期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
建筑物中电子/信息设备雷击电磁脉冲(LEMP)和电涌防护浅议 被引量:1
1
作者 杨天义 《电工技术杂志》 2004年第5期24-25,共2页
关键词 建筑物 防雷设计 雷击电磁脉冲 电涌防护 电子/信息设备 《建筑物防雷设计规范》 GB50057-94
下载PDF
Ubiquitous Computing: Technological Autonomy or Human Autonomy?
2
作者 Zhu Wenxi Wang Guoyu 《Journal of Philosophy Study》 2018年第5期217-223,共7页
With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins... With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind. 展开更多
关键词 ubiquitous computing technological autonomy human autonomy FREEDOM
下载PDF
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
3
作者 Robert Brumnik Sergii Kavun 《Computer Technology and Application》 2015年第1期45-56,共12页
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in... Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony. 展开更多
关键词 Intelligence and counterintelligence activities electronic spy devices detection methods netwar counterterrorism.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部