Articles in this Volume

Research Article Open Access
International Legal Regulation of Cross-border Data Flows in the Digital Economy Era and China's Response
In the digital economy era, data has become an important element driving the global economy, and the issue of its cross-border flow has gradually shifted from the technical level to the institutional level. This article, starting from multilateral, regional and bilateral rules, sorts out and analyzes the existing systems regarding the international legal regulation of cross-border data flows and China's response paths. The research reveals that currently, the international community has not yet established unified rules for cross-border data flow, and the overall situation shows a fragmented characteristic. Based on this, this paper conducts a normative analysis and comparative study to summarize the data governance framework that China has established, which is oriented towards security. It then proposes ways to achieve a balance between data flow efficiency and security, such as improving classification and grading management, optimizing the security assessment mechanism, and strengthening participation in international rules. The research suggests that establishing a global unified rule in the short term is difficult. China should, while improving its domestic system, gradually enhance its international participation to better meet the actual demands of the development of the digital economy.
Show more
Read Article PDF
Cite
Research Article Open Access
Analysis on the Risk Prevention of "Going Global" Trademark of China Enterprises under the Background of Belt and Road
Under the background of the "One Belt, One Road" initiative, the number of China enterprises going abroad is increasing, and the importance of intellectual property protection is becoming increasingly prominent, especially the risk of registered trademarks overseas. Therefore, this paper summarizes the causes of the registered trademarks of China enterprises going to sea under the background of "Belt and Road", which are manifested in three aspects: the infringer takes advantage of the system differences to register, the enterprise ignores the importance of layout and market competition, and the interest-driven registration. This paper puts forward that enterprises should strengthen their awareness, clarify the specific legal system of the target country, and lay out related trademarks to effectively avoid risks. At the national level, they should actively participate in the prevention and finally form a linkage between government and enterprises to build an integrated risk prevention system. This paper provides practical support for Chinese enterprises to safeguard their own interests at sea, and also provides new ideas for solving the problems of cross-border trademark squatting internationally.
Show more
Read Article PDF
Cite
Research Article Open Access
Compliance Paths and Institutional Improvement for Personal Information Protection in Cross-Border Data Flows
Against the backdrop of the globalization of the digital economy, cross-border data flows have made significant contributions to the integration of the global industrial chain and the development of digital trade. As a sensitive data type in cross-border flows, the protection of personal information is deeply linked to national data sovereignty and the protection of individuals' basic rights. China has achieved phased results in the institutional construction of personal information protection in cross-border data flows, forming a "1+3+N" legal regulatory system, and establishing three statutory compliance paths: data exit security assessment, personal information protection certification, and standard contract for personal information exit. It has also explored a regulatory model adapted to China's digital economic development stage through the pilot programs of negative lists and white lists for data exit in free trade pilot zones. However, practical problems still exist, such as difficulties in implementing protection mechanisms, unclear regulatory rules, hidden dangers in legal convergence and data development. Therefore, this paper puts forward practical and systematic suggestions for institutional improvement from four dimensions: precisely defining the scope of sensitive personal information, refining supporting rules for data exit, preventing potential risks from technological development, and optimizing certification rules for international cooperation networks.
Show more
Read Article PDF
Cite
Research Article Open Access
The Dilemma and Solution of the Protection of the Rights and Interests of Overage Migrant Workers under Incomplete Labour Relations
Under the background of the policy of population ageing and delayed retirement, over-age farmers work as a special group with the dual characteristics of "overage" and "not enjoying social security for employees". They face multiple dilemmas such as difficulties in labour relations certification, imbalance in the distribution of the burden of proof and lack of ability to prove. The root cause lies in the conflict of upper and lower laws and justice in the current legislation. The geographical division of the referee standard. In this regard, we should introduce the identification standard of "substantial subordinate attribute" and establish typified adjudication rules; standardise the retention of evidence for informal employment, strengthen the burden of proof of the employer and optimise the rules for evidence identification; and supplemented by the differentiated application of professional legal assistance and advantageous evidence rules, so as to effectively protect the core rights and interests of overage migrant workers.
Show more
Read Article PDF
Cite
Research Article Open Access
How to Make CSR Commitments More Credible
Under the background of economic globalization and the widespread development of the social consciousness, societal expectations regarding corporate social responsibility (CSR) have become increasingly stringent. As a response to such requirements, there may be situations where enterprises try to fake their CSR commitments, which has greatly affected the general trust of consumers towards enterprises. This paper aims at making recommendations about how to enhance the credibility of CSR commitments by discussing the term 'credibility' and conducting a case study of companies' existing CSR practices. On the basis of the findings gained through the analysis, this paper suggests further ways for corporations to deal with the problem mentioned above. It is highly recommended that enterprises clarify the structure of their CSR commitments, increase the transparency of reporting, and lay down milestone plans with a definite time frame. Such recommendations should be considered in order to make it easier to measure the feasibility of CSR commitments, thus ensuring their reliability.
Show more
Read Article PDF
Cite
Research Article Open Access
Understanding Gender-Based Violence in a Structural Way
This paper regards gender-based violence as a form of structural violence that spans different cultural and social contexts. It argues that gender-based violence is reproduced and sustained through interwoven power systems within state institutions and social structures. Using a comparative research method, the paper examines two cases: gender-based violence against Native American women in North America and violence against women in the Hong Kong Special Administrative Region of the People's Republic of China (Hong Kong SAR). In the North American context, the Missing and Murdered Indigenous Women crisis exposes how legal restrictions and institutional failures under colonial governance have increased Indigenous women's exposure to violence. In this case, structural violence operates through the state system, making it difficult for Indigenous women to obtain effective protection from public authorities while they remain socially marginalised. By contrast, the case of Hong Kong SAR shows that gender-based violence may persist even within a relatively stable legal system, where violence is more deeply embedded in family structures, patriarchal values and cultural norms.
Show more
Read Article PDF
Cite