期刊文献+
共找到1,590篇文章
< 1 2 80 >
每页显示 20 50 100
电子政务的国际研究特点及启示——基于Government Information Quarterly期刊的分析 被引量:4
1
作者 曾润喜 黄靖 《情报杂志》 CSSCI 北大核心 2013年第6期90-94,89,共6页
运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government I... 运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government Information Quarterly的研究方向和主题主要包括以下五个方面:电子政务基础理论研究,电子政务的实践应用,政府信息管理,电子政务的技术基础,电子政务的发展过程和前景。 展开更多
关键词 政府信息季刊 电子政务文献计量 内容分析研究主题
下载PDF
A Role-Based PMI Security Model for E-Government 被引量:2
2
作者 WULi-jun SUKai-le YANGZhi-hua 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期329-332,共4页
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In... We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system. 展开更多
关键词 e-govemment public key certificate role-specification AC role-assignmentAC ihe security model for e- government
下载PDF
On the Phenomenon of Information Silo in the E- government Construction in China
3
作者 Li Jing 《学术界》 CSSCI 北大核心 2015年第1期312-316,共5页
In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influ... In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influence upon the governm ental information resources sharing and the efficiency of the e-government affairs,hindering inform ation connectivity,so that the government management cannot meet the need of society,nor can the e-governm ent develop in the long run.This paper attempts to analyze the embodiment and causes of the phenomenon of information silo,putting forward measures of solving the problem of inform ation silo. 展开更多
关键词 电子政务建设 信息孤岛 政府管理 中国 行政效率 资源共享 电子商务 信息化
下载PDF
The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises
4
作者 Ja’far Alqatawna 《Journal of Software Engineering and Applications》 2014年第10期883-890,共8页
The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. Th... The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified. 展开更多
关键词 information security STANDARDS e-BUSINeSS Small and MeDIUM eNTeRPRISeS
下载PDF
技术压力对公务员信息安全行为的影响机制——基于SEM和ANN的混合方法
5
作者 刘晨晖 黄浩源 董新宇 《情报杂志》 CSSCI 北大核心 2024年第5期201-206,F0003,共7页
[研究目的]新兴信息技术的发展在驱动数字政府建设的同时,也引发了严峻的安全挑战,探究技术压力对公务员信息安全行为的影响机制将有利于提升政府部门的安全管理效能。[研究方法]基于信息安全技术压力框架(技术过载-技术复杂性-技术不... [研究目的]新兴信息技术的发展在驱动数字政府建设的同时,也引发了严峻的安全挑战,探究技术压力对公务员信息安全行为的影响机制将有利于提升政府部门的安全管理效能。[研究方法]基于信息安全技术压力框架(技术过载-技术复杂性-技术不确定性)构建研究模型,共收集418份公务员的多阶段问卷数据并使用结构方程模型(SEM)和人工神经网络(ANN)的混合方法进行分析。[研究结论]技术过载和技术复杂性对公务员信息安全行为有显著的负向影响,其中技术复杂性的影响程度强于技术过载,但是技术不确定性的作用不显著;组织承诺显著影响公务员信息安全行为,且低承诺公务员对技术复杂性更为敏感。 展开更多
关键词 数字政府 技术压力 公务员 信息安全行为 人工神经网络
下载PDF
Understanding trust-related factors affecting citizen adoption of e-government services 被引量:1
6
作者 Li ZHAO Chuanfu CHEN 《Chinese Journal of Library and Information Science》 2013年第3期31-43,共13页
Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a m... Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a model of citizen trust in e-government in an effort to study the impacts of trust-related factors on citizen intentions to adopt e-government services.Design/methodology/approach:The data was collected from an online survey of 182Chinese users who had more than 3 years' online experiences of using government websites.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that trust in e-government,perceived usefulness and perceived ease of use are critical factors that influence citizen intentions to use e-government services.The study findings also indicate that citizen trust in e-government is positively associated with trust in government,institution-based trust and perceived usefulness of e-government services.Research limitations:The survey sampled adults aged from 25 to 35 years old.Such a limited sample group cannot represent all of the population.So a larger sample involving more experienced online users will yield more useful results.Practical implications:The study results will help government agencies,especially the Chinese government agencies,find ways to improve the Chinese citizens' trust in e-government and promote their adoptions of e-government services.Originality/value:Previous researches have investigated separately the impacts of user evaluation of government websites and user trust in e-government on user intentions to engage in e-government.This study makes a theoretical contribution by integrating these two perspectives and building a model of citizen trust in e-government in understanding the impacts of trust-related factors on citizens' adoptions of e-government initiatives. 展开更多
关键词 e-government information resources TRUST Adoption of e-government services Trust building process
下载PDF
Optimum Spending on Cybersecurity Measures: Part II
7
作者 Sherita Tara Kissoon 《Journal of Information Security》 2021年第1期137-161,共25页
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i... The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures. 展开更多
关键词 information security Risk Management Strategy governANCe Organizational Decision Making
下载PDF
Assessing Factors Affecting the Adoption of E-Government Services in Developing Countries for Transport Sector, amidst the Covid-19 Pandemic
8
作者 Beauty Undi-Phiri Jackson Phiri 《Communications and Network》 2022年第2期69-90,共22页
The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory... The study was looking at establishing factors that are affecting the adoption of electronic government services in the Developing Countries for Transport sector amidst the Covid-19 pandemic based on the Unified Theory of Acceptance and Use of Technology Model (UTAUT). The study first looked at the major challenges faced by the Zambian transport sector in the implementation of e-government services among the citizens. The study then proposed a model through a web-based e-commerce web portal that could be adopted to address the challenges identified in the study. The study was based on all registered motor vehicles. These were from the various transport sectors in Zambia’s capital city, Lusaka. Both qualitative and quantitative data was collected from respondents using a structured questionnaire. The questionnaire was generated based on the UTAUT conceptual model. The response rate was 57% giving 141 questionnaire responses from the four transport providers. The Chi-Square test of independence was used to analyze the data using SPSS software. The results showed that interaction between trust in government and trust in the Internet has a significant effect on the utilisation of e-government services. The test had an observed P-Value of 0.05 against the Chi-Square value of 59.535. The results further showed that e-services control and effort expectancy had a significant impact on the actual utilisation of e-government services. 展开更多
关键词 e-government ADOPTION TRUST UTAUT Model Transport Sector information & Communication Technology (ICT)
下载PDF
Technology Acceptance Factors for Implementing the E-Government Systems in Saudi Arabia
9
作者 Syed Farrukh Amin Amna Binti Saad Adidah Lajis 《Advances in Internet of Things》 2022年第4期125-141,共17页
Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, en... Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption. 展开更多
关键词 information Systems Partial Least Square Unified Theory Acceptance and Use of Technology (UTAUT) e-government
下载PDF
Secure Socket Layer协议在电子政务系统安全建设中的应用
10
作者 孟昊晨 《国土资源信息化》 2009年第5期13-18,28,共7页
针对目前日益突出的电子政务安全问题,在Secure Socket Layer协议的基础上,对我国电子政务的安全问题进行探讨,并针对目前政府机构信息化建设中的数据安全传输问题提出几点改进工作方案。
关键词 数字签名 SSL协议 电子政务 业务处理模块 政府机构 信息化安全
下载PDF
SWAD: Secure Watermarking for Authentication of Scanned Documents
11
作者 Martin-Rodriguez Fernando Fernandez-Montenegro Juan Manuel 《通讯和计算机(中英文版)》 2012年第11期1226-1230,共5页
关键词 安全级别 文件 身份验证 水印 扫描 应用程序 互联网 可靠性
下载PDF
Design and Development of E-Governance Model for Service Quality Enhancement
12
作者 Tulu Tilahun Durga Prasad Sharma 《Journal of Data Analysis and Information Processing》 2015年第3期55-62,共8页
Governance is a process of establishing policies or laws and continuously monitoring their implementation in the public. Citizens are the main stakeholders in this process. To make the governance process cost effectiv... Governance is a process of establishing policies or laws and continuously monitoring their implementation in the public. Citizens are the main stakeholders in this process. To make the governance process cost effective, easy and convenient to the citizens, information and communication technologies (ICTs) are playing a vital role. Using ICTs in governance domain can be referred as e-governance. It helps citizen to participate not only in policy making but also in service quality improvements and getting government services over network. Web technology is one of the major technologies that have been used in e-governance as a major contributor. Before invention of web, citizens used to write their opinions and send to concerned body via post mail or local suggestion box for improvements of services. After the invention of the web, it became possible to post or send the opinions/comments over organization’s web sites or portals. As the number of comments increases over the web, it is very difficult to have relevant information for furthering the decision making processes. In these study, text processing and data mining techniques have been used. The prototype system classifies citizen’s opinions in one of six service categories with the precision of 87.3% and recall of 85.8%. Further, the system determines opinions as appreciation with the precision of 100% for both depression and appreciation, and average recall of 90.85% for both depression and appreciation. The results obtained from the prototype system indicate that the techniques that have been applied are promising for real world application in e-governance. 展开更多
关键词 e-governANCe DePReSSION APPReCIATION NeUTRAL information and COMMUNICATIONS Technology
下载PDF
E-Governance in Rural India: Need of Broadband Connectivity Using Wireless Technology
13
作者 Kalpana Chaudhari Upena Dalal Rakesh Jha 《Wireless Engineering and Technology》 2011年第3期212-220,共9页
The Information and Communication Technologies play an important role in rural development. The Empowerment of rural communities is crucial for the development of the rural region. Bringing the people in the rural reg... The Information and Communication Technologies play an important role in rural development. The Empowerment of rural communities is crucial for the development of the rural region. Bringing the people in the rural region in the mainstream of the digital technologies to access and adopt modern technologies is a major concern now. Rural Development implies both, the economic development of the people and greater social transformation using electronic governance (e-governance). In order to provide the rural people in Maharashtra with better prospects and opportunities for economic development, agricultural development and management, marketing management, increased participation of rural people in usage and adoption of information and communication technologies (ICTs) is envisaged. This paper aims to explore the nature, role and relevance of the Electronic/Digital Governance using ICTs and wireless technologies for agriculture and rural development in the rural regions. It also aims to study the impact of e-governance on rural development and methods for improving local environmental governance having regard particularly to the range of interests and actors involved in e-governance. The paper examines the current status of electronic governance in Jalgaon district in India. It focuses on development of the model using ICTs/wireless technologies for e-governance of Jalgaon district in Maharashtra state, India. 展开更多
关键词 e-governANCe WIMAX Application of information TeCHNOLOGY Wireless TeCHNOLOGY
下载PDF
Formalizing Land Administration through E-Governance Mechanism in Sri Lanka
14
作者 Kalupahana Arachchige Brian Sanjeewa Rupasinghe 《Intelligent Information Management》 2021年第4期214-231,共18页
This paper proposes a comprehensive and practical approach to implement a land administration act in Sri Lanka followed by setting up a Land Administration Commission (LAC), which is a separate entity to maintain a La... This paper proposes a comprehensive and practical approach to implement a land administration act in Sri Lanka followed by setting up a Land Administration Commission (LAC), which is a separate entity to maintain a Land Administration Database Management System in support of the land information collected and maintained by stakeholders who deal with matters related to land and its decision-making under e-governance concept. Also, It describes the operations of the four core functions: land tenure, land valuation, land use, and land development in land administration under a single sustainable national land policy, underpinned by spatial information under the e-Governance mechanism. Further, the paper identifies the stakeholders and their main responsibilities in each of the four core functions with the current issues in sharing information across stakeholders. Finally, the paper describes setting up a Land administration entity thereby empowering the LAC and introduces spatial information layers at different resolution levels in a centralized land administration spatial database to keep track of all land transactions carried out by each stakeholder. This approach will enable the top-level decision-making authority (the central level) to manage all land-related activities under one platform to contribute towards the sustainable land development of the country. It is proposed to implement this approach as a pilot activity in the district of Colombo and expand it in the entire country gradually with its output. 展开更多
关键词 e-governANCe Land Administration Cadastre Land information System Parcel Fabric Federated Database Spatial Data Data Interoperability Digital Terrain Model Base Imagery
下载PDF
企业数字化转型中信息安全治理影响因素研究——基于解释结构模型的分析 被引量:1
15
作者 甄杰 董坤祥 《经济与管理》 CSSCI 北大核心 2024年第5期33-40,共8页
识别企业数字化转型中信息安全治理的影响因素以及影响因素间的层次结构关系,有助于企业管控数字化运营的信息安全风险。通过文献分析、案例总结和专家咨询等方式识别企业信息安全治理的影响因素,在此基础上运用解释结构模型(ISM)对企... 识别企业数字化转型中信息安全治理的影响因素以及影响因素间的层次结构关系,有助于企业管控数字化运营的信息安全风险。通过文献分析、案例总结和专家咨询等方式识别企业信息安全治理的影响因素,在此基础上运用解释结构模型(ISM)对企业信息安全治理的影响因素进行层次结构和运行机理分析。结果表明:企业信息安全治理以风险处置、职责明确、行为塑造、知识共享和反馈改进的治理模式为直接依赖,以合规治理、流程治理、责任治理、契约治理和关系治理的治理机制为中间保障,以CEO决策力、CIO有效性、CFO支持度、TMT凝聚力和问责制的治理结构为高层支持。 展开更多
关键词 信息安全治理 数字化转型 解释结构模型 影响因素 运行机理
下载PDF
生成式人工智能个人信息安全挑战及敏捷治理 被引量:6
16
作者 邹开亮 刘祖兵 《征信》 北大核心 2024年第1期41-50,57,共11页
生成式人工智能秘密收集个人敏感数据,冲破“知情同意”原则和“最小必要”原则的限制,或将使信息关联违法高发。生成式人工智能信息收集行为主动、收集内容全面、泛化能力强劲,对“知情同意”原则和“最小必要”原则带来严重挑战。宏... 生成式人工智能秘密收集个人敏感数据,冲破“知情同意”原则和“最小必要”原则的限制,或将使信息关联违法高发。生成式人工智能信息收集行为主动、收集内容全面、泛化能力强劲,对“知情同意”原则和“最小必要”原则带来严重挑战。宏观层面,我国现有民事法律无力于数据安全治理,刑事法律缺乏明确的违法计量标准,由行政法规挑起数据法治大梁。微观层面,我国现有法律规范体系对被侵权人加以不合理的举证义务,司法救济路径单一,不利于权利救济。选择风险控制路径,从算法协议透明化、治理场景化和多方位协同化应对信息关联违法等方面展开制度构建,引入个人敏感数据单独监管制度和预防性公益诉讼制度破解该困局。 展开更多
关键词 生成式人工智能 个人信息安全 敏捷治理 预防性公益诉讼
下载PDF
智慧校园一卡通系统安全防护策略 被引量:2
17
作者 王利巧 买若毅 《办公自动化》 2024年第6期25-28,共4页
高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校... 高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校园卡结构、终端安全、数据存储安全、数据传输安全、数据库安全等几个方面构建相应的安全策略,为高校智慧校园一卡通信息系统的安全建设和管理提供理论借鉴。 展开更多
关键词 智慧校园 一卡通系统 信息安全 防护策略
下载PDF
全球化背景下的网络内容安全风险升级与治理
18
作者 谢新洲 张静怡 《编辑之友》 CSSCI 北大核心 2024年第7期60-66,共7页
网络内容安全是网络内容治理的重要方面,也是信息安全和国家安全领域的重要命题。网络内容的内涵随着互联网技术和全球化趋势的演进发生了变化,传统的技术领域风险逐渐向认知领域拓展。在生成式人工智能出现和发展的背景下,网络内容安... 网络内容安全是网络内容治理的重要方面,也是信息安全和国家安全领域的重要命题。网络内容的内涵随着互联网技术和全球化趋势的演进发生了变化,传统的技术领域风险逐渐向认知领域拓展。在生成式人工智能出现和发展的背景下,网络内容安全风险进一步出现了隐蔽化、长线化转向,为社会带来了深层次风险与挑战。深刻认识网络内容安全的发展变化与风险挑战,厘清网络内容安全风险升级背后的基本逻辑关系,构建现代化的网络内容安全治理体系,是推进互联网治理、应对网络安全问题和维护国家安全的重要使命与目标。 展开更多
关键词 网络内容安全 信息安全 互联网治理 生成式人工智能 国家安全
下载PDF
元宇宙视域下个人信息保护的困境及法规重塑
19
作者 傅琳雅 邬慧 《西南石油大学学报(社会科学版)》 2024年第3期61-68,共8页
元宇宙是下一代互联网的数字技术媒介。在元宇宙的中心化治理、分布式治理的场景下,个人可以实现深度媒介化的虚拟数字化生存,也伴随着数据安全的挑战,面临着个人信息外延持续扩大、个人生物信息被收集、“知情-同意”原则被冲击、传统... 元宇宙是下一代互联网的数字技术媒介。在元宇宙的中心化治理、分布式治理的场景下,个人可以实现深度媒介化的虚拟数字化生存,也伴随着数据安全的挑战,面临着个人信息外延持续扩大、个人生物信息被收集、“知情-同意”原则被冲击、传统信息监管模式被打破等个人信息保护危机。加强对元宇宙的规则建构探索,对于个人数据安全乃至国家战略安全都具有重要意义。当前,需要通过构建技术促进规则、厘清个人生物信息法律定位、重构分层—动态同意原则、平衡平台与个人权利关系等有效措施,积极解决元宇宙数字媒介空间下的个人信息保护问题。 展开更多
关键词 元宇宙 数据治理 媒介空间 个人信息 数据安全
下载PDF
帮信罪与拒履网安义务罪适用差异研究——以刑法网络治理模式为视角
20
作者 马松建 孙常啸 《聊城大学学报(社会科学版)》 2024年第4期46-56,共11页
帮助信息网络犯罪活动罪的司法案件数量和学术讨论热度远超拒不履行信息网络安全管理义务罪,教义学分析无法充分解释二罪差异。实证分析二罪理论文献及司法解释文件,发现国家对拒不履行信息网络安全管理义务罪的网络治理效能抱有期待。... 帮助信息网络犯罪活动罪的司法案件数量和学术讨论热度远超拒不履行信息网络安全管理义务罪,教义学分析无法充分解释二罪差异。实证分析二罪理论文献及司法解释文件,发现国家对拒不履行信息网络安全管理义务罪的网络治理效能抱有期待。适当转变司法治理思维,减少直接性控制,承认社会个体治理能力,建立“共建共享公治”的多元网络治理格局,既符合我国的社会发展趋势也具备政策基础。多元治理利于调动网络安全管理义务人网络专长,及时处理信息。即使无法完全采取多元治理模式,也应对帮助信息网络犯罪活动罪的体系突破进行限缩,防止其持续膨胀。 展开更多
关键词 帮助信息网络犯罪活动罪 拒不履行信息网络安全管理义务罪 网络社会治理 多元共治
下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部