期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
移动通信发展近况
1
《通讯世界》 1998年第1期49-52,共4页
“863”通信技术跟踪研究报告之五──个人通信技术移动通信发展近况1997年的上半年,移动通信在市场继续繁荣的同时。业务与技术也向更深层次发展。实际上,在美国这个世界上移动通信最为发达的国家,1996年的蜂窝电话年增... “863”通信技术跟踪研究报告之五──个人通信技术移动通信发展近况1997年的上半年,移动通信在市场继续繁荣的同时。业务与技术也向更深层次发展。实际上,在美国这个世界上移动通信最为发达的国家,1996年的蜂窝电话年增长率已开始下降。这说明,单纯数量上... 展开更多
关键词 移动通信 个通信技术 CDPD HSCSD
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
2
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部