential misuse of data by governments accountability, and alignment
or private companies for social control or with public interest.
surveillance.
- Increasing public awareness about data Foster data literacy initiatives and
collection and potential implications for public awareness campaigns.
Data Literacy individual and societal rights. - Need for Support capacity building within
and Awareness education and training on data literacy and civil society organizations for
responsible data use for citizens and civil effective data analysis and
society organizations. utilization.
- Civil society advocates for open access to Establish clear policies on open
government data to promote transparency and data access and support
Data Access
citizen oversight. - Balancing open data with infrastructure for secure data
and Openness
legitimate commercial interests and concerns sharing with civil society
about privacy and security. organizations.
- Concerns about biased algorithms used in Promote transparency and
decision-making processes impacting accountability in algorithm
Algorithmic
vulnerable groups (e.g., loan approvals, development and deployment.
Bias and
criminal justice). - Civil society plays a crucial Support civil society efforts to
Discrimination
role in highlighting and addressing monitor and challenge biased
algorithmic bias and discrimination. algorithms.
Ensure meaningful
- Civil society advocates for
participation of civil society
individual data rights and promotes legislation
Data organizations in data governance
on data privacy and protection. - Importance
Rights and discussions and policy
of civil society participation in policymaking
Advocacy development. Support advocacy
processes related to non-personal data
efforts for robust data protection
governance.
frameworks.

108
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

Table 5 discusses social entrepreneurs and activists using non-personal data for good.
It emphasises their use of creative data analysis to solve poverty, healthcare access, and
environmental monitoring, requiring ethical data usage regulations and frameworks. The table
also shows social activists' campaigns against discriminatory algorithms and ethical data
practices. The recommended implication is encouraging social entrepreneurs, activists, and data
governance agencies to discuss ethical issues and support responsible data practices. Social
entrepreneurs' data access issues highlight the need for equitable and transparent data sharing
systems, open data initiatives, and partnerships while protecting privacy and security.
Community-based data governance approaches that respect local contexts are needed to develop
confidence with vulnerable communities for effective data use.

Table 5: Aspects of Social Entrepreneurs/Activists


Aspect Key Points/Evidence Implications for Data Governance
- Social entrepreneurs leverage non-
personal data to address social and
environmental challenges (e.g., poverty Develop policies and frameworks that
Data-Driven
alleviation, healthcare access, enable responsible data use by social
Solutions for
environmental monitoring). - Innovative entrepreneurs, balancing public good
Social Impact
data analysis allows for targeted with data privacy and security.
interventions and improved resource
allocation.
- Social activists raise awareness about
Foster open dialogue and
ethical concerns surrounding data
collaboration between social
Advocacy for collection, use, and analysis by tech
entrepreneurs/activists and data
Ethical Data companies and governments. - Campaigns
governance bodies to address ethical
Practices against discriminatory algorithms and
concerns and develop responsible data
data-driven policies impacting
practices.
marginalized communities.
- Social entrepreneurs often face
Promote open data initiatives and
challenges in accessing relevant data from
Data Access and facilitate data partnerships between
governments and private companies. -
Sharing for social entrepreneurs and relevant data
Need for equitable and transparent data
Social Good holders, ensuring data security and
sharing mechanisms to empower social
privacy safeguards.
sector initiatives.
- Building trust with vulnerable
Develop and implement community-
communities is crucial for effective data
Building Trust based data governance models that
collection and utilization in social impact
and Community respect local context and empower
projects. - Importance of community
Engagement communities to have a say in how their
engagement and informed consent
data is used.
processes to ensure ethical data practices.
Support capacity building of social
- Social activists leverage data to hold
Using Data for entrepreneurs/activists in data analysis
governments and corporations
Accountability and visualization to strengthen
accountable for their actions on social and
and Advocacy advocacy efforts and promote data-
environmental issues. - Data-driven
driven accountability.

109
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

campaigns can raise awareness and


influence policy changes.

Discussion
There is potential for data-driven innovation to revolutionize the way that knowledge
discovery and business are now conducted. Because of this, the European Commission has
made data sharing one of its main priorities as it works to establish a digital single market.
Intelligent data provided by Internet-connected devices (IoT) is becoming more and more
valuable [12]. Wearables and smart homes alike may benefit greatly from machine-generated
data in terms of development, education, and resolving issues. To make these types of data
accessible to academics, it is necessary to comprehend the motivations that drive the sharing of
all the relevant data as well as to articulate the current legal barriers and suggested legal
remedies [13].
The method by which data are gathered, shared, and altered has altered due to the
Internet's exponential growth in popularity. Unthinkable changes have occurred in processing
speeds, information quantities, and content relevancy so quickly [14]. This relates to the desire
to provide individualized services by utilizing the data at hand. Non-personal data is a crucial
component of many organizations, and big data accounts for up to eighty percent of all data
kept in these types of establishments. Organizations often store data from a variety of sources,
including individuals, organizations, and gadgets [15]. These sources also act as the data
generators. The recipients of such publications become the information consumers as these data
might be disseminated or shared with other businesses or people [16]. This study highlights
issues in gauging the value of data and connects them to publishing privacy protection. In order
to assess the likelihood of correctly predicting sensitive qualities and to confirm the usefulness
of the information, data mining models are developed [17].
The current wave of progress in wireless communication technology has led to an
enormous amount of data being produced [18]. The majority of our data is part of a global
network that links numerous devices. Every day, electronic devices' capabilities grow,
increasing the amount of information generated and shared [19]. In a similar vein, security
vulnerabilities have grown more common as cell phone network topologies grow more varied
and intricate has made it more difficult for intelligent mobile services and applications to
become widely adopted, and the variety of platforms that offer end users access to data, storage,
processing, and application services [20]. In these kinds of situations, protecting data and
monitoring its usage and misuse becomes essential. The research indicates that in order to
handle such a complex network, an artificial intelligence-based security approach ought to
ensure the confidentiality, integrity, including legitimacy of the hardware, the software, and the
network's governing protocols, irrespective of the system's generation [21]. We've looked
closely at the open challenges that mobile networks continue to confront, such as fraud links,
unauthorized network scanning, and more [22]. There is a discussion of several cyber security
concerns and how to construct a secure environment using ML and DL approaches. Since there
are countless ways to improve mobile network security, we address the need to create new
strategies to ensure the safety of digital information in these networks [23].

Conclusion
This study concludes that safeguarding China's non-personal data rights, particularly
machine-generated data, is imperative, requiring global perspectives, rigorous legal analysis,

110
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

and collaboration to navigate challenges posed by favoritism towards personal data legislation
and to define effective ownership options. This study concluded that China's non-personal data
protection landscape, focusing on machine-generated data and attribution issues. Protecting
non-personal data rights, specifically machine-generated data, was the main goal. The
favouritism of personal data legislation might cause disagreement, and resolving it was difficult.
The study sought global perspectives to propose effective ownership options for non-personal
data. It rigorously analysed legal protections for machine-generated data in the context of data
marketization to improve its protection in dynamic digital contexts. The research compared
GDPR in Europe, CCPA in the US, and China's growing data protection rules by evaluating
data governance systems in people-centered smart cities across varied geographies. The Penta
Helix structure in Shenzhen enabled document study, field observations, interviews, and
surveys to collect non-personal data and reveal its multidimensional impact across sectors. The
US California Consumer Privacy Act and Chinese Cybersecurity and Data Security Laws were
highlighted in the comparison analysis. The study stressed the importance of clear rules and
international collaboration to define and preserve non-personal data.

References
[1] V. Arya, D. Sethi, J. PaulDoes digital footprint act as a digital asset?? Enhancing brand
experience through remarketingInternational Journal of Information Management, 49 (2019),
pp. 142-156, 10.1016/j.ijinfomgt.2019.03.013
[2] S. Areepattamannil, I.M. Santos Adolescent students’ perceived information and
communication technology (ICT) competence and autonomy: Examining links to dispositions
toward science in 42 countries Computers in Human Behavior, 98 (2019), pp. 50-58,
10.1016/j.chb.2019.04.005
[3] S. Bacq, F. Janssen, C. NoëlWhat happens next? A qualitative study of founder succession
in social enterprisesJournal of Small Business Management, 57 (3) (2019), pp. 820-844,
10.1111/jsbm.12326
[4] D.E. Baird, M. FisherNeomillennial user experience design strategies: Utilizing social
networking media to support “always on” learning styles journal of Educational Technology
Systems, 34 (1) (2005), pp. 5-32, 10.2190/6WMW-47L0-M81Q-12G1
[5] J.R. SauraUsing data sciences in digital marketing: Framework, methods, and performance
metricsJournal of Innovation & Knowledge, 1 (2020) (2020), 10.1016/j.jik.2020.08.001
[6] D. Saxena, M. LamestInformation overload and coping strategies in the big data context:
Evidence from the hospitality sectorJournal of Information Science, 44 (3) (2018), pp. 287-297,
10.1177/0165551517693712
[7] H. Schoen, D. Gayo-Avello, P.T. Metaxas, E. Mustafaraj, M. Strohmaier, P. GloorThe
power of prediction with social media internet Research (2013), 10.1108/IntR-06-2013-0115
[8] A.Y. Sembada, K.Y. KoayHow perceived behavioral control affects trust to purchase in
social media storesJournal of Business Research, 2019 (2019), 10.1016/j.jbusres.2019.09.028
[9] K.B. SheehanToward a typology of Internet users and online privacy concerns Information
Society, 18 (1) (2002), pp. 21-32, 10.1080/01972240252818207
[10] D. Sledgianowski, S. KulviwatUsing social network sites: The effects of playfulness,
critical mass and trust in a hedonic contextJournal of Computer Information Systems, 49 (4)
(2009), pp. 74-83
[11] P.R. Spence, K.A. Lachlan, D. Westerman, S.A. SpatesWhere the gates matter less:
Ethnicity and perceived source credibility in social media health messages Howard Journal of
Communications, 24 (1) (2013), pp. 1-16, 10.1080/10646175.2013.748593

111
Technium Social Sciences Journal
Vol. 58, 100-112, June, 2024
ISSN: 2668-7798
www.techniumscience.com

[12] Directive 2003/98/EC of the European Parliament and the Council of 17 November 2003
on the reuse of public sector information amended by Directive.
[13] The term is not new. Talking about data control systems, Chorafas uses the term machine-
generated data to point out that ‘information has theamazing ability to generate more
information’. D.N. Chorafas, ControlSystems Functions and Programming Approaches,
Volume B, Applications, Academic Press, New York and London (1966) 114.
[14] A connected smart car, for example, is susceptible to producing up to 25 GB of data every
driving hour.9. N. Elkin-Koren and M.S. Gal, ‘The Chilling Effect of Governance-byData on
Data Markets’, 86(2) University of Chicago Law Review 403(2019).
[15] D.L. Rubinfeld and M.S. Gal, ‘Access Barriers to Big Data’, 59 Arizona Law Review 339
(2017), at 363-64.
[16] Commission staff working document, Guidance on sharing private sector data in the
European data economy, 25 April 2018, SWD(2018) 125final.
[17] B. Gonzalez Otero, Evaluating the EC Private Data Sharing Principles: Setting a Mantra
for Artificial Intelligence Nirvana, 10 JIPITEC 66(2019).
[18] Gupta, R., Anand, P., Chaudhury, S., Lall, B., Singh, S.: Compressive Sensing-Based
Privacy for Fall Detection (2020). arXiv preprint arXiv:2001.03463
[19] Bhave, D.P., Teo, L.H., Dalal, R.S.: Privacy at work: a review and a research agenda for a
contested terrain. J. Manag. 46(1), 127–164 (2020)
[20] Shateri, M., Messina, F., Piantanida, P., Labeau, F.: Privacy-Cost Management in Smart
Meters Using Deep Reinforcement Learning (2020). arXiv preprint arXiv:2003.04946
[21] Bernabe, J.B., David, M., Moreno, R.T., Cordero, J.P., Bahloul, S., Skarmeta, A.: Aries:
evaluation of a reliable and privacy-preserving European identity management framework.
Futur. Gener. Comput. Syst. 102, 409–425 (2020)
[22] Silva, J., Solano, D., Fernandez, C., Romero, L., Villa, J.V.: Privacy-preserving, Protection
of personal data, and big data: a review of the Colombia case. Procedia Comput. Sci. 151, 1213–
1218 (2019).
[23] Gupta C, Johri I, Srinivasan K, Hu YC, Qaisar SM, Huang KY. A Systematic Review on
Machine Learning and Deep Learning Models for Electronic Information Security in Mobile
Networks. Sensors (Basel). 2022 Mar 4;22(5):2017. doi: 10.3390/s22052017. PMID:
35271163; PMCID: PMC8915055.

112

You might also like