期刊文献+
共找到50篇文章
< 1 2 3 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law Privacy security Privacy protection will
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
2
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights Personal information protection Law dependency protection
下载PDF
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation
3
作者 Bailing LIU Feng XIAO Ke DENG 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期135-147,共13页
Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ... Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ATN, there are conflicts between negotiation success and sensitive information protection, that is, these two needs cannot be given priority at the same time, which is a challenging problem to resolve. In this paper, a language independent ATN framework, which is dynamic, flexible and adaptive, is presented to address this problem, ensuring negotiation success without sensitive information leakage. This framework is independent of the policy language which is used. However, the language used should have the capability to specify all kinds of sensitive information appearing in credentials and policies, and support the separation of attribute disclosure from credential disclosure. Thus definitions of new language features, which can be incorporated into existing policy languages, are given, enabling the used language to support the capabilities mentioned above. 展开更多
关键词 automated trust negotiation (ATN) negotiation success sensitive information protection FRAMEWORK policy language
原文传递
Privacy,National Security,and Internet Economy:An Explanation of China's Personal Information Protection Legislation
4
作者 曲博 霍昶旭 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期339-366,共28页
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc... With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation. 展开更多
关键词 LEGISLATION personal information protection national security internet industry PRIVACY cybersecurity law
原文传递
Ideas of establishing the information system for emergence decisions on the protection against earthquakes and disaster reduction in cities (application of GIS)
5
作者 宋俊高 朱元清 +1 位作者 严大华 夏从俊 《Acta Seismologica Sinica(English Edition)》 CSCD 1998年第2期112-121,共10页
ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information syst... ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system. 展开更多
关键词 Geographical information System\ protection against earthquake and disaster reduction evaluation of earthquake disaster loss\ emergency decision
下载PDF
Intelligent fire information system based on 3D GIS
6
作者 Jinxing HU Zhihan LV +2 位作者 Diping YUAN Bing HE Dongmei YAN 《Virtual Reality & Intelligent Hardware》 2023年第2期93-109,共17页
Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information s... Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information system was designed based on the IoT.A detailed analysis was conducted on the problem of rescue vehicle scheduling and the evacuation of trapped persons in the process of fire rescue.Methods The intelligent fire visualization platform based on the three-dimensional(3D)Geographic Information Science(GIS)covers project overview,equipment status,equipment classification,equipment alarm information,alarm classification,alarm statistics,equipment account information,and other modules.The live video accessed through the visual interface can clearly identify the stage of the fire,which facilitates the arrangement of rescue equipment and personnel.The vehicle scheduling model in the system primarily used two objective functions to solve the Pareto Non-Dominated Solution Set Optimization:emergency rescue time and the number of vehicles.In addition,an evacuation path optimization method based on the Improved Ant Colony(IAC)algorithm was designed to realize the dynamic optimization of building fire evacuation paths.Results The experimental results indicate that all the values of detection signals were significantly larger in the smoldering fire scene at t=17s than the initial value.In addition,the probability of smoldering fire and the probability of open fire were relatively large according to the probability function of the corresponding fire situation,demonstrating that this model could detect fire.Conclusions The IAC algorithm reported here avoided the passages near the fire and spreading areas as much as possible and took the safety of the trapped persons as the premise when planning the evacuation route.Therefore,the IoT-based fire information system has important value for ensuring fire safety and carrying out emergency rescue and is worthy of popularization and application. 展开更多
关键词 Smart fire protection information system Internet of things Rescue vehicle scheduling Optimal evacuation routes
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
7
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the protection of the Right of Communication through information Network
下载PDF
Realization of the Function of Basic Rights to Balance Society--taking personal Information Rights as an example
8
作者 马康凤 XU Chao(Translated) 《The Journal of Human Rights》 2023年第6期1224-1250,共27页
The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and de... The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and deals with the dualistic horizontal relationship between“the state and individuals.”However,the increasing com-plexity of modern society has led to the emergence of different inter-ests and needs within society and the formation of new social powers,resulting in an unequal relationship between private subjects.In the digital era,this phenomenon has become particularly prominent,ev-idenced by the rise of data-based power and the frequent and serious intrusion of personal information by private subjects.In this context,the value of basic rights should radiate within society and function as a balancing force.taking the protection of personal information as an example,while innovating the idea of regulating society through basic rights,the state’s obligation to protect personal information should be further strengthened.Meanwhile,the direct effect of personal infor-mation rights,which are basic human rights,on the private subjects of data-based power should be established,so as to realize their function in balancing the interests of all parties in society. 展开更多
关键词 basic rights data-based power protection of per-sonal information direct effect
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
9
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the protection of Privacy in the information Network Age
下载PDF
Research on the Legality of Information Utilization in Epidemic Prevention and Control
10
作者 Chen Yumei 《学术界》 CSSCI 北大核心 2020年第5期193-200,共8页
Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divi... Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divided into general information and sensitive information,and the use of sensitive information should take"Consent"as its legality basis.In the process of personal information collection,the subject qualification of the collection organization or personnel should be clearly defined,and the starting conditions and process specifications of the collection work should be determined.The use of personal information should be in accordance with legal provisions or agreed ways and purposes and should not violate individual privacy rights and other personality rights,and should not improperly display the"digital image"of individuals. 展开更多
关键词 pandemic prevention and control personal information protection LEGALITY consent
下载PDF
Human Rights Protection in Genome Editing
11
作者 石佳友 胡新平 CHEN Feng(译) 《The Journal of Human Rights》 2022年第5期837-867,共31页
Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics c... Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics committee members, and the public, and clarify specific practices of these subjects or entities to meet the requirements of human rights obligations. Based on the human dignity principle, humans must never be used as a means to an end in scientific research. The right to physical and mental health requires the implementation of the principles of informed consent, the primacy of life, and risk control in genome editing, as well as the proper treatment of embryos. The right to privacy corresponds to the confidentiality obligations and non-intervention obligations of relevant parties, and the protection of sensitive personal information points to the special compliance requirements regarding information processing. Differential treatment of genome-edited humans requires objective and reasonable justification, and should also meet the requirements of the proportionality principle. 展开更多
关键词 genome editing human dignity right to physical and mental health right to privacy personal information protection
下载PDF
大数据时代信息化运维中的数据安全与隐私保护策略——以朔黄铁路为例
12
作者 杨煊 《软件》 2024年第5期101-103,共3页
随着信息技术的快速发展,数据安全与隐私保护成为朔黄铁路发展的关键挑战。本文着重探讨朔黄铁路在信息化运维过程中如何应对这些挑战,详细分析了其采用的数据安全技术和隐私保护策略。从数据加密和访问控制到入侵检测和安全审计技术的... 随着信息技术的快速发展,数据安全与隐私保护成为朔黄铁路发展的关键挑战。本文着重探讨朔黄铁路在信息化运维过程中如何应对这些挑战,详细分析了其采用的数据安全技术和隐私保护策略。从数据加密和访问控制到入侵检测和安全审计技术的应用,朔黄铁路展现了其在应对复杂网络威胁方面的先进措施。同时,通过实施数据匿名化和最小化策略,公司加强了对用户隐私的保护。文章还探讨了持续的风险评估、管理优化及员工培训在提升整体信息安全性中的重要性。这些措施不仅提升了朔黄铁路的运营效率,还为铁路行业在数据安全与隐私保护方面提供了宝贵的经验。 展开更多
关键词 大数据 朔黄铁路 信息化运维 数据安全 隐私保护
下载PDF
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
13
作者 Maryam Roshanaei 《Journal of Computer and Communications》 2021年第8期80-102,共23页
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a... The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks. 展开更多
关键词 Critical Infrastructure protection Critical information Infrastructure protection CYBERSECURITY Operational Technologies Risk Management
下载PDF
The Public Law Construction of Government Agencies’Obligations to Disclose When Handling Personal Information in the Digital Age
14
作者 喻文光 郑子璇 SHEN Jinjun(Translated) 《The Journal of Human Rights》 2022年第3期439-461,共23页
The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing ... The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection. 展开更多
关键词 protection of personal information government’s processing of personal information duty to inform theoretical basis system construction
下载PDF
实验室安全与环保信息化系统研究与实现 被引量:11
15
作者 陈润 琚生根 +1 位作者 周刚 师维 《实验技术与管理》 CAS 北大核心 2013年第4期71-73,共3页
针对高校实验室安全和环保管理工作的现状和新特点,研究和实现了基于现代网络技术的实验室安全、环保宣传、教育培训、考评信息化系统。讨论了系统的架构、功能模块和具体实践,实现了安全与环保教育资源的共享、在线的自学、自测和考核... 针对高校实验室安全和环保管理工作的现状和新特点,研究和实现了基于现代网络技术的实验室安全、环保宣传、教育培训、考评信息化系统。讨论了系统的架构、功能模块和具体实践,实现了安全与环保教育资源的共享、在线的自学、自测和考核、准入资格的确定,提高了工作效率,使实验室安全与环保管理更加科学化和规范化。 展开更多
关键词 信息化系统 实验室安全 实验室环保
下载PDF
韶关市环境信息系统建设研究 被引量:1
16
作者 高云艳 夏斌 陈红顺 《广东农业科学》 CAS CSCD 北大核心 2010年第7期199-200,共2页
环境信息系统建设是数字环保的核心,建设环境信息系统是城市发展的需求。针对韶关市环境信息化建设的具体情况和环保业务工作的需求,对韶关市环境信息系统建设和将会带来的效益进行了研究分析,并提出建议。
关键词 环境信息系统 环境信息化 数字环保
下载PDF
非物质文化遗产保护的信息化建设——以甘肃省非物质文化遗产保护为例 被引量:4
17
作者 魏学宏 姚雪 《辽宁医学院学报(社会科学版)》 2009年第2期117-119,共3页
非物质文化遗产的传承问题,日益引起社会各个阶层的重视。从非物质文化遗产的信息化存贮、信息化的形式转换、信息化的传播、信息化建设的培训等四个方面,阐述非物质文化遗产保护工作的信息化建设途径,很有现实意义。保护和传承非物质... 非物质文化遗产的传承问题,日益引起社会各个阶层的重视。从非物质文化遗产的信息化存贮、信息化的形式转换、信息化的传播、信息化建设的培训等四个方面,阐述非物质文化遗产保护工作的信息化建设途径,很有现实意义。保护和传承非物质文化遗产的最终目的,在于保护和传承中华民族的传统文化精神;而将非物质文化遗产的保护纳入信息化建设之中,正是解决这个问题的一条重要渠道。 展开更多
关键词 非物质文化遗产 保护 信息化
下载PDF
发展“现代纺织” 迎接知识经济 被引量:1
18
作者 王介生 王茜芳 《棉纺织技术》 CAS CSCD 北大核心 2000年第3期25-28,共4页
简要介绍了“知识经济”的主要标志和传统产业面临的挑战 ;明确提出了“现代纺织”的主要标志和发展“现代纺织”的具体措施 :依托计算机技术 ,提高纺织设备机电一体化水平 ;依托电子信息技术 ,实现纺织设计、生产、管理、销售的信息化 ... 简要介绍了“知识经济”的主要标志和传统产业面临的挑战 ;明确提出了“现代纺织”的主要标志和发展“现代纺织”的具体措施 :依托计算机技术 ,提高纺织设备机电一体化水平 ;依托电子信息技术 ,实现纺织设计、生产、管理、销售的信息化 ;依托新型材料技术 ,开发新型纺织原材料及绿色纺织品 ;依托现代生物技术 ,改进纺织工艺过程 ,加强环境保护 ,实现可持续发展。 展开更多
关键词 知识经济 现代纺织 标志 信息化 纺织业 中国
下载PDF
公路养护管理系统软件的数据保护措施 被引量:1
19
作者 戴学臻 赵建勋 +1 位作者 闫永军 赵勇 《西安科技大学学报》 CAS 北大核心 2007年第2期288-291,共4页
结合我国公路养护管理系统软件数据处理的实际需要,从软件架构设计到功能实现,较为全面地介绍了养护系统软件数据处理模型,并重点介绍了软件数据处理中的极为实用的一种数据安全和保护措施——断电保护技术。它不仅能避免在突发情况下... 结合我国公路养护管理系统软件数据处理的实际需要,从软件架构设计到功能实现,较为全面地介绍了养护系统软件数据处理模型,并重点介绍了软件数据处理中的极为实用的一种数据安全和保护措施——断电保护技术。它不仅能避免在突发情况下的数据丢失,而且能很好实现数据在本地机的临时保存和管理,为养护系统软件数据处理的可靠性和人性化起到了重要作用。 展开更多
关键词 信息化 数据库 系统管理 断电保护
下载PDF
校园信息化背景下的信息安全 被引量:16
20
作者 傅星 《首都经济贸易大学学报》 CSSCI 北大核心 2010年第4期123-128,共6页
近年来,信息化建设已经成为高校发展的重要组成部分。信息化功能的不断充实与完善,信息资源的不断积累,使信息安全日益成为学校安全稳定与正常运转的重要保障。本文介绍了信息安全的基本概念,分析了学校面临的信息安全威胁,并针对高校... 近年来,信息化建设已经成为高校发展的重要组成部分。信息化功能的不断充实与完善,信息资源的不断积累,使信息安全日益成为学校安全稳定与正常运转的重要保障。本文介绍了信息安全的基本概念,分析了学校面临的信息安全威胁,并针对高校在信息安全方面存在的突出问题,提出了相关的解决方案。文章在最后介绍了中国信息系统安全等级保护制度。 展开更多
关键词 教育信息化 信息安全 网络安全 信息系统安全等级保护
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部