期刊文献+
共找到2,715篇文章
< 1 2 136 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information Protection law Privacy security Privacy protection will
下载PDF
Iterated Logarithm Laws on GLM Randomly Censored with Random Regressors and Incomplete Information
2
作者 Qiang Zhu Zhihong Xiao +1 位作者 Guanglian Qin Fang Ying 《Applied Mathematics》 2011年第3期363-368,共6页
In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, ... In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, we obtain a law of iterated logarithm and a Chung type law of iterated logarithm for the maximum likelihood estimator (MLE) in the present model. 展开更多
关键词 Generalized Linear Model INCOMPLETE information Stochastic Regressor ITERATED LOGARITHM lawS
下载PDF
Study on the Development of the Chip Information Industry Based on Moore’s Law
3
作者 Guowang Zeng Shihong Zeng 《Journal of Computer and Communications》 2017年第14期39-47,共9页
Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to ... Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development. 展开更多
关键词 Moore’s law CHIP INTEGRATED CIRCUITS CHIP information INDUSTRY Development
下载PDF
Information Privacy, Data Surveillance and Security——How Australian Privacy Law Fully Plays Its Role in the Age of Big Data
4
作者 Jiexin Zang 《Journal of Educational Theory and Management》 2019年第1期22-30,共9页
Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With th... Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It ??rst has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data;with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data. 展开更多
关键词 A big DATA age The protection of information PRIVACY The PRIVACY law in AUSTRALIA
下载PDF
The Quantitative Law of Network Information Growth 被引量:1
5
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
下载PDF
论阮氏“图书馆学五定律”在Information Commons构建中的运用——Information Commons构建的理论基础研究之一 被引量:6
6
作者 陆宝益 《图书与情报》 CSSCI 北大核心 2011年第2期57-61,共5页
文章简单概述了阮氏五定律对图书馆事业发展的历史贡献,从IC理念、结构功能、服务内容、运行管理模式等几个方面详细分析了IC建设所蕴含的阮氏五定律内涵,并在此基础上作出"IC建设与发展离不开阮氏五定律"的论断。
关键词 信息共享空间 图书馆学五定律 阮冈纳赞
下载PDF
Competition between two kinds of information among random-walking individuals 被引量:1
7
作者 刘真真 王兴元 王茂基 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期625-630,共6页
A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals re... A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals remain or change their information according to their neighbors' information. When the moving speed of individuals v is zero, the two kinds of information typically coexist, and the ratio between them increases with L and decreases with N. In the dynamic case (v 〉 0), only one information eventually remains, and the time required for one information being left scales as Td -v^αL^β^γ. 展开更多
关键词 information spread random walk complex networks power law
下载PDF
Decoding the Information of Life 被引量:1
8
作者 ShantilalG. Goradia 《Journal of Physical Science and Application》 2015年第3期191-195,共5页
关键词 生命信息 宇宙学常数 解码 精细结构常数 分子生物学 统计熵 核力量 链接
下载PDF
Informational Entropy as a Source of Life’s Origin
9
作者 Shahram Yazdani 《Journal of Modern Physics》 2019年第13期1498-1504,共7页
While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is l... While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is life’s blueprint, better understanding of the origins of life is predicated on deciphering the conditions that allowed the formation of this complex molecule with its unique properties. In this article, we propose and examine the hypothesis that informational entropy models would allow for the formation of complex organic molecules with genetic properties, without the disruption of the second law of thermodynamics. Therefore, we demonstrate that formation of life’s blueprint may have initially been derived by informational entropy by means of decomplexification of the materials with higher informational entropy content, leading to the formation of primitive genetic molecules. 展开更多
关键词 ENTROPY informational ENTROPY GENETIC Material SECOND law of THERMODYNAMICS
下载PDF
Interpretation of Information Processing Regulations
10
作者 Sabah Al-Fedaghi 《Journal of Software Engineering and Applications》 2009年第2期67-76,共10页
Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current softwar... Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process. 展开更多
关键词 Software REQUIREMENT lawS REGULATION PRIVACY PERSONAL Identifiable information
下载PDF
Legal Rules and Principles as Informational Vectors in Legal Time and Space
11
作者 Massimiliano Ferrara Angelo Roberto Gaglioti 《通讯和计算机(中英文版)》 2012年第8期879-889,共11页
关键词 法律规则 信息载体 和空间 时间 组成部分 定量分析 法律制度 向量表示
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
12
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights Personal information Protection law dependency protection
下载PDF
The Legal Regulation of the Information Exchange for Trade Association in China
13
作者 Du Yuanyuan 《International English Education Research》 2014年第3期171-173,共3页
关键词 行业协会 信息交流 法律规制 中国 利益最大化 法律效力 有效率 竞争
下载PDF
Twitter提及论文的布拉德福定律验证及来源期刊特征——以图书情报学科为例 被引量:1
14
作者 张蕊 王莹 邱均平 《图书情报知识》 北大核心 2024年第1期121-132,共12页
[目的/意义]调研社交媒体提及的论文是否符合布拉德福定律有助于了解社交媒体环境下论文的分布特征,并获取媒体关注的核心信息。[研究设计/方法]以2018-2022年图书情报学科相关的推文为研究对象,通过描述性统计、布拉德福定律验证和特... [目的/意义]调研社交媒体提及的论文是否符合布拉德福定律有助于了解社交媒体环境下论文的分布特征,并获取媒体关注的核心信息。[研究设计/方法]以2018-2022年图书情报学科相关的推文为研究对象,通过描述性统计、布拉德福定律验证和特征分析方法,考察布拉德福定律在Twitter环境下的有效性及其分布特点。[结论/发现]在图书情报领域,Twitter提及论文所在来源分布符合布拉德福分散定律;核心区中被JCR收录的、拥有Twitter账号的期刊数量更多。[创新/价值]关注了传统理论在社交媒体环境下的适用性,对比不同分区来源期刊的特征能够为发现成为核心区期刊的关键因素提供参考。 展开更多
关键词 布拉德福定律 推文分布 Twitter提及 图书情报学科 验证分析
下载PDF
个人金融账户信息的法律界定
15
作者 尹华容 伍洋宇 《财经理论与实践》 北大核心 2024年第3期154-160,共7页
《个人信息保护法》将金融账户信息纳入敏感个人信息的范围,但未作出明确的界定。界定标准的不明确将导致权利主体权益易损、义务主体责任不明、司法裁判依据不清。考察域外立法例,同时结合我国有关立法现状和实践,宜采取“定义+列举+... 《个人信息保护法》将金融账户信息纳入敏感个人信息的范围,但未作出明确的界定。界定标准的不明确将导致权利主体权益易损、义务主体责任不明、司法裁判依据不清。考察域外立法例,同时结合我国有关立法现状和实践,宜采取“定义+列举+排除”的界定模式,以“信息主体”“信息性质”和“信息处理”为定义的考量因素,从立法、实践的综合角度进行列举,并排除通过间接识别才能确认的金融账户信息。基于此,我国出台“金融账户信息”的司法解释可侧重四个方面,以实现个人信息的保护和社会信息利用的动态平衡。 展开更多
关键词 个人信息保护法 金融账户 个人金融信息 敏感个人信息
下载PDF
人类遗传资源安全的刑法全面性保护
16
作者 储陈城 刘强 《安徽大学学报(哲学社会科学版)》 北大核心 2024年第1期89-99,共11页
为贯彻落实总体国家安全观,并回应人类遗传资源安全管理的规范发展要求,《刑法修正案(十一)》专门增设第三百三十四条之一,但却仍不足以全面保障人类遗传资源安全。究其原因,一是未规定单位犯罪,二是未全面规制非法提供和买卖人类遗传... 为贯彻落实总体国家安全观,并回应人类遗传资源安全管理的规范发展要求,《刑法修正案(十一)》专门增设第三百三十四条之一,但却仍不足以全面保障人类遗传资源安全。究其原因,一是未规定单位犯罪,二是未全面规制非法提供和买卖人类遗传资源的行为,三是未同等保护人类遗传资源材料和人类遗传资源信息。在总体国家安全观的背景下,涉及人类遗传资源的前置法规制体系日趋完善。刑法全面保护人类遗传资源安全的关键,在于填补非法采集人类遗传资源、走私人类遗传资源材料罪的规范漏洞,合理解释关联罪名则是当下最优解。具体而言,把人类遗传资源信息解释为公民个人信息中的生物识别信息,并将侵犯人类遗传资源安全的行为解释为出售、提供或以其他方法非法获取公民个人信息,从而借助侵犯公民个人信息罪,全面评价自然人或者单位实施的非法采集、非法提供、买卖人类遗传资源材料、人类遗传资源信息的行为。 展开更多
关键词 总体国家安全观 人类遗传资源安全 刑法解释 侵犯公民个人信息罪
下载PDF
论刑法中的数据:概念、文本与实践
17
作者 赖早兴 《政治与法律》 北大核心 2024年第6期64-82,共19页
数字、数据和信息是信息社会的基本概念。在刑法中,数据的定义和范畴决定着刑法对数据保护的范围与力度。在传统意义上,数据与数字紧密相连,但计算机语言的出现使数据部分脱离数字;大量信息以数据方式呈现,但信息只是数据的表现形式之一... 数字、数据和信息是信息社会的基本概念。在刑法中,数据的定义和范畴决定着刑法对数据保护的范围与力度。在传统意义上,数据与数字紧密相连,但计算机语言的出现使数据部分脱离数字;大量信息以数据方式呈现,但信息只是数据的表现形式之一,数据还包括功能性的程序指令。刑法文本中有显性数据和隐性数据,隐性数据易于被忽视。在司法实践中出现了裁判者泛化数据概念、忽视数据价值、抹杀数据属性差异和同化数据信息等不合理现象。应当在刑法中明确数据概念的基础上,以数据的价值评价侵害数据行为的社会危害性,基于数据的国家秘密、财产、知识产权等属性认定侵害数据行为的性质,明确信息在部分罪名中的独立性,实现刑法对数据权益的保护和对侵害数据行为的打击。 展开更多
关键词 数字 数据 信息 刑法文本 司法实践
下载PDF
信息化时代的法学实践教学方法革新——以家事法教学中运用类案检索方法为例
18
作者 郝佳 李凯文 《法学教育研究》 2024年第1期190-204,共15页
类案检索是信息化时代法学实践教学方法革新的重要途径和有效方案。以吉林大学法学院和西北政法大学为起始的类案检索教学改革试点经验,证实了该种教学方法在学生法律思维训练、法学分析能力提升、自主学习能力养成方面的效能。但必须承... 类案检索是信息化时代法学实践教学方法革新的重要途径和有效方案。以吉林大学法学院和西北政法大学为起始的类案检索教学改革试点经验,证实了该种教学方法在学生法律思维训练、法学分析能力提升、自主学习能力养成方面的效能。但必须承认,类案检索方法在受益于信息时代给予的信息便利的同时,也受制于信息公开的有限范围。跨越这一障碍,不仅需要文书公开制度的开放与包容,更需要法律共同体多机构间的有效合作。 展开更多
关键词 信息化时代 法学实践教学 类案检 家事法
下载PDF
我国乡村振兴促进法软法治理机制及其优化适用
19
作者 许小莺 《沈阳工业大学学报(社会科学版)》 2024年第1期89-97,共9页
《中华人民共和国乡村振兴促进法》呈现出针对乡村治理的软法进路,在诸多方面发挥了其软法内容所具有的弹性、开放性及补充性作用,是我国探索软法治理的有益尝试,但也存在软法机制未充分发挥的问题。当前,应在软法硬法互动效应的强化、... 《中华人民共和国乡村振兴促进法》呈现出针对乡村治理的软法进路,在诸多方面发挥了其软法内容所具有的弹性、开放性及补充性作用,是我国探索软法治理的有益尝试,但也存在软法机制未充分发挥的问题。当前,应在软法硬法互动效应的强化、授权性的公众参与及治理信息共享等方面着手,弥补乡村振兴促进法软法机制的不足,寻求我国乡村振兴发展的软法治理进路。 展开更多
关键词 乡村振兴促进法 软法 硬法 治理机制 公众参与 信息共享
下载PDF
论世界模型的隐私机制及其法律规制
20
作者 岳林 《地方立法研究》 2024年第3期18-38,共21页
所谓世界模型,是指能够对物理世界和人类社会进行模拟和理解的人工智能技术图景。Sora、V-JEPA和Genie等新兴人工智能技术,皆以世界模型作为它们的技术原理和发展方向。本文试图从世界模型的整体发展趋势出发,研究其技术机制将如何影响... 所谓世界模型,是指能够对物理世界和人类社会进行模拟和理解的人工智能技术图景。Sora、V-JEPA和Genie等新兴人工智能技术,皆以世界模型作为它们的技术原理和发展方向。本文试图从世界模型的整体发展趋势出发,研究其技术机制将如何影响人类社会的隐私机制,进而探讨隐私权以及相关法律制度可能给予的回应。目前人工智能领域存在两种主流世界模型路径,可分别把它们概括为“模拟式世界模型”和“理解式世界模型”。进而指出,世界模型的技术机制可以类比理解为人类社会的四种隐私机制,即:对世界现象的还原,对因果关系的探究,对世界现象的虚构,对社会人格的伪装。并预测随着世界模型的技术发展以及相应社会变迁,现有隐私权制度将进一步被弱化,而个人信息法和数据法将承担起更主要的隐私法律规制功能。因此提出以下建议:国家应该加强对个人信息的行政规制,即在公法层面细化个人信息的类型和行为规范;针对世界模型应用的具体场景和媒介,立法者和监管者应当提供差异化的行为规范和主体责任模式;法律应该针对世界模型隐私问题建立“多方参与治理模式”,鼓励所有社会主体积极参与技术和法律的互动过程。 展开更多
关键词 世界模型 人工智能 隐私机制 个人信息法 数据法
下载PDF
上一页 1 2 136 下一页 到第
使用帮助 返回顶部