期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
1
作者 Sina Ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud Security Threat Analysis Mitigation Strategies Emerging Trends ethi-cal Considerations Data Analysis
下载PDF
大数据技术的伦理问题 被引量:185
2
作者 邱仁宗 黄雯 翟晓梅 《科学与社会》 CSSCI 2014年第1期36-48,共13页
本文探讨了大数据技术创新、研发和应用中的伦理问题。指出大数据技术是把双刃剑,这种技术的创新使社会、商业、以及亿万人受益,但同时也带来风险。我们必须鉴定风险,平衡创新带来的利益与风险。文章还探讨了与信息技术及大数据技术有... 本文探讨了大数据技术创新、研发和应用中的伦理问题。指出大数据技术是把双刃剑,这种技术的创新使社会、商业、以及亿万人受益,但同时也带来风险。我们必须鉴定风险,平衡创新带来的利益与风险。文章还探讨了与信息技术及大数据技术有关的数字身份、隐私、可及、安全和安保、数字鸿沟等伦理问题,并讨论了解决这些伦理问题的进路。最后,建议引入伦理治理的概念,指出大数据的顺利推广应用要求我们制订评价在大数据方面所采取行动的伦理框架,即伦理原则,为制订行为准则、管理和立法建立一个伦理学基础。 展开更多
关键词 大数据 数字身份 隐私 可及 安全 安保 数字鸿沟 伦理治理
下载PDF
性描写的伦理思考和艺术原则 被引量:5
3
作者 周博 《江西社会科学》 北大核心 2003年第2期97-100,共4页
新时期小说创作在20世纪80年代初突破性禁区,90年代后兴起性描写热。性描写热的形成除了文学自身发展的必然规律外,也与当下的审美文化密不可分。“性”这把亦善亦恶的双刃剑,需要人们对性描写作出理性的思考和艺术的规范:社会普遍的道... 新时期小说创作在20世纪80年代初突破性禁区,90年代后兴起性描写热。性描写热的形成除了文学自身发展的必然规律外,也与当下的审美文化密不可分。“性”这把亦善亦恶的双刃剑,需要人们对性描写作出理性的思考和艺术的规范:社会普遍的道德心理承受水平是其不可逾越的伦理底线;深刻的探究人性和人生方能使其不失品格;隽永的意蕴和丰富的启示力是性描写需要遵循的审美原则。 展开更多
关键词 性描写 性泛滥 伦理思考 艺术原则
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部