期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law Privacy security Privacy protection will
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
2
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights Personal information protection Law dependency protection
下载PDF
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation
3
作者 Bailing LIU Feng XIAO Ke DENG 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期135-147,共13页
Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ... Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ATN, there are conflicts between negotiation success and sensitive information protection, that is, these two needs cannot be given priority at the same time, which is a challenging problem to resolve. In this paper, a language independent ATN framework, which is dynamic, flexible and adaptive, is presented to address this problem, ensuring negotiation success without sensitive information leakage. This framework is independent of the policy language which is used. However, the language used should have the capability to specify all kinds of sensitive information appearing in credentials and policies, and support the separation of attribute disclosure from credential disclosure. Thus definitions of new language features, which can be incorporated into existing policy languages, are given, enabling the used language to support the capabilities mentioned above. 展开更多
关键词 automated trust negotiation (ATN) negotiation success sensitive information protection FRAMEWORK policy language
原文传递
Privacy,National Security,and Internet Economy:An Explanation of China's Personal Information Protection Legislation
4
作者 曲博 霍昶旭 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期339-366,共28页
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc... With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation. 展开更多
关键词 LEGISLATION personal information protection national security internet industry PRIVACY cybersecurity law
原文传递
Ideas of establishing the information system for emergence decisions on the protection against earthquakes and disaster reduction in cities (application of GIS)
5
作者 宋俊高 朱元清 +1 位作者 严大华 夏从俊 《Acta Seismologica Sinica(English Edition)》 CSCD 1998年第2期112-121,共10页
ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information syst... ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system. 展开更多
关键词 Geographical information System\ protection against earthquake and disaster reduction evaluation of earthquake disaster loss\ emergency decision
下载PDF
Intelligent fire information system based on 3D GIS
6
作者 Jinxing HU Zhihan LV +2 位作者 Diping YUAN Bing HE Dongmei YAN 《Virtual Reality & Intelligent Hardware》 2023年第2期93-109,共17页
Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information s... Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information system was designed based on the IoT.A detailed analysis was conducted on the problem of rescue vehicle scheduling and the evacuation of trapped persons in the process of fire rescue.Methods The intelligent fire visualization platform based on the three-dimensional(3D)Geographic Information Science(GIS)covers project overview,equipment status,equipment classification,equipment alarm information,alarm classification,alarm statistics,equipment account information,and other modules.The live video accessed through the visual interface can clearly identify the stage of the fire,which facilitates the arrangement of rescue equipment and personnel.The vehicle scheduling model in the system primarily used two objective functions to solve the Pareto Non-Dominated Solution Set Optimization:emergency rescue time and the number of vehicles.In addition,an evacuation path optimization method based on the Improved Ant Colony(IAC)algorithm was designed to realize the dynamic optimization of building fire evacuation paths.Results The experimental results indicate that all the values of detection signals were significantly larger in the smoldering fire scene at t=17s than the initial value.In addition,the probability of smoldering fire and the probability of open fire were relatively large according to the probability function of the corresponding fire situation,demonstrating that this model could detect fire.Conclusions The IAC algorithm reported here avoided the passages near the fire and spreading areas as much as possible and took the safety of the trapped persons as the premise when planning the evacuation route.Therefore,the IoT-based fire information system has important value for ensuring fire safety and carrying out emergency rescue and is worthy of popularization and application. 展开更多
关键词 Smart fire protection information system Internet of things Rescue vehicle scheduling Optimal evacuation routes
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
7
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the protection of the Right of Communication through information Network
下载PDF
Realization of the Function of Basic Rights to Balance Society--taking personal Information Rights as an example
8
作者 马康凤 XU Chao(Translated) 《The Journal of Human Rights》 2023年第6期1224-1250,共27页
The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and de... The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and deals with the dualistic horizontal relationship between“the state and individuals.”However,the increasing com-plexity of modern society has led to the emergence of different inter-ests and needs within society and the formation of new social powers,resulting in an unequal relationship between private subjects.In the digital era,this phenomenon has become particularly prominent,ev-idenced by the rise of data-based power and the frequent and serious intrusion of personal information by private subjects.In this context,the value of basic rights should radiate within society and function as a balancing force.taking the protection of personal information as an example,while innovating the idea of regulating society through basic rights,the state’s obligation to protect personal information should be further strengthened.Meanwhile,the direct effect of personal infor-mation rights,which are basic human rights,on the private subjects of data-based power should be established,so as to realize their function in balancing the interests of all parties in society. 展开更多
关键词 basic rights data-based power protection of per-sonal information direct effect
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
9
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the protection of Privacy in the information Network Age
下载PDF
Research on the Legality of Information Utilization in Epidemic Prevention and Control
10
作者 Chen Yumei 《学术界》 CSSCI 北大核心 2020年第5期193-200,共8页
Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divi... Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divided into general information and sensitive information,and the use of sensitive information should take"Consent"as its legality basis.In the process of personal information collection,the subject qualification of the collection organization or personnel should be clearly defined,and the starting conditions and process specifications of the collection work should be determined.The use of personal information should be in accordance with legal provisions or agreed ways and purposes and should not violate individual privacy rights and other personality rights,and should not improperly display the"digital image"of individuals. 展开更多
关键词 pandemic prevention and control personal information protection LEGALITY consent
下载PDF
Human Rights Protection in Genome Editing
11
作者 石佳友 胡新平 CHEN Feng(译) 《The Journal of Human Rights》 2022年第5期837-867,共31页
Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics c... Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics committee members, and the public, and clarify specific practices of these subjects or entities to meet the requirements of human rights obligations. Based on the human dignity principle, humans must never be used as a means to an end in scientific research. The right to physical and mental health requires the implementation of the principles of informed consent, the primacy of life, and risk control in genome editing, as well as the proper treatment of embryos. The right to privacy corresponds to the confidentiality obligations and non-intervention obligations of relevant parties, and the protection of sensitive personal information points to the special compliance requirements regarding information processing. Differential treatment of genome-edited humans requires objective and reasonable justification, and should also meet the requirements of the proportionality principle. 展开更多
关键词 genome editing human dignity right to physical and mental health right to privacy personal information protection
下载PDF
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
12
作者 Maryam Roshanaei 《Journal of Computer and Communications》 2021年第8期80-102,共23页
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a... The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks. 展开更多
关键词 Critical Infrastructure protection Critical information Infrastructure protection CYBERSECURITY Operational Technologies Risk Management
下载PDF
The Public Law Construction of Government Agencies’Obligations to Disclose When Handling Personal Information in the Digital Age
13
作者 喻文光 郑子璇 SHEN Jinjun(Translated) 《The Journal of Human Rights》 2022年第3期439-461,共23页
The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing ... The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection. 展开更多
关键词 protection of personal information government’s processing of personal information duty to inform theoretical basis system construction
下载PDF
Research of Anti-Plagiarism Monitoring System Model 被引量:2
14
作者 SHEN Yang YUAN Zhongshang +1 位作者 LIU Lu DONG Hui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期937-940,共4页
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol... We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields. 展开更多
关键词 anti-plagiarism PLAGIARISM information fingerprints copyright protection format-legacy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部