期刊文献+
共找到3,091篇文章
< 1 2 155 >
每页显示 20 50 100
Influence of Quantum Information Technology on International Security
1
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
AssessITS: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
2
作者 Mir Mehedi Rahman Naresh Kshetri +1 位作者 Sayed Abu Sayeed Md Masud Rana 《Journal of Information Security》 2024年第4期564-588,共25页
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act... In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards. 展开更多
关键词 CYBERsecurity information security Risk Assessment Risk evaluation Risk Mitigation Threat Level Vulnerability Assessment
下载PDF
A Practical Study of Big Data Technology in Computer Network Information Security Processing
3
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology Computer network information security
下载PDF
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
4
作者 Jinxin Zuo Yueming Lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
下载PDF
Evaluation of International Standards of Management of Communication and Information Technology (MCIT) in Khorasan Razavi Hospitals from the Perspective of Managers
5
作者 Saeed Shojaei Fereshteh Farzianpour +2 位作者 Mohammad Arab Abbas Rahimi Foroushani Esmaeil Hosseinzadeh Roknabadi 《Health》 2015年第8期920-926,共7页
The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-mak... The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals. 展开更多
关键词 evaluation INTERNATIONAL STANDARDS MANAGEMENT of COMMUNICATION and information technology MANAGERS Hospitals
下载PDF
Suitability Evaluation on the Information Service System of "Agricultural Science and Technology 110" in Sichuan Province, China 被引量:1
6
作者 HU Yu-fu1,2,DENG Liang-ji1,2 1. College of Economics and Management,Sichuan Agricultural University, Ya′an 625014, China 2. College of Resources and Environment, Sichuan Agricultural University, Ya′an 625014, China 《Asian Agricultural Research》 2010年第9期17-20,24,共5页
Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierar... Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system. 展开更多
关键词 AGRICULTURAL SCIENCE and technology 110 Agricultur
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
7
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
8
作者 Jinxin Zuo Yueming Lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 Complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
下载PDF
信息安全中Safety与Security的比较研究 被引量:4
9
作者 吴志军 王慧 《信息网络安全》 2013年第8期84-86,共3页
文章针对Security和Safety在信息网络安全领域和在具体行业中应用的含义进行了探讨,给出了它们的相关定义,对信息安全风险评估、风险管理、等级保护及信息安全评价指标体系的研究具有一定的指导意义。
关键词 信息安全 网络安全 安全评估 风险管理 评价指标
下载PDF
An empowerment evaluation framework for national scientific and technical information governance 被引量:1
10
作者 hao Keran Chen Meihua Zeng Wen 《High Technology Letters》 EI CAS 2019年第4期461-469,共9页
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir... ‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation. 展开更多
关键词 scientific and technical(S&T) information governance empowerment evaluation technology assessment EE-capability system
下载PDF
A comparative analysis of information literacy curriculum standards in the educational programs of high schools in China and in the United States 被引量:1
11
作者 Jianhua WU Jing GUO Jing SUN 《Chinese Journal of Library and Information Science》 2011年第2期41-59,共19页
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ... Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism. 展开更多
关键词 information literacy education Curriculum standards information literacy evaluation criteria information literacy education policy information technology literacy Secondary education School librarian training Teacher training
下载PDF
基于核心素养的初中信息科技“SMITH”过程性评价模式 被引量:2
12
作者 赵书阳 陈明娇 《大连教育学院学报》 2023年第2期51-53,共3页
素养为本,评价为纲。根据教育部发布的《深化新时代教育评价改革总体方案》,在素养本位和问题导向的指引下,大连初中信息科技学业质量评价教学团队对过程性教学评价进行了实践探索。依据《义务教育信息科技课程标准(2022年版)》评价建议... 素养为本,评价为纲。根据教育部发布的《深化新时代教育评价改革总体方案》,在素养本位和问题导向的指引下,大连初中信息科技学业质量评价教学团队对过程性教学评价进行了实践探索。依据《义务教育信息科技课程标准(2022年版)》评价建议,逐步形成了“SMITH”过程性评价模式。该模式倡导基于真实情境的评价任务、研制多元评价量表、以学生为立场的评价反馈以及贯穿教学全过程的评价跟踪,并在实践中形成了一些贴近教学的方案和量规。 展开更多
关键词 初中信息科技 SMitH 过程性评价
下载PDF
Improving the Cybersecurity Framework for Future Consumer Networks
13
作者 Tyler Welker Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2021年第4期47-54,共8页
The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise netwo... The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise network to cause panic, this situation could be prevented. Using the proposed framework, network administrators and networked organizations can improve their cybersecurity framework for future consumer networks. Implementing a network security plan that is up to date and outlines responsibilities of team members, creating a government subsidy to implement and increase safeguards on US based networks, and the analyzing of past cyber-attacks metadata to further understand the attacks that are causing problems for consumer networks can improve the cybersecurity framework for consumer networks and increase potential security on US based networks. Research found that the implementation of security plans, creating a government subsidy, and analyzing past metadata all show signs of improving the framework of cybersecurity in consumer based networks. 展开更多
关键词 CYBERsecurity information technology Network security MALWARE ATTACKS
下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
14
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 information ASSURANCE LATIN SQUARE Design Model DEFENSE in Depth information technology Network security CYBERsecurity
下载PDF
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
15
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 information Assurance Bayesian Networks Influence Diagrams Defense in Depth information technology Network security CYBERsecurity
下载PDF
Survey of Data Value Evaluation Methods Based on Open Source Scientific and Technological Information
16
作者 Xiaolin Wang Cheng Dong +2 位作者 Wen Zeng Zhen Xu Junsheng Zhang 《国际计算机前沿大会会议论文集》 2019年第1期183-185,共3页
It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and... It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages. 展开更多
关键词 Data value evaluation OPEN-SOURCE SCIENTIFIC and TECHNOLOGICAL information information metrology Economic perspective TEXT analysis
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
17
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (security information and Event Management) CISA (Cybersecurity and Infrastructure security Agency) NIST (National Institute of Standards and technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
关于新时代我国科技情报工作发展的思考 被引量:2
18
作者 陈云伟 《情报学报》 CSSCI CSCD 北大核心 2024年第1期95-105,共11页
历经60余年的发展,我国科技情报事业已进入转型创新期,在世界科技发展态势与竞争格局深刻变化、数字技术快速进步以及我国加快实现高水平科技自立自强的背景下,我国科技情报事业迎来了更高的新时代发展需求。因此,我国需掌握数字技术驱... 历经60余年的发展,我国科技情报事业已进入转型创新期,在世界科技发展态势与竞争格局深刻变化、数字技术快速进步以及我国加快实现高水平科技自立自强的背景下,我国科技情报事业迎来了更高的新时代发展需求。因此,我国需掌握数字技术驱动的科技情报范式变革的新契机,深入开展以国家战略需求为导向的科技情报工作。第一,夯实科技情报研究理论、方法与数据根基;第二,布局面向科技未来发展的科技战略政策研究;第三,组织科技体制机制改革方案及管理制度研究;第四,探索可揭示问题和规律的科学学大数据分析;第五,展开围绕提出可行的解决方案的科技评价研究。同时,需要打造心系科技强国事业、高效协同、梯度完整、规模合理、集成“战略-理论-方法-数据-工具-分析”六型协同的新时代科技情报人才队伍,最终实现我国科技情报事业迈向高质量发展道路,服务科技强国建设。 展开更多
关键词 科技情报 科技评价 数字技术 科技强国 人才
下载PDF
实验室管理信息系统的建设与应用 被引量:2
19
作者 马淼 张文祥 马婷 《办公自动化》 2024年第4期12-14,共3页
文章主要探讨了实验室管理信息系统的构成、功能、建设过程、优势和发展趋势。通过详细介绍实验室管理信息系统的主要组成部分和基本功能,阐述了该系统具有较强的数据管理、设备调度和实验进度跟踪功能,可以提高实验室管理的效率和精度... 文章主要探讨了实验室管理信息系统的构成、功能、建设过程、优势和发展趋势。通过详细介绍实验室管理信息系统的主要组成部分和基本功能,阐述了该系统具有较强的数据管理、设备调度和实验进度跟踪功能,可以提高实验室管理的效率和精度。针对该系统的建设过程,强调了需对实验室管理的具体需求进行详细的分析和系统设计,同时选择适合的硬件设施和软件平台进行搭建,并利用网络通信和信息安全技术进行保障和优化。最后,提出了实验室管理信息系统将面临更多智能化和数据化趋势的展望,未来将经历更多深度集成和优化,以进一步提高实验室管理和研究工作的效率和质量。 展开更多
关键词 实验室 管理信息系统、信息安全技术 建设
下载PDF
数字人文档案与国家记忆工程的相互关系与作用研究 被引量:1
20
作者 宋飞 《档案管理》 北大核心 2024年第1期65-68,共4页
探讨“数字人文档案”概念的内涵及意义,剖析数字人文档案与国家记忆工程之间的关系和相互作用,为相关领域的研究和实践提供理论指导和方法支持。通过文献综述和理论分析的方法,全面系统地探讨数字人文档案与国家记忆工程的相互关系和... 探讨“数字人文档案”概念的内涵及意义,剖析数字人文档案与国家记忆工程之间的关系和相互作用,为相关领域的研究和实践提供理论指导和方法支持。通过文献综述和理论分析的方法,全面系统地探讨数字人文档案与国家记忆工程的相互关系和作用。提出“数字人文档案”的内涵是将数字人文成果以档案的形式进行保存、管理和利用,并分析了数字人文档案与国家记忆工程对记忆资源维护的相互促进关系。 展开更多
关键词 数字人文 档案 数字化 国家记忆工程 学科交叉 技术进步 信息安全
下载PDF
上一页 1 2 155 下一页 到第
使用帮助 返回顶部