transmissions and unconventional accesses, and
recognize potential abusive behaviors. We can refer
to the CDM project of the US CISA. It continuously
diagnoses network traffic and marks suspicious
activities in real time. Through sensors and tools
deployed in the networks of federal agencies, the
CDM project continuously collects data such as
network traffic, device status, and user behavior, and
integrates them into a unified federal control panel.
The control panel provides host-level visibility,
enabling CISA to identify anomalous traffic patterns
and flag potential threats within minutes. It can also
generate incident reports and push remediation
recommendations, forming a monitoring-response-
remediation closed loop (Michael, 2023).
4.2 Market Mechanism: Data
Elementization Reform with
Incentive Compatibility
The core of the data element reform that is compatible
with market mechanism incentives is to build a
system that not only conforms to the laws of market
economy but also can effectively incentivize the
efficient allocation and rational use of data elements.
The reform emphasizes establishing a legal
foundation for data circulation by clarifying data
property rights and defining the rights and obligations
among data owners, users, and managers. On this
basis, a market pricing mechanism is introduced to
form reasonable market prices that reflect the true
value of data based on factors such as data quality,
scarcity, and application value, thereby promoting
data's participation in market distribution as a
production factor. Meanwhile, the reform focuses on
establishing a fair and competitive data trading
environment, breaking data monopolies, encouraging
multiple entities to participate in the data market,
enhancing data service quality through competition,
reducing data acquisition costs, and stimulating
market vitality. In order to achieve incentive
compatibility, the reform also includes the design of
a reasonable revenue distribution mechanism to
ensure that data creators, processors, users and the
public can receive corresponding returns according to
their contributions, forming a positive incentive
mechanism to promote the continuous investment and
innovative application of data resources. In addition,
it is essential to strengthen data security and privacy
protection, establish a sound data supervision system,
ensure the legality and compliance of data circulation,
maintain market order, and enhance the confidence of
market participants.
5 CONCLUSION
With the advent of the digital age and the acceleration
of globalization, data application scenarios have
penetrated into all aspects, personal rights awareness
has strengthened, and countries have placed greater
emphasis on autonomy. This article first clarifies the
relationship between cross-border data privacy rights
and cross-border data sovereignty, and explains the
main problems faced by the free flow of cross-border
data when it is hindered due to national security
conflicts. These problems mainly include two
aspects: one is the issue of data ownership, and the
other is the issue of data access rights. Through the
literature review method, some scholars summarized
the solutions to the balance and contradiction between
cross-border data protection and free flow, and The
paper focuses on analyzing the structural differences
in legislative concepts and implementation paths
among the three major regulatory paradigms of the
United States' "market-dominant type", the European
Union's "rights-based type", and China's "security-
priority type". The case analysis part focuses on the
iterative process of the data transmission mechanism
between the United States and Europe, especially the
judicial rejection of the "Privacy Shield" agreement
by the Court of Justice of the European Union based
on Article 45 of the General Data Protection
Regulation (GDPR) in the Schrems II case, as well as
the fundamental flaws that persist in the
determination of regulatory equivalence in the
"Transatlantic Data Privacy Framework" in the
subsequent period. Based on the challenges faced,
this paper proposes a balanced model construction
pathway, establishes a risk-based hierarchical
dynamic control system, and promotes incentive-
compatible data element reform. It classifies cross-
border data into core data, sensitive data, and general
data while conducting risk assessments for different
data categories. A cross-border data trading market is
established, divided into primary and secondary
markets, with increased emphasis on privacy
protection technologies. Special attention is given to
strengthening legal regulations governing the use and
circulation of artificial intelligence in cross-border
data contexts. At the same time, we will strengthen
international cooperation through regional and
multilateral agreements and reach more international
consensus to form common values to deal with the
fragmentation of international rules in this regard, as
well as the balance between cross-border data
facilitates unrestricted flow and privacy protection. In
the future, it is hoped that by contemplating human
rights and dignity, responsibility and safety, shared