期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
香港个人资料私隐专员公署:社交媒体与个人资料私隐保障 被引量:1
1
作者 陈美仪 黎智敏 袁烨 《全球传媒学刊》 2017年第2期80-86,共7页
在社交媒体时代,保障数据安全越来越凸显其重要性。作为独立的法定监管机构,香港个人资料私隐专员公署从建立之日起,就致力于保障香港市民的隐私数据安全。1996年,公署出台的个人资料隐私保护条例正式生效,成为亚洲第一份完整的个人资... 在社交媒体时代,保障数据安全越来越凸显其重要性。作为独立的法定监管机构,香港个人资料私隐专员公署从建立之日起,就致力于保障香港市民的隐私数据安全。1996年,公署出台的个人资料隐私保护条例正式生效,成为亚洲第一份完整的个人资料保障法。条例确定了六项数据保障原则,并规定了公署的监管范围。本文介绍了公署的工作内容和程序,并借助案例阐述了社交媒体对公署日常业务的影响,包括对监管合规、投诉、查询以及公共关系和教育等的作用。 展开更多
关键词 香港私隐专员公署 个人数据保障 个人保障法 社交媒体
下载PDF
电子医疗健康档案的私隐保护策略研究 被引量:1
2
作者 林迎迎 《办公室业务》 2016年第16期174-,共1页
本文对电子医疗健康档案的私隐保护策略进行了探究。首先调查分析了电子医疗健康档案牵扯到的私隐保护问题,然后总结出具体的解决方案来处理这一问题,更好地为电子医疗健康档案的私隐保护作贡献。
关键词 健康档案 电子医疗 私隐保护
下载PDF
保护网上私隐7大方
3
作者 卜廉士 《广东电脑与电讯》 2001年第6期46-46,共1页
最近有美国公司做了一项调查,显示网民普遍接受个人化网页服务以及网上购物概念,但同时又十分关注网上私隐外泄的问题。其实网上私隐外泄正是 Internet 发展到今天遇到的重大障碍。电脑普及,令更多的个人或重要资讯存放在电脑上。互联... 最近有美国公司做了一项调查,显示网民普遍接受个人化网页服务以及网上购物概念,但同时又十分关注网上私隐外泄的问题。其实网上私隐外泄正是 Internet 发展到今天遇到的重大障碍。电脑普及,令更多的个人或重要资讯存放在电脑上。互联网普及,为你的家居开了第二道大门。但似乎网民仍未习惯为这道门装上应有的防盗系统,甚至有些人让中门大开,任人取用电脑上的资料也不惜。在资讯年代,确有需要建立起一套网络使用习惯,以保障自己的私隐不会从指间漏走。就不同外泄资料的渠道,以下是一些可以有效预防的方法。 展开更多
关键词 网上私隐 计算机网络安全 因特网
下载PDF
新媒体时代个人隐私保护探析 被引量:2
4
作者 钟馨 《新闻世界》 2013年第9期265-266,共2页
新媒体环境下技术的进步使得个人隐私的保护愈加困难,社交网络、商业网站、智能手机等都存在隐私泄露的潜在风险。本文重点分析了新媒体环境下隐私保护的几种新问题,并尝试给出了改善的建议。
关键词 新媒体 私隐
下载PDF
私隐的景色——解读黄河的油画(节选)
5
作者 徐累 《艺术当代》 2004年第2期62-65,共4页
虽然旅程的意义要在完结之后才会清楚地显示,但开始的时候,已经意味深长了。就像在《爱丽丝漫游仙境》中那样,她坠入了草原篱笆下的兔子洞。洞穴深邃得出奇,深得不但让女孩有足够时间左思右想,还有余暇去注视四周墙壁上的东西。宫... 虽然旅程的意义要在完结之后才会清楚地显示,但开始的时候,已经意味深长了。就像在《爱丽丝漫游仙境》中那样,她坠入了草原篱笆下的兔子洞。洞穴深邃得出奇,深得不但让女孩有足够时间左思右想,还有余暇去注视四周墙壁上的东西。宫崎骏的动画片《千与千寻》开始不久。亦有类似场景。女孩随父母先穿过林窟,又通过古庙下的隧道,焦虑,惶遽。 展开更多
关键词 黄河 油画 女性画家 创作理念 私隐 艺术形式 艺术语言
原文传递
WAP的网络隐私保护 被引量:1
6
作者 赵青松 宋如顺 《计算机应用研究》 CSCD 北大核心 2004年第6期246-247,250,共3页
当用户通过WAP访问Internet时 ,用户的位置、容量和参数信息等用户个人数据就会暴露于网络的不同节点 ,包括WAP网关、起源服务器等。
关键词 P3P(Platform for PRIVACY Preferences) WAP 保护
下载PDF
Changes and Adjustments:The Rule of Law Response to Medical Institution Data Compliance
7
作者 Long Keyu 《科技与法律(中英文)》 2024年第5期110-122,共13页
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int... Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed. 展开更多
关键词 medical institution data privacy protection data security compliance governance
下载PDF
基于OECD个人数据分类的“通知—同意”原则的有效性困境与出路 被引量:1
8
作者 王英 《现代情报》 CSSCI 2021年第3期168-177,共10页
[目的/意义]大数据环境下,“通知—同意”原则作为个人数据处理正当性基础之地位受到质疑,期望找到一种可以使其继续发挥效用并能充分保护个人数据的出路。[方法/过程]利用文献法介绍了OECD个人数据分类和“通知—同意”原则的独特价值... [目的/意义]大数据环境下,“通知—同意”原则作为个人数据处理正当性基础之地位受到质疑,期望找到一种可以使其继续发挥效用并能充分保护个人数据的出路。[方法/过程]利用文献法介绍了OECD个人数据分类和“通知—同意”原则的独特价值及其在若干国家数据隐私法中的界定、适用条件。基于OECD个人数据分类分析了“通知—同意”原则的有效性困境,包括通知的获取成本上升、通知不能充分保障数据主体的知情权、二元同意不利于个人数据保护、同意不能有效实现数据主体的控制权。[结果/结论]提出围绕降低通知的获取成本、创新性提供隐私通知、推行分等级同意和撤回同意、实施“情境合理+拟制同意”模式、增设合理推断权以强化数据隐私保护等策略进行解困。 展开更多
关键词 OECD 通知 同意 个人数据分类 观测数据 派生数据 推断数据 数据私隐保护
下载PDF
消费者的自我聚焦状态对产品审美评价的影响研究 被引量:1
9
作者 黄赞 王新新 《暨南学报(哲学社会科学版)》 CSSCI 北大核心 2019年第9期12-21,共10页
相比于私隐自我聚焦的情况,消费者在公众自我聚焦状态下对产品的审美评价较低。这是因为,在公众自我聚焦的状态下,人们具有较高的印象管理动机,在做决策时则倾向于参考并迎合他人的评价标准;而在私隐自我聚焦的状态下,人们则不太考虑他... 相比于私隐自我聚焦的情况,消费者在公众自我聚焦状态下对产品的审美评价较低。这是因为,在公众自我聚焦的状态下,人们具有较高的印象管理动机,在做决策时则倾向于参考并迎合他人的评价标准;而在私隐自我聚焦的状态下,人们则不太考虑他人的影响,更有可能向外界表达自己的感受和价值观。 展开更多
关键词 自我聚焦 流畅性感知 审美评价 私隐自我 公众自我
下载PDF
九间堂——另类的别墅文化 被引量:3
10
作者 严迅奇 《时代建筑》 2005年第6期108-113,共6页
文章阐述九间堂的设计起点,并引出建筑设计到底只是当今生活文化的一个演绎。
关键词 传统 居住文化 伦理观念 和谐 私隐 室间组织 平衡
下载PDF
测你守好自己隐私的能力
11
作者 于月华 《健康伴侣》 2010年第8期16-16,共1页
心情烦闷时,会想要找个地方散散步,释放心情,走在怎样的路上是让你觉得最能帮你释放压力的呢?
关键词 性卫生 性生活 男人 女人 私隐密封度”
原文传递
知识长廊
12
《四川统一战线》 2010年第11期14-15,共2页
十七届五中全会的六个前瞻北京任维民前瞻之一:"十一五"传给"十二五"什么样的接力棒?"十一五"规划是我国第一个国民经济发展战略规划,取得了斐然成绩。但发展中的问题也很多,使完成"十二五"规... 十七届五中全会的六个前瞻北京任维民前瞻之一:"十一五"传给"十二五"什么样的接力棒?"十一五"规划是我国第一个国民经济发展战略规划,取得了斐然成绩。但发展中的问题也很多,使完成"十二五"规划面临巨大挑战。前瞻之二:加快转变经济发展方式是核心任务。实现国民经济又好又快发展,必须加快经济发展方式的转变,这是"十二五"期间面临的最重大任务。前瞻之三:"十二五"是推进我国工业化的关节点。2020年前后,中国将基本实现工业化。 展开更多
关键词 右翼组织 私隐 唐人街 亚洲 经济发展方式 航空母舰 个人资料 宗教活动 专员公署 量贩 社会主义 思想体系 长廊
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
13
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Achieve Personalized Anonymity Through Query Blocks Exchanging 被引量:13
14
作者 Chunguang Ma Lei Zhang +2 位作者 Songtao Yang Xiaodong Zheng Pinhui Ke 《China Communications》 SCIE CSCD 2016年第11期106-118,共13页
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency. 展开更多
关键词 cyberspace security location-based services collaborative users personalized anonymity query and location privacy
下载PDF
Big Data Security and Privacy: A Review 被引量:3
15
作者 MATTURDI Bardi ZHOU Xianwei +1 位作者 LI Shuai LIN Fuhong 《China Communications》 SCIE CSCD 2014年第A02期135-145,共11页
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad... While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy. 展开更多
关键词 big data value of big data security and privacy
下载PDF
A New Anonymity Model for Privacy-Preserving Data Publishing 被引量:5
16
作者 HUANG Xuezhen LIU Jiqiang HAN Zhen YANG Jun 《China Communications》 SCIE CSCD 2014年第9期47-59,共13页
Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity atta... Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data. 展开更多
关键词 data security privacy protection ANONYMITY data publishing
下载PDF
Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs 被引量:3
17
作者 任炬 张尧学 刘康 《Journal of Central South University》 SCIE EI CAS 2014年第8期3155-3168,共14页
Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor&#... Privacy is becoming one of the most notable challenges threatening wireless sensor networks(WSNs).Adversaries may use RF(radio frequency) localization techniques to perform hop-by-hop trace back to the source sensor's location.A multiple k-hop clusters based routing strategy(MHCR) is proposed to preserve source-location privacy as well as enhance energy efficiency for WSNs.Owing to the inherent characteristics of intra-cluster data aggregation,each sensor of the interference clusters is able to act as a fake source to confuse the adversary.Moreover,dummy traffic could be filtered efficiently by the cluster heads during the data aggregation,ensuring no energy consumption be burdened in the hotspot of the network.Through careful analysis and calculation on the distribution and the number of interference clusters,energy efficiency is significantly enhanced without reducing the network lifetime.Finally,the security and delay performance of MHCR scheme are theoretically analyzed.Extensive analysis and simulation results demonstrate that MHCR scheme can improve both the location privacy security and energy efficiency markedly,especially in large-scale WSNs. 展开更多
关键词 wireless sensor networks source-location privacy energy efficiency k-hop cluster circular routing
下载PDF
Privacy-Preserving Prepayment Based Power Request and Trading in Smart Grid 被引量:2
18
作者 Shaohua Li Xiang Zhang +2 位作者 Kaiping Xue Lijie Zhou Hao Yue 《China Communications》 SCIE CSCD 2018年第4期14-27,共14页
Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most... Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most cost-effective and reliable solution for smoothing the demand curve. However, many existing schemes, based on users' demand request in each period, require users to consume their requested electricity exactly, which sometimes causes inconvenience and losses to the utility, because customers cannot always be able to consume the accurate electricity demand due to various personal reasons. In this paper, we tackle this problem in a novel approach. Instead of charging after consumption, we adopt the prepayment mechanism to implement power request. Furthermore, we propose a trading market running by the control center to cope with the users' dynamic demand. It is noteworthy that both users' original demand and trading records are protected against potential adversaries including the curious control center. Through the numerical simulation, we demonstrate that our scheme is highly efficient in both computation and communication. 展开更多
关键词 Demand response power request smart grid PREPAYMENT privacy preserving.
下载PDF
Privacy-Preserving Relative Location Based Services for Mobile Users 被引量:4
19
作者 Fei Ning Zhuang Yi +2 位作者 GU Jingjing Cao Jiannong Yang Liang 《China Communications》 SCIE CSCD 2015年第5期152-161,共10页
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an... Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends. 展开更多
关键词 relative location privacy-preserv-ing CYFS
下载PDF
An Overview of Big Data Industry in China 被引量:11
20
作者 LIU Yue HE Jia +2 位作者 GUO Minjie YANG Qing ZHANG Xinsheng 《China Communications》 SCIE CSCD 2014年第12期1-10,共10页
The year of 2011 is considered the first year of big data market in China.Compared with the global scale,China's big data growth will be faster than the global average growth rate,and China will usher in the rapid... The year of 2011 is considered the first year of big data market in China.Compared with the global scale,China's big data growth will be faster than the global average growth rate,and China will usher in the rapid expansion of big data market in the next few years.This paper presents the overall big data development in China in terms of market scale and development stages,enterprise development in the industry chain,the technology standards,and industrial applications.The paper points out the issues and challenges facing big data development in China and proposes to make polices and create support approaches for big data transactions and personal privacy protection. 展开更多
关键词 big data market analysis technological trend policy environment policy recommendation
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部