The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, ...In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, we obtain a law of iterated logarithm and a Chung type law of iterated logarithm for the maximum likelihood estimator (MLE) in the present model.展开更多
Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to ...Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development.展开更多
Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With th...Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It ??rst has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data;with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data.展开更多
A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals re...A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals remain or change their information according to their neighbors' information. When the moving speed of individuals v is zero, the two kinds of information typically coexist, and the ratio between them increases with L and decreases with N. In the dynamic case (v 〉 0), only one information eventually remains, and the time required for one information being left scales as Td -v^αL^β^γ.展开更多
We link nuclear force with gravity. We use statistical entropy to link fine-structure constant (ct) and cosmological constant, showing mystical number 137 (as reciprocal of increasing entropy of the universe) as n...We link nuclear force with gravity. We use statistical entropy to link fine-structure constant (ct) and cosmological constant, showing mystical number 137 (as reciprocal of increasing entropy of the universe) as negative entropy needed for life to exist. If our computational route applies to the physical universe, it should apply to life. Molecular biology is searching for the fundamental source of information that would link to the information in DNA.展开更多
While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is l...While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is life’s blueprint, better understanding of the origins of life is predicated on deciphering the conditions that allowed the formation of this complex molecule with its unique properties. In this article, we propose and examine the hypothesis that informational entropy models would allow for the formation of complex organic molecules with genetic properties, without the disruption of the second law of thermodynamics. Therefore, we demonstrate that formation of life’s blueprint may have initially been derived by informational entropy by means of decomplexification of the materials with higher informational entropy content, leading to the formation of primitive genetic molecules.展开更多
Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current softwar...Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and ...In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and legal effect on market and competition, which can not only promote the communication among members of the industry to find a solution to the industry benefit maximization, but also can produce inhibition and barriers to competition in the market. So in this paper, the industry association analysis will be made on the pros and cons of the information exchange, and the legislative defects and the insufficiency of information exchange industry association in our country. According to the practice in our country, the author puts forward the system design of our country industry association information exchange behavior.展开更多
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.
文摘In this paper, we define the generalized linear models (GLM) based on the observed data with incomplete information and random censorship under the case that the regressors are stochastic. Under the given conditions, we obtain a law of iterated logarithm and a Chung type law of iterated logarithm for the maximum likelihood estimator (MLE) in the present model.
文摘Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development.
文摘Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It ??rst has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data;with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60973152, and 60573172)the Superior University Doctor Subject Special Scientific Research Foundation of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province of China (Grant No. 20082165)
文摘A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals remain or change their information according to their neighbors' information. When the moving speed of individuals v is zero, the two kinds of information typically coexist, and the ratio between them increases with L and decreases with N. In the dynamic case (v 〉 0), only one information eventually remains, and the time required for one information being left scales as Td -v^αL^β^γ.
文摘We link nuclear force with gravity. We use statistical entropy to link fine-structure constant (ct) and cosmological constant, showing mystical number 137 (as reciprocal of increasing entropy of the universe) as negative entropy needed for life to exist. If our computational route applies to the physical universe, it should apply to life. Molecular biology is searching for the fundamental source of information that would link to the information in DNA.
文摘While the second law of thermodynamics suggests that our universe is driven by the tendency towards disorder, living organisms seem to exempt themselves by creating physiologic complexity. Since genetic material is life’s blueprint, better understanding of the origins of life is predicated on deciphering the conditions that allowed the formation of this complex molecule with its unique properties. In this article, we propose and examine the hypothesis that informational entropy models would allow for the formation of complex organic molecules with genetic properties, without the disruption of the second law of thermodynamics. Therefore, we demonstrate that formation of life’s blueprint may have initially been derived by informational entropy by means of decomplexification of the materials with higher informational entropy content, leading to the formation of primitive genetic molecules.
文摘Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
文摘In the modem society where information is efficient, information exchange is an important affair and function of trade association. However, information exchange behaviors of industry association will have double and legal effect on market and competition, which can not only promote the communication among members of the industry to find a solution to the industry benefit maximization, but also can produce inhibition and barriers to competition in the market. So in this paper, the industry association analysis will be made on the pros and cons of the information exchange, and the legislative defects and the insufficiency of information exchange industry association in our country. According to the practice in our country, the author puts forward the system design of our country industry association information exchange behavior.