{"title":"“数字弱势群体”的法律保护研究","authors":"Wang Bingwu","doi":"10.23977/law.2023.020109","DOIUrl":null,"url":null,"abstract":": The world is currently experiencing rapid Internet technology development, marking the onset of the \"digital age\". As this transition unfolds, human rights protection in the digital age is increasingly prominent, with the rights of \"digital vulnerable groups\" coming under threat. The primary threats to \"digital vulnerable groups\" are twofold: first, information resource asymmetry that leaves their rights invisible and vulnerable, and second, strong digital infringement concealment that often makes it difficult to identify members of \"digital vulnerable groups\". Protecting the rights of \"digital vulnerable groups\" should focus on two key aspects: first, redistributing information resources to benefit these groups, and second, reversing the burden of proof so that the tort subject bears the burden of proof","PeriodicalId":271650,"journal":{"name":"Science of Law Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Legal Protection of \\\"Digital Inadvantaged Group\\\"\",\"authors\":\"Wang Bingwu\",\"doi\":\"10.23977/law.2023.020109\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": The world is currently experiencing rapid Internet technology development, marking the onset of the \\\"digital age\\\". As this transition unfolds, human rights protection in the digital age is increasingly prominent, with the rights of \\\"digital vulnerable groups\\\" coming under threat. The primary threats to \\\"digital vulnerable groups\\\" are twofold: first, information resource asymmetry that leaves their rights invisible and vulnerable, and second, strong digital infringement concealment that often makes it difficult to identify members of \\\"digital vulnerable groups\\\". Protecting the rights of \\\"digital vulnerable groups\\\" should focus on two key aspects: first, redistributing information resources to benefit these groups, and second, reversing the burden of proof so that the tort subject bears the burden of proof\",\"PeriodicalId\":271650,\"journal\":{\"name\":\"Science of Law Journal\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Science of Law Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23977/law.2023.020109\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science of Law Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23977/law.2023.020109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Legal Protection of "Digital Inadvantaged Group"
: The world is currently experiencing rapid Internet technology development, marking the onset of the "digital age". As this transition unfolds, human rights protection in the digital age is increasingly prominent, with the rights of "digital vulnerable groups" coming under threat. The primary threats to "digital vulnerable groups" are twofold: first, information resource asymmetry that leaves their rights invisible and vulnerable, and second, strong digital infringement concealment that often makes it difficult to identify members of "digital vulnerable groups". Protecting the rights of "digital vulnerable groups" should focus on two key aspects: first, redistributing information resources to benefit these groups, and second, reversing the burden of proof so that the tort subject bears the burden of proof