Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and ...In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and legal effect on market and competition, which can not only promote the communication among members of the industry to find a solution to the industry benefit maximization, but also can produce inhibition and barriers to competition in the market. So in this paper, the industry association analysis will be made on the pros and cons of the information exchange, and the legislative defects and the insufficiency of information exchange industry association in our country. According to the practice in our country, the author puts forward the system design of our country industry association information exchange behavior.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
Quality of experience(QoE) has been one of the most important factors for service providers and operators to develop and deploy services. Previous works have shown that Weber-Fechner law(WFL) can be used to promot...Quality of experience(QoE) has been one of the most important factors for service providers and operators to develop and deploy services. Previous works have shown that Weber-Fechner law(WFL) can be used to promote the accuracy of best-effort(BE) services' QoE assessment. In this paper, based on WFL, we take a deep insight into the visual information of BE services and its role in WFL, especially in web browsing services, and propose an enhanced QoE assessment model for BE services by taking the visual information into account. Both images and texts visual information are extracted and combined to get the visual information for web pages. Finally, a subjective experiment is performed to validate performance of proposed QoE assessment model, which shows that it performs better than traditional WFL based model.展开更多
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.
文摘In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and legal effect on market and competition, which can not only promote the communication among members of the industry to find a solution to the industry benefit maximization, but also can produce inhibition and barriers to competition in the market. So in this paper, the industry association analysis will be made on the pros and cons of the information exchange, and the legislative defects and the insufficiency of information exchange industry association in our country. According to the practice in our country, the author puts forward the system design of our country industry association information exchange behavior.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
基金supported by the Beijing Municipal Science and Technology Commission Research Fund Project (D151100000115002 )the Ministry of Education. CMCC Research fund (MCM20130132)
文摘Quality of experience(QoE) has been one of the most important factors for service providers and operators to develop and deploy services. Previous works have shown that Weber-Fechner law(WFL) can be used to promote the accuracy of best-effort(BE) services' QoE assessment. In this paper, based on WFL, we take a deep insight into the visual information of BE services and its role in WFL, especially in web browsing services, and propose an enhanced QoE assessment model for BE services by taking the visual information into account. Both images and texts visual information are extracted and combined to get the visual information for web pages. Finally, a subjective experiment is performed to validate performance of proposed QoE assessment model, which shows that it performs better than traditional WFL based model.