2017
DOI: 10.1111/ablj.12102
|View full text |Cite
|
Sign up to set email alerts
|

Disequilibrium Between Regulation and Criminalization to Counter Financial Misconduct: The Case of Shadow Banking in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 68 publications
(2 reference statements)
0
0
0
Order By: Relevance
“…(Yu ZG., 2017) I believe that this classification is reasonable: for "whereabouts and trajectories", this category is added mainly to respond to the aforementioned "activity information", "whereabouts and trajectories Trajectory" is the trajectory formed by people moving at different points in time and different geographical locations. (Gao F. P., 2017) In the information age, the use of technical means through the network behavior trajectory can be easily traced to the real trajectory, in essence, is a kind of information to identify the individual, if it is separated from the specific natural person identification, the protection of pure trajectory information is meaningless. However, for "property status" information and "account password" information, they do not have identification, but are only a kind of associated personal information, which aims to protect the personal and property rights behind them.…”
Section: Cybersecurity Law: Direct or Indirect Identifiabilitymentioning
confidence: 99%
“…(Yu ZG., 2017) I believe that this classification is reasonable: for "whereabouts and trajectories", this category is added mainly to respond to the aforementioned "activity information", "whereabouts and trajectories Trajectory" is the trajectory formed by people moving at different points in time and different geographical locations. (Gao F. P., 2017) In the information age, the use of technical means through the network behavior trajectory can be easily traced to the real trajectory, in essence, is a kind of information to identify the individual, if it is separated from the specific natural person identification, the protection of pure trajectory information is meaningless. However, for "property status" information and "account password" information, they do not have identification, but are only a kind of associated personal information, which aims to protect the personal and property rights behind them.…”
Section: Cybersecurity Law: Direct or Indirect Identifiabilitymentioning
confidence: 99%