期刊文献+
共找到2,408篇文章
< 1 2 121 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information Protection law Privacy security Privacy protection will
下载PDF
The Quantitative Law of Network Information Growth 被引量:1
2
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier Internet economy central information base
下载PDF
Iterated Logarithm Laws on GLM Randomly Censored with Random Regressors and Incomplete Information
3
作者 Qiang Zhu Zhihong Xiao +1 位作者 Guanglian Qin Fang Ying 《Applied Mathematics》 2011年第3期363-368,共6页
In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, ... In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, we obtain a law of iterated logarithm and a Chung type law of iterated logarithm for the maximum likelihood estimator (MLE) in the present model. 展开更多
关键词 Generalized Linear Model INCOMPLETE information Stochastic Regressor ITERATED LOGARITHM lawS
下载PDF
Study on the Development of the Chip Information Industry Based on Moore’s Law
4
作者 Guowang Zeng Shihong Zeng 《Journal of Computer and Communications》 2017年第14期39-47,共9页
Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to ... Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development. 展开更多
关键词 Moore’s law CHIP Integrated CIRCUITS CHIP information INDUSTRY Development
下载PDF
Information Privacy, Data Surveillance and Security——How Australian Privacy Law Fully Plays Its Role in the Age of Big Data
5
作者 Jiexin Zang 《Journal of Educational Theory and Management》 2019年第1期22-30,共9页
Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With th... Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It ??rst has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data;with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data. 展开更多
关键词 A big DATA age The protection of information PRIVACY The PRIVACY law in AUSTRALIA
下载PDF
论阮氏“图书馆学五定律”在Information Commons构建中的运用——Information Commons构建的理论基础研究之一 被引量:6
6
作者 陆宝益 《图书与情报》 CSSCI 北大核心 2011年第2期57-61,共5页
文章简单概述了阮氏五定律对图书馆事业发展的历史贡献,从IC理念、结构功能、服务内容、运行管理模式等几个方面详细分析了IC建设所蕴含的阮氏五定律内涵,并在此基础上作出"IC建设与发展离不开阮氏五定律"的论断。
关键词 信息共享空间 图书馆学五定律 阮冈纳赞
下载PDF
Competition between two kinds of information among random-walking individuals 被引量:1
7
作者 刘真真 王兴元 王茂基 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期625-630,共6页
A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals re... A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals remain or change their information according to their neighbors' information. When the moving speed of individuals v is zero, the two kinds of information typically coexist, and the ratio between them increases with L and decreases with N. In the dynamic case (v 〉 0), only one information eventually remains, and the time required for one information being left scales as Td -v^αL^β^γ. 展开更多
关键词 information spread random walk complex networks power law
下载PDF
Decoding the Information of Life 被引量:1
8
作者 ShantilalG. Goradia 《Journal of Physical Science and Application》 2015年第3期191-195,共5页
We link nuclear force with gravity. We use statistical entropy to link fine-structure constant (ct) and cosmological constant, showing mystical number 137 (as reciprocal of increasing entropy of the universe) as n... We link nuclear force with gravity. We use statistical entropy to link fine-structure constant (ct) and cosmological constant, showing mystical number 137 (as reciprocal of increasing entropy of the universe) as negative entropy needed for life to exist. If our computational route applies to the physical universe, it should apply to life. Molecular biology is searching for the fundamental source of information that would link to the information in DNA. 展开更多
关键词 3rd law of thermodynamics fine-structure constant cosmological constant strong coupling information.
下载PDF
Informational Entropy as a Source of Life’s Origin
9
作者 Shahram Yazdani 《Journal of Modern Physics》 2019年第13期1498-1504,共7页
While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is l... While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is life’s blueprint, better understanding of the origins of life is predicated on deciphering the conditions that allowed the formation of this complex molecule with its unique properties. In this article, we propose and examine the hypothesis that informational entropy models would allow for the formation of complex organic molecules with genetic properties, without the disruption of the second law of thermodynamics. Therefore, we demonstrate that formation of life’s blueprint may have initially been derived by informational entropy by means of decomplexification of the materials with higher informational entropy content, leading to the formation of primitive genetic molecules. 展开更多
关键词 ENTROPY informational ENTROPY GENETIC Material SECOND law of THERMODYNAMICS
下载PDF
Interpretation of Information Processing Regulations
10
作者 Sabah Al-Fedaghi 《Journal of Software Engineering and Applications》 2009年第2期67-76,共10页
Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current softwar... Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process. 展开更多
关键词 Software REQUIREMENT lawS REGULATION PRIVACY PERSONAL Identifiable information
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
11
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights Personal information Protection law dependency protection
下载PDF
Legal Rules and Principles as Informational Vectors in Legal Time and Space
12
作者 Massimiliano Ferrara Angelo Roberto Gaglioti 《通讯和计算机(中英文版)》 2012年第8期879-889,共11页
关键词 法律规则 信息载体 和空间 时间 组成部分 定量分析 法律制度 向量表示
下载PDF
The Legal Regulation of the Information Exchange for Trade Association in China
13
作者 Du Yuanyuan 《International English Education Research》 2014年第3期171-173,共3页
In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and ... In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and legal effect on market and competition, which can not only promote the communication among members of the industry to find a solution to the industry benefit maximization, but also can produce inhibition and barriers to competition in the market. So in this paper, the industry association analysis will be made on the pros and cons of the information exchange, and the legislative defects and the insufficiency of information exchange industry association in our country. According to the practice in our country, the author puts forward the system design of our country industry association information exchange behavior. 展开更多
关键词 Industry association Restrict competition information exchange law regulation
下载PDF
个人信息范围的界定与要件判断 被引量:1
14
作者 程啸 《武汉大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第4期128-140,共13页
个人信息是个人信息保护法中最核心的概念,也是个人信息保护法律规范的适用前提。我国法律对个人信息采取了统一定义的模式。从《中华人民共和国网络安全法》(下文简称《网络安全法》)到《中华人民共和国个人信息保护法》(下文简称《个... 个人信息是个人信息保护法中最核心的概念,也是个人信息保护法律规范的适用前提。我国法律对个人信息采取了统一定义的模式。从《中华人民共和国网络安全法》(下文简称《网络安全法》)到《中华人民共和国个人信息保护法》(下文简称《个人信息保护法》),个人信息的概念经历了一个从窄到宽的发展演变过程。《个人信息保护法》第4条第1款将个人信息的判断要件分为积极要件与消极要件,前者是通过关联性与识别性去界定个人信息的概念范围,后者则将匿名化处理后的信息排除在个人信息之外。为了防止个人信息的范围过于宽泛,以至于个人信息保护法成为无所不包的法律,应明确个人信息积极要件中关联性要件与识别性要件之间为“且”的关系而非“或”的关系,以此来相应地控制个人信息的范围。认定关联性要件时,不仅应考虑信息的内容、目的和结果,还要考虑信息与个人权益是否存在一定的因果关联。在判断识别性时,应当限定识别主体的范围及所使用的手段与方式。作为消极要件的匿名化虽然并非可以绝对消除信息的可识别性,但是其对于保护个人信息权益也有重要的意义。 展开更多
关键词 个人信息 个人信息保护法 关联性 识别性 匿名化
下载PDF
Twitter提及论文的布拉德福定律验证及来源期刊特征——以图书情报学科为例 被引量:3
15
作者 张蕊 王莹 邱均平 《图书情报知识》 CSSCI 北大核心 2024年第1期121-132,共12页
[目的/意义]调研社交媒体提及的论文是否符合布拉德福定律有助于了解社交媒体环境下论文的分布特征,并获取媒体关注的核心信息。[研究设计/方法]以2018-2022年图书情报学科相关的推文为研究对象,通过描述性统计、布拉德福定律验证和特... [目的/意义]调研社交媒体提及的论文是否符合布拉德福定律有助于了解社交媒体环境下论文的分布特征,并获取媒体关注的核心信息。[研究设计/方法]以2018-2022年图书情报学科相关的推文为研究对象,通过描述性统计、布拉德福定律验证和特征分析方法,考察布拉德福定律在Twitter环境下的有效性及其分布特点。[结论/发现]在图书情报领域,Twitter提及论文所在来源分布符合布拉德福分散定律;核心区中被JCR收录的、拥有Twitter账号的期刊数量更多。[创新/价值]关注了传统理论在社交媒体环境下的适用性,对比不同分区来源期刊的特征能够为发现成为核心区期刊的关键因素提供参考。 展开更多
关键词 布拉德福定律 推文分布 Twitter提及 图书情报学科 验证分析
下载PDF
社会交互成本理论与社会信用法的法理重构 被引量:2
16
作者 谢勇 《政治与法律》 CSSCI 北大核心 2024年第7期109-126,共18页
社会信用体系建设探索实践面对法治拷问,社会交互成本理论对社会信用法治之路将如何前行进行了回应。该理论通过揭示和描述社会信用机制的内在规律,对我国社会信用体系建设当前实践给出了学理解读。在社会交互成本理论看来,社会信用建... 社会信用体系建设探索实践面对法治拷问,社会交互成本理论对社会信用法治之路将如何前行进行了回应。该理论通过揭示和描述社会信用机制的内在规律,对我国社会信用体系建设当前实践给出了学理解读。在社会交互成本理论看来,社会信用建设现有的法治探索经验显示,社会信用法在法律的调整对象等一系列方面已然显现新的特征,以“行为本位”为前提的法理思维已经无法涵括社会信用法领域出现的新的法律现象。在依据社会交互成本理论形成的法理观念看来,社会信用法的调整对象已不只是信用行为,而是信用行为习惯及其背后的社会关系;调整手段不只是国家的强制力,而是国家强力规制与社会自我管理有机融合;调整方式不再是单纯的负面惩戒,而是以正向调整鼓励守信为主。 展开更多
关键词 社会交互成本理论 社会交互成本 信用信息集约化供给 信用人格 社会信用法
下载PDF
大数据时代隐私权的刑法保护模式重构 被引量:1
17
作者 陈伟 邬雨岑 《西南政法大学学报》 2024年第1期107-121,共15页
大数据促进了生活的便捷,带动了新兴行业的高速发展,但超出合理边界的数据滥用行为,也对公民的隐私安全带来了现实威胁。伴随大数据时代的纵深发展,个人隐私的保护从传统个人本位向社会本位发生转变,隐私权的法益内涵在大数据时代应当... 大数据促进了生活的便捷,带动了新兴行业的高速发展,但超出合理边界的数据滥用行为,也对公民的隐私安全带来了现实威胁。伴随大数据时代的纵深发展,个人隐私的保护从传统个人本位向社会本位发生转变,隐私权的法益内涵在大数据时代应当进行重新审视。随着信息保护的日渐重视,隐私权的价值应与个人信息权一样受到同等重视,刑法应当为大数据时代隐私权的保护开辟新路径,采取直接保护与间接保护并行的双轨制保护模式,重构个人信息的刑法定义,引入“弱可识别性+隐私性”标准,同时继续加强针对隐私权犯罪的积极预防,通过刑法调整来应对当前公民隐私权被侵害的现实。 展开更多
关键词 大数据时代 隐私权 侵犯公民个人信息 刑法保护
下载PDF
个人信息处理规则的程序法治
18
作者 张青波 《南大法学》 CSSCI 2024年第6期1-17,共17页
法律要求个人信息处理规则通常应获得个人知情同意。但这既不能彰显个人的自治,也不能有效保护个人信息免遭不公。个人信息处理规则的实质法治,面临着立法者的认知负担过大、用法者的操作负担过大和构成家长主义干预的困境,故应转向程... 法律要求个人信息处理规则通常应获得个人知情同意。但这既不能彰显个人的自治,也不能有效保护个人信息免遭不公。个人信息处理规则的实质法治,面临着立法者的认知负担过大、用法者的操作负担过大和构成家长主义干预的困境,故应转向程序法治。哈贝马斯的商谈程序法治理论之缺陷一是所预设的独立于政治系统并能对其施加制约的公共领域未必存在,二是国家法未必能够穿透系统的壁垒而左右它们的运作。更为可取的是采纳托伊布纳的商谈程序法治理论,将政治和法律系统难以把握的问题,下放到其他社会系统和非官方组织进行自我规制和自我立法,并由国家法严格规范相关的程序和组织。为了落实这种程序法治,应由各行业组织主持制定有法律效力的个人信息处理规则,由公众代表和专业代表参与制定程序并开放公众参与,并由法院保障个人信息处理规则符合国家立法内容、遵守国家法规定的程序规则。 展开更多
关键词 个人信息保护 个人信息处理规则 知情同意 程序法治 实质法治
下载PDF
个人金融账户信息的法律界定
19
作者 尹华容 伍洋宇 《财经理论与实践》 CSSCI 北大核心 2024年第3期154-160,共7页
《个人信息保护法》将金融账户信息纳入敏感个人信息的范围,但未作出明确的界定。界定标准的不明确将导致权利主体权益易损、义务主体责任不明、司法裁判依据不清。考察域外立法例,同时结合我国有关立法现状和实践,宜采取“定义+列举+... 《个人信息保护法》将金融账户信息纳入敏感个人信息的范围,但未作出明确的界定。界定标准的不明确将导致权利主体权益易损、义务主体责任不明、司法裁判依据不清。考察域外立法例,同时结合我国有关立法现状和实践,宜采取“定义+列举+排除”的界定模式,以“信息主体”“信息性质”和“信息处理”为定义的考量因素,从立法、实践的综合角度进行列举,并排除通过间接识别才能确认的金融账户信息。基于此,我国出台“金融账户信息”的司法解释可侧重四个方面,以实现个人信息的保护和社会信息利用的动态平衡。 展开更多
关键词 个人信息保护法 金融账户 个人金融信息 敏感个人信息
下载PDF
信息化时代的法学实践教学方法革新——以家事法教学中运用类案检索方法为例
20
作者 郝佳 李凯文 《法学教育研究》 2024年第1期190-204,共15页
类案检索是信息化时代法学实践教学方法革新的重要途径和有效方案。以吉林大学法学院和西北政法大学为起始的类案检索教学改革试点经验,证实了该种教学方法在学生法律思维训练、法学分析能力提升、自主学习能力养成方面的效能。但必须承... 类案检索是信息化时代法学实践教学方法革新的重要途径和有效方案。以吉林大学法学院和西北政法大学为起始的类案检索教学改革试点经验,证实了该种教学方法在学生法律思维训练、法学分析能力提升、自主学习能力养成方面的效能。但必须承认,类案检索方法在受益于信息时代给予的信息便利的同时,也受制于信息公开的有限范围。跨越这一障碍,不仅需要文书公开制度的开放与包容,更需要法律共同体多机构间的有效合作。 展开更多
关键词 信息化时代 法学实践教学 类案检 家事法
下载PDF
上一页 1 2 121 下一页 到第
使用帮助 返回顶部