{"id":"https://openalex.org/W3213688096","doi":"https://doi.org/10.1093/cybsec/tyac011","title":"China\u2019s emerging data protection framework","display_name":"China\u2019s emerging data protection framework","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W3213688096","doi":"https://doi.org/10.1093/cybsec/tyac011","mag":"3213688096"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyac011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac011/45513214/tyac011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac011/45513214/tyac011.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034083359","display_name":"Rogier Creemers","orcid":"https://orcid.org/0000-0002-8803-4971"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Rogier Creemers","raw_affiliation_strings":["Leiden Institute for Area Studies, Leiden University , Matthias De Vrieshof 3, Leiden, Zuid Holland, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-8803-4971","affiliations":[{"raw_affiliation_string":"Leiden Institute for Area Studies, Leiden University , Matthias De Vrieshof 3, Leiden, Zuid Holland, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5034083359"],"corresponding_institution_ids":["https://openalex.org/I121797337"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":24.9403,"has_fulltext":true,"cited_by_count":75,"citation_normalized_percentile":{"value":0.995871,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.6531275510787964},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.6427914500236511},{"id":"https://openalex.org/keywords/promulgation","display_name":"Promulgation","score":0.6323409080505371},{"id":"https://openalex.org/keywords/china","display_name":"China","score":0.5850006341934204},{"id":"https://openalex.org/keywords/legislature","display_name":"Legislature","score":0.41953787207603455},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.41276082396507263},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.40358567237854004},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.38605797290802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36324048042297363},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33513662219047546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.10928842425346375}],"concepts":[{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.6531275510787964},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.6427914500236511},{"id":"https://openalex.org/C2777638717","wikidata":"https://www.wikidata.org/wiki/Q446780","display_name":"Promulgation","level":2,"score":0.6323409080505371},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.5850006341934204},{"id":"https://openalex.org/C83009810","wikidata":"https://www.wikidata.org/wiki/Q11204","display_name":"Legislature","level":2,"score":0.41953787207603455},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.41276082396507263},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.40358567237854004},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.38605797290802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36324048042297363},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33513662219047546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.10928842425346375}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyac011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac011/45513214/tyac011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyac011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac011/45513214/tyac011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2560306932","display_name":null,"funder_award_id":"016.Vidi.185.200","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3213688096.pdf","grobid_xml":"https://content.openalex.org/works/W3213688096.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1979793386","https://openalex.org/W2046160792","https://openalex.org/W2058781004","https://openalex.org/W2242876190","https://openalex.org/W2273999834","https://openalex.org/W2388684055","https://openalex.org/W2478504318","https://openalex.org/W2491473451","https://openalex.org/W2500317482","https://openalex.org/W2812546362","https://openalex.org/W2891192649","https://openalex.org/W2891756119","https://openalex.org/W2894177813","https://openalex.org/W2895266743","https://openalex.org/W2904714854","https://openalex.org/W2919061685","https://openalex.org/W2969802632","https://openalex.org/W2975795637","https://openalex.org/W3042963814","https://openalex.org/W3087855121","https://openalex.org/W3121790624","https://openalex.org/W3128005490","https://openalex.org/W3152827909","https://openalex.org/W3156115729","https://openalex.org/W4226093358","https://openalex.org/W4252271612","https://openalex.org/W6631801768","https://openalex.org/W6645249800","https://openalex.org/W6694553046","https://openalex.org/W6697557110","https://openalex.org/W6781921093"],"related_works":["https://openalex.org/W2380941394","https://openalex.org/W3031105984","https://openalex.org/W2379187455","https://openalex.org/W2166137262","https://openalex.org/W3123269021","https://openalex.org/W2387203598","https://openalex.org/W2893356031","https://openalex.org/W3034027116","https://openalex.org/W3004394294","https://openalex.org/W4251058704"],"abstract_inverted_index":{"Abstract":[0],"Over":[1],"the":[2,6,23,26,33,39,43,85,115,137,140,149,155,158,165,171,181,207,211,225,229,243,267],"past":[3],"5":[4],"years,":[5],"People\u2019s":[7],"Republic":[8],"of":[9,25,41,46,87,108,126,139,143,152,157,266,280],"China":[10],"has":[11],"accelerated":[12],"efforts":[13,48],"to":[14,73,76,79,100,164,178,218,236,239],"establish":[15],"a":[16,55,70,105,123,214,232,263],"legal":[17],"architecture":[18],"for":[19,253],"data":[20,59,74,88,145,202,220,271],"protection.":[21],"With":[22],"promulgation":[24,156],"Personal":[27],"Information":[28],"Protection":[29],"Law":[30,36,160,255],"(PIPL)":[31],"and":[32,82,118,173,187,204,242,275],"Data":[34],"Security":[35],"(DSL)":[37],"in":[38,91,161,224],"summer":[40],"2021,":[42],"first":[44],"phase":[45],"these":[47],"have":[49,54],"been":[50],"concluded.":[51],"These":[52],"will":[53,260],"significant":[56],"impact":[57],"on":[58,122,201],"flows":[60],"within":[61,277],"China,":[62],"but":[63],"also":[64],"merit":[65],"foreign":[66],"attention.":[67],"They":[68],"provide":[69],"new":[71],"approach":[72],"protection":[75,89,146,221],"be":[77],"subjected":[78],"comparative":[80],"analysis,":[81],"may":[83],"influence":[84],"development":[86],"legislation":[90,111],"other":[92],"states,":[93],"particularly":[94],"those":[95],"with":[96],"close":[97],"digital":[98],"connections":[99],"China.":[101],"Doing":[102],"so":[103],"requires":[104],"greater":[106],"understanding":[107],"how":[109],"this":[110,134,254],"is":[112,231,272],"shaped":[113],"by":[114,130,206],"Chinese":[116,281],"political":[117],"economic":[119],"context.":[120],"Drawing":[121],"thorough":[124,264],"review":[125],"government":[127],"documents,":[128],"supplemented":[129],"Chinese-language":[131],"academic":[132],"sources,":[133],"article":[135],"reviews":[136],"evolution":[138],"two":[141],"pillars":[142],"China\u2019s":[144],"architecture,":[147],"from":[148],"early":[150],"stage":[151],"fragmentation":[153],"via":[154],"Cybersecurity":[159],"2016,":[162],"up":[163],"present":[166],"day.":[167],"It":[168,195],"finds":[169],"that":[170],"PIPL":[172,212],"its":[174],"attendant":[175],"regulations":[176],"serve":[177],"primarily":[179],"regulate":[180],"relationship":[182],"between":[183],"large":[184],"technology":[185],"companies":[186],"consumers,":[188],"as":[189,191],"well":[190],"prevent":[192,237],"cyber":[193],"crime.":[194],"does":[196],"not":[197],"create":[198],"meaningful":[199],"constraints":[200],"collection":[203],"use":[205],"state.":[208],"Even":[209],"so,":[210],"bears":[213],"clear":[215],"family":[216],"resemblance":[217],"personal":[219],"regimes":[222],"elsewhere":[223],"world.":[226],"In":[227],"contrast,":[228],"DSL":[230],"considerable":[233],"innovation,":[234],"attempting":[235],"harm":[238],"national":[240],"security":[241],"public":[244],"interest":[245],"inflicted":[246],"through":[247,269],"data-enabled":[248],"means.":[249],"While":[250],"implementing":[251],"structures":[252],"remain":[256],"under":[257],"construction,":[258],"it":[259],"likely":[261],"herald":[262],"reorganization":[265],"way":[268],"which":[270],"collected,":[273],"stored,":[274],"managed":[276],"all":[278],"kinds":[279],"actors.":[282]},"counts_by_year":[{"year":2026,"cited_by_count":12},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-27T08:22:11.395708","created_date":"2025-10-10T00:00:00"}
