期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
社会“二重化”与网络社会安全建构 被引量:4
1
作者 谢俊 《理论月刊》 CSSCI 北大核心 2017年第2期159-162,共4页
网络安全和信息安全是事关国家安全和发展、事关广大人民群众工作生活的重大战略问题。当技术理性把社会"二重化"分为网络社会和现实社会之后,网络社会的安全时刻牵绊着现实社会的人文关照;从学术视角扫描网络社会的危险区域... 网络安全和信息安全是事关国家安全和发展、事关广大人民群众工作生活的重大战略问题。当技术理性把社会"二重化"分为网络社会和现实社会之后,网络社会的安全时刻牵绊着现实社会的人文关照;从学术视角扫描网络社会的危险区域,筑起网络社会安全的防火墙,消除网络社会主体的异化,就成了时代绕不开的课题。从逻辑上看,压缩技术理性积弊,弘扬人文情怀,才是人类与技术和解之道。 展开更多
关键词 社会“二重化” 网络主体异化 网络社会安全
下载PDF
浅谈社会网络安全文化的构建
2
作者 殷晏君 《才智》 2014年第34期386-386,共1页
网络安全是网络时代中面临的重要问题,对网络安全问题作出正确的认识与解决对于推动网络以及网络安全的发展具有着重要意义。本文以构建和谐的社会网络安全文化为出发点,从社会网络安全的精神文化建设、制度文化建设以及物质文化建设三... 网络安全是网络时代中面临的重要问题,对网络安全问题作出正确的认识与解决对于推动网络以及网络安全的发展具有着重要意义。本文以构建和谐的社会网络安全文化为出发点,从社会网络安全的精神文化建设、制度文化建设以及物质文化建设三个方面对社会网络安全文化的构建策略做出研究与探讨。 展开更多
关键词 社会网络安全 安全文化 精神文化 制度文化 物质文化
原文传递
打造劳动保障平台 编织社会安全网络——江苏扬州市社会保险基金管理中心工作纪实
3
《中国劳动》 北大核心 2003年第3期24-25,共2页
关键词 江苏 扬州市 社会保险基金管理 养老金 离退休人员 社会保障制度 社会安全网络
下载PDF
澳大利亚的社会福利安全网络
4
作者 曹文煜 《新劳动》 2003年第1期26-26,共1页
关键词 社会保障事业 澳大利亚 社会福利安全网络
下载PDF
基于多信息融合表示学习的关联用户挖掘算法 被引量:5
5
作者 韩忠明 郑晨烨 +1 位作者 段大高 董健 《计算机科学》 CSCD 北大核心 2019年第4期77-82,共6页
随着互联网技术的迅速发展和普及,越来越多的用户开始通过社会网络进行各种信息的分享与交流。网络中同一用户可能申请多个不同账号进行信息发布,这些账号构成了网络中的关联用户。准确、有效地挖掘社会网络中的关联用户能够抑制网络中... 随着互联网技术的迅速发展和普及,越来越多的用户开始通过社会网络进行各种信息的分享与交流。网络中同一用户可能申请多个不同账号进行信息发布,这些账号构成了网络中的关联用户。准确、有效地挖掘社会网络中的关联用户能够抑制网络中的虚假信息和不法行为,从而保证网络环境的安全性和公平性。现有的关联用户挖掘方法仅考虑了用户属性或用户关系信息,未对网络中含有的多类信息进行有效融合以及综合考虑。此外,大多数方法借鉴其他领域的方法进行研究,如去匿名化问题,这些方法不能准确解决关联用户挖掘问题。为此,文中针对网络关联用户挖掘问题,提出了基于多信息融合表示学习的关联用户挖掘算法(Associated Users Mining Algorithm based on Multi-information fusion Representation Learning,AUMA-MRL)。该算法使用网络表示学习的思想对网络中多种不同维度的信息(如用户属性、网络拓扑结构等)进行学习,并将学习得到的表示进行有效融合,从而得到多信息融合的节点嵌入。这些嵌入可以准确表征网络中的多类信息,基于习得的节点嵌入构造相似性向量,从而对网络中的关联用户进行挖掘。文中基于3个真实网络数据对所提算法进行验证,实验网络数据包括蛋白质网络PPI以及社交网络Flickr和Facebook,使用关联用户挖掘结果的精度和召回率作为性能评价指标对所提算法进行有效性验证。结果表明,与现有经典算法相比,所提算法的召回率平均提高了17.5%,能够对网络中的关联用户进行有效挖掘。 展开更多
关键词 关联用户 社会网络安全 表示学习 用户嵌入
下载PDF
不容回避的城镇贫困 被引量:1
6
作者 皮武良 夏剑锋 《统计与决策》 北大核心 2002年第9期23-23,共1页
关键词 中国 城镇人口 贫困问题 社会安全保障网络 再就业工程
下载PDF
Followers of the Social Media Network and National Security
7
作者 Yu Chen 《International English Education Research》 2014年第9期44-46,共3页
With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, ... With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security. 展开更多
关键词 Social Media Networks FOLLOWERS National Security
下载PDF
Social Networks Among Migrants in Saudi Arabia (SA): Opportunities and Implications
8
作者 Amira Y. Badri Seham A. EIAzab 《Sociology Study》 2013年第7期477-492,共16页
This paper presents results of a pilot research conducted among social networks of both Sudanese and Egyptians in Jeddah city, Saudi Arabia (SA). The main objectives of the research are focused into four interrelate... This paper presents results of a pilot research conducted among social networks of both Sudanese and Egyptians in Jeddah city, Saudi Arabia (SA). The main objectives of the research are focused into four interrelated issues: (1) to analyse the structural-function of the social networks of Sudanese and Egyptian migrants; (2) to explain the opportunities and challenges confronting the social networks; (3) to examine the elements of implications on SA society as perceived by the networks; and (4) to identify perceived future visions of the social network members in the context of their social and economic remittances in both countries. The research has applied a qualitative method and a structured interview sheet was used for data collection. The Sudanese sample focused on members from a Nubian social network in ]eddah who resemble skilled, semi-skilled, and unskilled labours, while the Egyptian sample selected randomly from semi-skilled youth labours and unskilled labours as informal groups. The research has found some differences in the structural functions of both groups. There are many similarities shared between the two groups in relation to conserving social ties, support and cooperation as one homogeneous socio-ethnic groups in the hosting country. Also, the results show that both groups follow similar strategies of social and economic remittances to home land. Moreover, both groups are suffering and facing many shared challenges regarding economic security and sustainability in the hosting country. While, the Sudanese group has clear vision in respect of the betterment of the migrants in SA, the Egyptian group perceives the future as gloomy and uncertain. 展开更多
关键词 Migrant labours socio-economic remittances Saudi Arabia labour
下载PDF
A secure routing scheme based on social network analysis in wireless mesh networks 被引量:2
9
作者 Yao YU Zhaolong NING Lei GUO 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期139-150,共12页
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara... As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved. 展开更多
关键词 wireless mesh networks node selfish social network analysis secure routing Markov chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部