期刊文献+

“互联网+城市服务”计划的风险识别与管控 被引量:1

The Risk Identification and Control in the Scheme of "Internet+City Service"
下载PDF
导出
摘要 当前各级政府都积极响应国家号召开展"互联网+城市服务"建设,其目的是将城市服务与互联网技术深度融合,旨在打破城市信息孤岛,优化城市服务模式,提高城市服务水平。然而,随着公共数据资源利用的不断深入,城市信息安全和公民隐私保护也面临着新的挑战。通过分析"互联网+城市服务"计划的发展现状,识别"互联网+城市服务"计划中可能存在的风险,从管理层面、技术层面和标准层面提出管控风险的对策,以期解决"互联网+城市服务"计划中存在的公民隐私泄漏、城市信息安全威胁等问题。 At present, all levels of government are actively responding to the call of the "Internet+ city service", in order to integrate urban services with internet technology , break the city information island, optimize the model of city services and improve the level of urban services. However, with the continuous use of public data resource, the security of urban information and the privacy protection of citizens are also facing new challenges. This paper analyzed current situation of "Internet+ City Service" scheme, identifying the possible risks in the "Internet+ City Service" scheme, putting forward the countermeasures of management risk from the management level, the technical level and the standard level, in order to solve the problem of the privacy of citizens leak and the threat of urban information security in the "Internet+ City Service" scheme.
出处 《科技创业月刊》 2017年第8期8-10,共3页 Journal of Entrepreneurship in Science & Technology
关键词 互联网+ 城市服务 风险识别 风险管理 internet + city service risk identification risk management
  • 相关文献

参考文献11

二级参考文献30

  • 1赵素卿.公共服务理论研究概述[J].中共山西省委党校学报,2005,28(6):62-64. 被引量:7
  • 2Komninos N. Intelligent cities: Towards interactive and global innovation environments [ J ]. International Journal of Innovation and Regional Development, 2009, 1 (4) : 337 - 355.
  • 3王世伟,李勇,王义全,等编.智慧城市辞典[M].上海:上海社会科学院出版社,2011.
  • 4Rudolf G, Fertner C, Kramar H, et al. Smart cities-Ranking of European medium-sized cities [ R ]. Vienna University of Technology, 2007.
  • 5Tapia A, Maitland C, Stone M. Making IT work for municipalities : Building municipal wireless networks [ J ]. Govemment Information Quarterly, 2006, 23 (3): 359- 380.
  • 6Kirk P, Gary F, David A, et al. Information security by words alone: The case for strong security policies [ J ]. International Journal of Information Security and Privacy, 2009, 3 ( 2 ) : 84 - 89.
  • 7Hong K S, Chi Y, Chao L,et al. An integrated system theory of information security management [ J ]. Information Management & Computer Security, 2003, 11 (5) : 243 - 248.
  • 8Computer Science and Telecommunications Board. Cyber security today and tomorrow: Pay now or pay later [ R ]. USA, Washington DC: National Academy Press, 2002.
  • 9Chesla A. Information security : A defensive battle [ J ]. Information System Security, 2004, 12 (6) : 24 - 32.
  • 10Dreger H, Feldmann A, Paxson V, et al. Operational experiences with high-volume network intrusion detection [ C ]//Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering. Washington DC : ACM Press, 2004 : 2 - 11.

共引文献572

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部