期刊文献+
共找到6,407篇文章
< 1 2 250 >
每页显示 20 50 100
The accessible seismological dataset of a high-density 2D seismic array along Anninghe fault
1
作者 Weifan Lu Zeyan Zhao +3 位作者 Han Yue Shiyong Zhou Jianping Wu Xiaodong Song 《Earthquake Science》 2024年第1期67-77,共11页
The scientific goal of the Anninghe seismic array is to investigate the detailed geometry of the Anninghe fault and the velocity structure of the fault zone.This 2D seismic array is composed of 161 stations forming su... The scientific goal of the Anninghe seismic array is to investigate the detailed geometry of the Anninghe fault and the velocity structure of the fault zone.This 2D seismic array is composed of 161 stations forming sub-rectangular geometry along the Anninghe fault,which covers 50 km and 150 km in the fault normal and strike directions,respectively,with~5 km intervals.The data were collected between June 2020 and June 2021,with some level of temporal gaps.Two types of instruments,i.e.QS-05A and SmartSolo,are used in this array.Data quality and examples of seismograms are provided in this paper.After the data protection period ends(expected in June 2024),researchers can request a dataset from the National Earthquake Science Data Center. 展开更多
关键词 Anninghe fault seismological dataset data share
下载PDF
BC-PC-Share:Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
2
作者 Caihui Lan Haifeng Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2985-3010,共26页
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett... Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain. 展开更多
关键词 Blockchain patient-centric personal health records data sharing attribute-based encryption
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
3
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
4
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
5
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
A Novel Agricultural Data Sharing Mode Based on Rice Disease Identification
6
作者 Mengmeng ZHANG Xiujuan WANG +3 位作者 Mengzhen KANG Jing HUA Haoyu WANG Feiyue WANG 《Plant Diseases and Pests》 2024年第2期9-16,共8页
In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the trainin... In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the training results,in addition to the optimization achieved through the model structure.However,the lack of open-source agricultural data,combined with the absence of a comprehensive open-source data sharing platform,remains a substantial obstacle.This issue is closely related to the difficulty and high cost of obtaining high-quality agricultural data,the low level of education of most employees,underdeveloped distributed training systems and unsecured data security.To address these challenges,this paper proposes a novel idea of constructing an agricultural data sharing platform based on a federated learning(FL)framework,aiming to overcome the deficiency of high-quality data in agricultural field training. 展开更多
关键词 Rice disease and pest identification Convolutional neural networks Distributed training Federated learning(FL) Open-source data sharing platform
下载PDF
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes 被引量:1
7
作者 Yizhou Shen Shigen Shen +3 位作者 Qi Li Haiping Zhou Zongda Wu Youyang Qu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期906-919,共14页
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high freq... The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared. 展开更多
关键词 Privacy preservation Internet of things Evolutionary game data sharing Edge computing
下载PDF
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
8
作者 Wenxian Jiang Mengjuan Chen Jun Tao 《China Communications》 SCIE CSCD 2023年第3期69-85,共17页
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised abou... Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised about the security and privacy of vehicle data.The mobility and real-time characteristics of vehicle data make data sharing more difficult in Io V.The emergence of blockchain and federated learning brings new directions.In this paper,a data-sharing model that combines blockchain and federated learning is proposed to solve the security and privacy problems of data sharing in Io V.First,we use federated learning to share data instead of exposing actual data and propose an adaptive differential privacy scheme to further balance the privacy and availability of data.Then,we integrate the verification scheme into the consensus process,so that the consensus computation can filter out low-quality models.Experimental data shows that our data-sharing model can better balance the relationship between data availability and privacy,and also has enhanced security. 展开更多
关键词 blockchain federated learning PRIVACY data sharing Internet of Vehicles
下载PDF
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
9
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
SHARE数据库介绍与数据提取方法
10
作者 李静 田国祥 +5 位作者 郭佳钰 陈冲 乔萌萌 程洪涛 吕军 李媛洁 《中国循证心血管医学杂志》 2023年第9期1036-1039,共4页
人口老龄化是人类社会成功的标志之一,同时全球医疗服务体系也面临着老龄化带来的巨大冲击和挑战。SHARE数据库是研究欧洲公民生命历程中健康、社会、经济和环境等因素对老龄化的影响的基础研究数据库,同时也是最大的欧洲社会科学小组研... 人口老龄化是人类社会成功的标志之一,同时全球医疗服务体系也面临着老龄化带来的巨大冲击和挑战。SHARE数据库是研究欧洲公民生命历程中健康、社会、经济和环境等因素对老龄化的影响的基础研究数据库,同时也是最大的欧洲社会科学小组研究,该数据库提供了国际可比的纵向微观数据,使人们能够了解欧洲个人的公共卫生和社会经济生活条件。本文将对SHARE数据库架构进行介绍,指引用户在官网上如何下载提取数据,旨在为医学科研者提供一个高质量的医学公共数据资源平台。 展开更多
关键词 share数据库 数据挖掘 纵向研究 老龄化
下载PDF
数字化铀矿勘查服务平台数据资源共享与安全策略 被引量:1
11
作者 孔维豪 刘洋 +5 位作者 陈霜 朱鹏飞 蔡煜琦 李晓翠 刘琳莹 王思宇 《铀矿地质》 CSCD 2024年第1期171-180,共10页
随着“数字核工业”建设的全面铺开,数据资源成为铀矿地质勘查业务中不可或缺的核心生产要素。核工业北京地质研究院基于开源软件架构,研发了基于统一架构、研产一体的“数字化铀矿勘查服务平台”,该平台是基于各类实用型软件功能和丰... 随着“数字核工业”建设的全面铺开,数据资源成为铀矿地质勘查业务中不可或缺的核心生产要素。核工业北京地质研究院基于开源软件架构,研发了基于统一架构、研产一体的“数字化铀矿勘查服务平台”,该平台是基于各类实用型软件功能和丰富的勘查数据资源开展数据共享与应用,在铀矿地质勘查工作中提高勘查效率和准确性的一种服务型软件系统。为了满足铀矿地质勘查不同类型的数据及服务需求,建立了一套较为健全的数据资源和服务体系,提供了一批基础地质、铀矿勘查物化探等相关数据资源,并严格划分数据权限和用户权限,实现根据数据所有权划分审批权限的功能。同时,在国家网络安全和信息安全的要求下,开展了数据安全策略研究,以保障平台安全稳定运行。面向四代勘查项目,面向铀矿地质勘查领域,初步构建了“快速存储、方便查询、灵活调用、共享发布、动态更新、分析应用”的数据资源管理、共享和应用服务平台。 展开更多
关键词 开源 数据资源 数据共享 数据安全
下载PDF
Research on the Electric Energy Metering Data Sharing Method in Smart Grid Based on Blockchain
12
作者 Shaocheng Wu Honghao Liang +4 位作者 Xiaowei Chen Tao Liu Junpeng Ru Qianhong Gong Jin Li 《Journal on Big Data》 2023年第1期57-67,共11页
Enabling data sharing among smart grid power suppliers is a pressing challenge due to technical hurdles in verifying,storing,and synchronizing energy metering data.Access and sharing limitations are stringent for user... Enabling data sharing among smart grid power suppliers is a pressing challenge due to technical hurdles in verifying,storing,and synchronizing energy metering data.Access and sharing limitations are stringent for users,power companies,and researchers,demanding significant resources and time for permissions and verification.This paper proposes a blockchain-based architecture for secure and efficient sharing of electric energy metering data.Further,we propose a data sharing model based on evolutionary game theory.Based on the Lyapunov stability theory,the model’s evolutionary stable strategy(ESS)is analyzed.Numerical results verify the correctness and practicability of the scheme proposed in this paper,and provide a new method for realizing convenient,safe and fast data sharing. 展开更多
关键词 Smart grid data sharing blockchain evolutionary stable strategy
下载PDF
基于侧链和信任管理模型的数据共享方案
13
作者 吴昊 李贝 +2 位作者 贺小伟 王宾 李思远 《计算机工程与设计》 北大核心 2024年第1期24-31,共8页
为解决在不信任的区块链环境中由于数据转售而造成的用户不愿共享数据等问题,提出一种基于侧链和信任管理模型的数据共享方案。使用信任管理模型量化节点信任值,将节点信任值集成到数据共享智能合约中,为用户提供可信的共享环境和动态... 为解决在不信任的区块链环境中由于数据转售而造成的用户不愿共享数据等问题,提出一种基于侧链和信任管理模型的数据共享方案。使用信任管理模型量化节点信任值,将节点信任值集成到数据共享智能合约中,为用户提供可信的共享环境和动态的访问控制接口。对联盟链进行侧链扩容,使用信任管理模型优化共识算法。规定主链使用具有拜占庭容错能力的T-PBFT算法,侧链使用仅适用于高信任场景的T-Raft算法。用户根据预先设置的阈值动态决定在主链或侧链共享数据。实验就方案的安全性和性能进行分析,表明了该方案的可行性和有效性。 展开更多
关键词 区块链 数据共享 智能合约 信任管理模型 侧链 数据转售 共识算法
下载PDF
基于区块链的联邦蒸馏数据共享模型研究
14
作者 刘炜 刘宇昭 +3 位作者 唐琮轲 王媛媛 佘维 田钊 《计算机科学》 CSCD 北大核心 2024年第3期39-47,共9页
零散、孤立的海量数据形成“数据孤岛”使得数据无法交互和连接,如何在保护原始数据隐私的前提下安全有效地共享数据中的知识信息已成为热点研究问题。基于以上内容,提出了一种基于区块链的联邦蒸馏数据共享模型(BFDS)。区别于中心化架... 零散、孤立的海量数据形成“数据孤岛”使得数据无法交互和连接,如何在保护原始数据隐私的前提下安全有效地共享数据中的知识信息已成为热点研究问题。基于以上内容,提出了一种基于区块链的联邦蒸馏数据共享模型(BFDS)。区别于中心化架构,采用区块链联合多参与方组建教师网络,实现分布式协同工作;通过交换蒸馏输出的方式,传递数据中的知识信息,联合训练轻量化模型;提出了一种多权重节点可信评估算法,调用智能合约分配权重并生成可溯源全局软标签,降低因参与方质量差异而产生的负向影响。实验结果表明,BFDS模型能联合多参与方安全可信共享数据知识,协同蒸馏训练模型,降低了模型的部署成本;所提出的多权重节点评估算法能有效减小低质量节点的负向影响,提高了全局软标签的质量与安全性。 展开更多
关键词 区块链 知识蒸馏 数据共享 智能合约
下载PDF
浙江省动物疫病监测数字化系统构建与初步应用
15
作者 黄晓兵 张传亮 +5 位作者 刘爱军 倪柏峰 杨磊 孙思琪 赵灵燕 张红丽 《中国动物检疫》 CAS 2024年第4期22-26,共5页
动物疫病监测数字化改革是提升动物疫病监测预警、应急处置和闭环管控能力,优化和升级动物疫病监测体系的重要手段。浙江省通过流程再造、制度重塑,构建全省动物疫病监测系统,设计开发任务下达、样品采集、样品接收、样品检测、结果上... 动物疫病监测数字化改革是提升动物疫病监测预警、应急处置和闭环管控能力,优化和升级动物疫病监测体系的重要手段。浙江省通过流程再造、制度重塑,构建全省动物疫病监测系统,设计开发任务下达、样品采集、样品接收、样品检测、结果上报、数据应用等6大业务模块,打通了疫病监测全环节业务流和数据流,通过与养殖、流通、屠宰、无害化处理等畜牧全产业链业务协同和数据共享,实现了动物疫病无纸化采样监测,有效提升了监测数据采集质量,确保了监测工作源头可溯、过程可查、结果可用,为动物疫病防控政策制定提供了可靠数据支撑。 展开更多
关键词 动物疫病监测 数字化改革 数据共享
下载PDF
可撤销属性加密的区块链数据访问控制方法
16
作者 李健 戚湧 《计算机工程与设计》 北大核心 2024年第2期348-355,共8页
针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进... 针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进行安全性证明;基于超级账本Fabric进行系统设计,结合星际文件系统采用链上链下存储方式解决区块链容量不足和系统效率问题。实验结果表明,所提方案撤销属性时无需更新密钥密文重复上链,仅需要6次Pairing操作进行预解密和解密,且在大规模属性集下,预解密时间和解密时间平均保持在百毫秒左右的常量级上,实现区块链数据高效、细粒度的访问控制。 展开更多
关键词 区块链 数据共享 访问控制 属性基加密 预解密 属性撤销 星际文件系统
下载PDF
数据要素在医疗健康领域的内涵、价值与应用
17
作者 朱庆华 王晰 赵宇翔 《图书情报知识》 北大核心 2024年第2期13-17,共5页
十七部门联合发布的《“数据要素×”三年行动计划(2024—2026年)》引发了社会的广泛关注。本文首先探讨医疗健康领域数据要素的本质、分类及其重要性。在此基础上,提出促进医疗健康数据融合创新的关键策略,包括通过技术赋能医疗健... 十七部门联合发布的《“数据要素×”三年行动计划(2024—2026年)》引发了社会的广泛关注。本文首先探讨医疗健康领域数据要素的本质、分类及其重要性。在此基础上,提出促进医疗健康数据融合创新的关键策略,包括通过技术赋能医疗健康数据的采集,推动医疗健康数据的整合与标准化工作,促进医疗健康数据的开放和共享,以及加强对医疗健康数据的安全保护。 展开更多
关键词 医疗健康领域 数据要素 数据标准化 数据开放共享 数据安全
下载PDF
数智技术赋能统战工作发展透视
18
作者 王飞 《西华大学学报(哲学社会科学版)》 2024年第2期23-33,共11页
数智技术与统战工作在价值理念和政治定位等层面具有高度契合性,前者可以满足后者信息化、智能化、精准化、动态化等发展需求,为后者高质量发展提供持续动能。数智技术能有效支撑和服务于统战工作、开拓统战工作数据应用新空间、激发统... 数智技术与统战工作在价值理念和政治定位等层面具有高度契合性,前者可以满足后者信息化、智能化、精准化、动态化等发展需求,为后者高质量发展提供持续动能。数智技术能有效支撑和服务于统战工作、开拓统战工作数据应用新空间、激发统战工作新活力。当前我国数智统战工作取得了一些进展,但也面临数字化平台和工具应用不足、数据共享和协同体系不完善以及数智化人才短缺和统战干部理念更新不足等问题。因此,未来数智统战应综合运用数智技术,通过构建面向统战对象的大数据智能分析平台、开发数智化统战工作工具、丰富宣传内容和形式,推动统战工作凝聚人心、汇聚力量;通过制定统一的数智统战顶层设计和规划、构建统一开放的统战云平台、完善数智安全保障体系,赋能大统战工作格局的构建;通过推进协商数智化体系构建、建立政协系统数智人才培训与考核机制、加大新技术在协商业务流程中的应用,深化协商民主。 展开更多
关键词 统战工作 大统战工作格局 协商民主 数智技术 数据共享 数据安全
下载PDF
欧盟《数据治理法》的解读及对我国智慧图书馆数据治理的启示
19
作者 梅振荣 裴丽 王海伶 《图书馆》 2024年第4期62-68,共7页
数据治理是智慧图书馆管理和利用数据的有效手段,现阶段,国内图书馆在数据开放共享和数据价值利用等方面仍存在许多不足。欧盟《数据治理法》在数据共享和数据再利用上具有一定的优势,基于此,文章通过深入分析欧盟《数据治理法》的主要... 数据治理是智慧图书馆管理和利用数据的有效手段,现阶段,国内图书馆在数据开放共享和数据价值利用等方面仍存在许多不足。欧盟《数据治理法》在数据共享和数据再利用上具有一定的优势,基于此,文章通过深入分析欧盟《数据治理法》的主要内容,借鉴其成功经验,以为我国智慧图书馆数据治理提供参考。 展开更多
关键词 《数据治理法》 欧盟 智慧图书馆 数据治理 数据开放 数据共享
下载PDF
企业向政府共享数据的法律激励问题及创新路径
20
作者 胡元聪 徐媛 《陕西师范大学学报(哲学社会科学版)》 北大核心 2024年第1期134-147,共14页
企业向政府共享数据法律激励的路径创新有利于数据资源的优化配置,进而推动我国数字经济的高质量发展,助力数智时代的人工智能研发创新以及提升政府数字化转型背景下的国家治理能力。为实现企业向政府共享数据的法律激励目标,应检视我... 企业向政府共享数据法律激励的路径创新有利于数据资源的优化配置,进而推动我国数字经济的高质量发展,助力数智时代的人工智能研发创新以及提升政府数字化转型背景下的国家治理能力。为实现企业向政府共享数据的法律激励目标,应检视我国当前企业向政府共享数据法律激励制度供给方面存在的问题,将企业社会责任理论、社会共生理论和成本收益理论作为理论依据,建议通过厘清法律激励范围、设立法律激励标准、丰富法律激励方式、健全法律激励程序,从而实现数据要素价值的充分释放和数据资源的分配正义。 展开更多
关键词 企业数据 数据共享 法律激励 数据要素价值
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部