Staged Evolution, Logic and Prospect of Global Information Policy Research in the Past 50 Years

  • Zhou Qingshan ,
  • Cao Wenzhen
Expand
  • 1 Department of Information Management, Peking University, Beijing 100871;
    2 School of Public Health and Management, Wenzhou Medical University, Wenzhou 325035

Received date: 2022-07-29

  Revised date: 2022-09-14

  Online published: 2022-11-17

Abstract

[Purpose/Significance] This paper combs and clarifies the development logic behind the evolutionary process of global information policy in the past 50 years, and points out the trends of future research by looking back at the past. [Method/Process] Using bibliometric analysis, knowledge mapping and other methods to analyze more than a thousand pieces of literature on information policy across more than half a century, and summarize the thread of emergence, evolution, and future development of information policy. [Result/Conclusion] According to the characteristic changes of the number of publications, central and burst terms, clustered keywords, etc., the staged evolutionary process of global information policy was divided into the information society policy-led stage (1967-1985), the scientific and technological information policy-led stage (1986-1992), the technique diffusion policy-led stage (1993-1998), the Internet policy-led stage (1999-2005), the data governance policy-led stage (2006-2011), the social media policy-led stage (2012-2014), and the Internet of Everything (IoE) policy-led stage (2015-present). There are profound interactions between the staged evolutionary process and the changing information environment. In the future, the path-dependent nature of logical evolution will continue to promote the co-evolution of information policy research along with information technology and information environment, and to address the evolving regulatory challenges that comprehensive informatization of society brings to information policy.

Cite this article

Zhou Qingshan , Cao Wenzhen . Staged Evolution, Logic and Prospect of Global Information Policy Research in the Past 50 Years[J]. Library and Information Service, 2022 , 66(20) : 32 -44 . DOI: 10.13266/j.issn.0252-3116.2022.20.004

References

[1] JINHONG Y, CHUL-SOO K I M, ONIK M M H. Aggregated risk modelling of personal data privacy in internet of Things[C]//21st international conference on advanced communication technology. PyeongChang: IEEE, 2019: 425-430.
[2] VERIZON. 2021 data breach investigations report[R/OL]. [2022-06-02]. https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdf.
[3] YI H. On the importance of protecting personal information privacy: a lightweight and portable implementation of cryptographic systems[C]//2nd IEEE international conference on integrated circuits and microsystems. Nanjing: IEEE, 2017: 246-250.
[4] ZINKE C, ANKE J, MEYER K, et al. Modeling, analysis and control of personal data to ensure data privacy - a use case driven approach[C]//International conference on applied human factors and ergonomics. Cham: Springer, 2017: 87-96.
[5] ROHUNEN A, MARKKULA J. On the road-listening to data subjects’ personal mobility data privacy concerns[J]. Behaviour & information technology, 2019, 38(5): 486-502.
[6] MEHARANJUNISA S. Global perspective: cyberlaw, regulations and compliance[J]. International journal of trend in scientific research and development, 2020, 4(5): 4-7.
[7] ANDREOTTA R J. The national information infrastructure: its implications, opportunities, and challenges[J]. Wake forest law review, 1995, 30(1): 221-231.
[8] BRAMAN S. Defining information policy[J]. Journal of information policy, 2011, 1: 1-5.
[9] TODESCHINI R, BACCINI A. Handbook of bibliometric indicators: quantitative tools for studying and evaluating research[M]. Weinheim: Wiley-VCH, 2016.
[10] CHEN C. CiteSpace: visualizing patterns and trends in scientific literature[EB/OL]. [2022-03-18]. http://cluster.cis.drexel.edu/~cchen/citespace/.
[11] LECHMANN H. Guiding principles for national documentation - information policy in the field of science and technology[J]. Nachrichten fur documentation, 1967, 18(1): 16.
[12] ROSENBERG V. Information policies of developing countries: the case of Brazil[J]. Journal of the American Society for Information Science, 1982, 33(4): 203-207.
[13] HWANG H Y R. Science and technology information policy in Korea[J]. Government information quarterly, 1990, 7(1): 9-24.
[14] KLUGE E H. Health information, privacy, confidentiality and ethics[J]. International journal of bio-medical computing, 1994, 35(S1): 23-27.
[15] ROBINSON D M. Health information privacy: without confidentiality[J]. International journal of bio-medical computing, 1994, 35(S1): 97-104.
[16] MOEN W E. Information technology standards in the federal government: components of federal information policy[C]//Proceedings of the ASIS annual meeting. Columbus: Learned Information, 1993: 25-31.
[17] HÄYRY M, TAKALA T. Genetic information, rights, and autonomy[J]. Theoretical medicine and bioethics, 2001, 22(5): 403-414.
[18] RUGHINIS C, RUGHINIS R. Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union[J]. Computers & security, 2014, 43: 111-125.
[19] 曹文振, 周庆山, 邝伟文. 国际核心期刊情报学论文前沿研究领域分析(2016-2018年)——基于一种改进的样本遴选方法[J]. 现代情报, 2019, 39(5): 3-16.
[20] SOURBATI M. Disabling communications? a capabilities perspective on media access, social inclusion and communication policy[J]. Media, culture & society, 2012, 34(5): 571-587.
[21] BUITEN M C. Towards intelligent regulation of artificial intelligence[J]. European journal of risk regulation, 2019, 10(1): 41-59.
[22] KOOHANG A, NORD J H, SANDOVAL Z V, et al. Reliability, validity, and strength of a unified model for information security policy compliance[J]. Journal of computer information systems, 2021, 61(2): 99-107.
[23] VERMA R, GOVINDARAJ J, GUPTA G. Data privacy perceptions about digital forensic investigations in india[C]//IFIP international conference on digital forensics. Cham: Springer, 2016: 25-45.
[24] HENDRICKS-STURRUP R M, LU C Y. Direct-to-consumer genetic testing data privacy: key concerns and recommendations based on consumer perspectives[J]. Journal of personalized medicine, 2019, 9(2): 25.
[25] ELMAHJUB E. Situating intellectual property policy into a human development paradigm[J]. The journal of world intellectual property, 2015, 18(5): 245-269.
[26] 章琪. 摩尔定律的失效将催生更多创新[J]. 世界科学, 2015(6): 30-34.
[27] ONIK M M H, CHUL-SOO K I M, JINHONG Y. Personal data privacy challenges of the fourth industrial revolution[C]//21st International conference on advanced communication technology. PyeongChang: IEEE, 2019: 635-638.
[28] 国家互联网信息办公室. 国家互联网信息办公室有关负责人就对滴滴全球股份有限公司依法作出网络安全审查相关行政处罚的决定答记者问[EB/OL]. [2022-09-13]. http://www.cac.gov.cn/2022-07/21/c_1660021534364976.htm.
[29] 国家计算机病毒应急处理中心. 西北工业大学遭美国NSA网络攻击事件调查报告(之一)[R/OL]. [2022-09-13]. https://www.cverc.org.cn/head/zhaiyao/news20220905-NPU.htm.
Outlines

/