期刊文献+
共找到1,579篇文章
< 1 2 79 >
每页显示 20 50 100
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
1
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law privacy security privacy protection will
下载PDF
User location privacy protection mechanism for location-based services 被引量:6
2
作者 Yan He Jiageng Chen 《Digital Communications and Networks》 SCIE CSCD 2021年第2期264-276,共13页
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co... With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data. 展开更多
关键词 Internet of things Location-based services Location privacy privacy protection mechanism CONFIDENTIALITY
下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
3
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
下载PDF
Privacy Protection Framework with Defined Policies for Service-Oriented Architecture 被引量:2
4
作者 David S. Allison Miriam A. M. Capretz +1 位作者 Hany F. EL Yamany Shuying Wang 《Journal of Software Engineering and Applications》 2012年第3期200-215,共16页
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abs... Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can and cannot be done with a consumer’s personally identifiable information (PII). The privacy policy consists of one-to-many privacy rules, with each rule created from a set of six privacy elements: collector, what, purpose, retention, recipient and trust. The PS acts as an intermediary between the service consumer and service provider, to establish an unbiased contract before the two parties begin sending PII. It is shown how many Privacy Services work together to form the privacy protection framework. An examination of what current approaches to protecting privacy in an SOA environment is also presented. Finally, the operations the PS must perform in order to fulfill its tasks are outlined. 展开更多
关键词 privacy service-ORIENTED Architecture Web services FAIR information Practices POLICIES CONTRACTS
下载PDF
A Generalized Location Privacy Protection Scheme in Location Based Services
5
作者 Jing-Jing Wang Yi-Liang Han Jia-Yong Chen 《国际计算机前沿大会会议论文集》 2015年第B12期53-54,共2页
When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of p... When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests. 展开更多
关键词 LOCATION privacy protection GENERALIZED K-ANONYMITY LOCATION based service
下载PDF
Study on individualized information service for the reader in the library based on the network 被引量:1
6
作者 唐振宇 李莘 +1 位作者 陈凤岩 冯玉强 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第6期779-783,共5页
With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accur... With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented. 展开更多
关键词 Individualized information service Demand model of the reader Resource integration protection of the reader privacy
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
7
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
基于Web Services的个性化信息推荐系统的研究与设计 被引量:1
8
作者 赵麟 《图书馆工作与研究》 CSSCI 北大核心 2010年第7期21-24,共4页
本文在分析了个性化信息推荐服务在实现过程中存在的问题后,提出了利用Web Services技术进行个性化信息推荐系统的设计,并对系统的工作原理进行了详细的阐述。
关键词 个性化信息推荐 WEB serviceS 数据挖掘
下载PDF
基于Web Service的读者个性化移动服务平台的设计与实现 被引量:2
9
作者 赵晋芝 《农业图书情报学刊》 2012年第7期48-50,共3页
随着智能手机的普及,图书馆需不断拓展移动服务以满足读者的需求,读者个性化移动服务平台是在图书馆移动服务上的探索。该平台基于.net框架,利用C#程序设计语言,设计了基于web service的图书馆掌上应用系统,读者可以利用随时随地的查看... 随着智能手机的普及,图书馆需不断拓展移动服务以满足读者的需求,读者个性化移动服务平台是在图书馆移动服务上的探索。该平台基于.net框架,利用C#程序设计语言,设计了基于web service的图书馆掌上应用系统,读者可以利用随时随地的查看借阅情况、超期通知、新书通知、借阅排行和图书推荐以及图书检索等服务功能,特别在图书推荐中增加关联规则数据挖掘,以实现个性化的读者服务。 展开更多
关键词 WEBservice 个性化信息服务 手机图书馆 数据挖掘
下载PDF
基于IEC61850和Web Services服务的中性点小电阻接地系统接地保护装置的研发 被引量:8
10
作者 方学智 杨帆 +1 位作者 肖彬 杨万锦 《电力系统保护与控制》 EI CSCD 北大核心 2016年第19期144-149,共6页
将Web Services通信技术应用于配网自动化领域,有利于降低保护装置接入配电网自动化系统的难度。基于IEC 61850和Web Services服务,研发一款应用于中性点经小电阻接地的配网系统的高性能数字化接地保护装置。分析了中性点经小电阻接地... 将Web Services通信技术应用于配网自动化领域,有利于降低保护装置接入配电网自动化系统的难度。基于IEC 61850和Web Services服务,研发一款应用于中性点经小电阻接地的配网系统的高性能数字化接地保护装置。分析了中性点经小电阻接地技术在配网中的原理及应用,对中性点经小电阻接地的保护装置进行功能分解和IEC 61850信息建模。采用g SOAP工具开发小电阻接地保护装置的Web Services服务器端;在Windows平台下开发Web Services客户端。最后以GetDataValue服务定时召唤小电阻接地保护装置遥测值为例,验证方案的可行性。 展开更多
关键词 小电阻接地 保护装置 信息模型 Web serviceS IEC 61850
下载PDF
Self-Reported Use of Personal Protective Equipment during the SARS-CoV-2 Pandemic in Emergency Medical Service Employees in Germany—A Survey
11
作者 Theresa Berthold Jan-Thorsten Gräsner +4 位作者 Janina Kosan Marcel Zill Leonie Hannappel Birgitt Alpers Jan Wnent 《Open Journal of Preventive Medicine》 2021年第11期391-409,共19页
<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupationa... <strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupational risk for German Emergency Medical Services (EMS) personnel. <strong>Study Objectives: Primary:</strong> The objective is to take stock of the use and availability of Personal Protective Equipment (PPE) in German EMS, both at managerial and employee level, during the SARS-CoV-2 pandemic. <strong>Secondary:</strong> Generate additional data on individual perceptions of risk of infection and occurrence of infections at respective places of service. <strong>Methods:</strong> Multicentric prospective cohort investigation survey conducted online at two levels of German EMS personnel—EMS managers and EMS employees, both medical and paramedical—with questions adapted slightly to fit the respective study population. <strong>Results:</strong> A total of 34 responses were received in the managerial group;a total of 2389 responses were received in the group of employees. Self-reported PPE adherence of EMS employees for confirmed SARS-CoV-2 positive patients: use of gloves (99.8%), FFP2 or FFP3 masks (99.8%), gowns or coveralls (99.1%), goggles (89.7%), face shields (24.0%), surgical masks (0.0%). Self-reported PPE adherence of EMS employees for suspected SARS-CoV-2 positive patients: gloves (98.8%), FFP2 or FFP3 masks (total: 99.4%), gowns or coveralls (total: 95.9%), goggles (85.6%), face shields (19.2%), surgical masks (0.2%). <strong>Conclusions:</strong> Findings included an overall improved self-reported adherence to PPE compared to studies that were conducted before the pandemic. Self-reported general adherence to PPE recommendations when attending to confirmed SARS-CoV-2 positive patients was good, with the exception of goggles. Self-reported adherence to PPE recommendations dropped when attending to suspected SARS-CoV-2 positive patients. 展开更多
关键词 SARS-CoV-2 Personal Protective Equipment Emergency Medical services
下载PDF
The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper
12
作者 Wenqi Liu Jie Feng Guangwei Wang 《国际计算机前沿大会会议论文集》 2017年第2期129-131,共3页
Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In add... Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm. 展开更多
关键词 privacy protection CASPER CLOAK Location-based services REDUNDANCY optimization
下载PDF
车联网POI查询中的位置隐私和查询隐私联合保护机制 被引量:1
13
作者 赵国锋 吴昊 +2 位作者 王杉杉 徐川 唐雯钰 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第1期155-164,共10页
在车联网中,基于位置的服务(LBS)的兴趣点(POI)查询被广泛用于车载应用中。但是,由于攻击者容易获取车辆位置、查询内容以及其它额外信息,单独对位置隐私或查询隐私进行保护很难保障车载用户的隐私安全,使得对位置隐私和查询隐私开展联... 在车联网中,基于位置的服务(LBS)的兴趣点(POI)查询被广泛用于车载应用中。但是,由于攻击者容易获取车辆位置、查询内容以及其它额外信息,单独对位置隐私或查询隐私进行保护很难保障车载用户的隐私安全,使得对位置隐私和查询隐私开展联合保护越发关键。为此,该文提出一种基于虚拟序列的位置隐私和查询隐私联合保护机制。首先根据POI查询的限制,分析位置隐私和查询隐私的相关性,运用欧几里得距离和关联规则算法对其建模描述,得到相关性判断模型;然后基于虚拟序列,根据影响隐私保护的因素和真实查询的相关性值,将联合保护转化为虚拟序列的选择问题,建立联合保护优化模型,得到匿名程度高且匿名区域大的匿名查询集,防止攻击者识别出真实查询。最后,实验结果表明,与现有方案相比,所提联合保护机制能抵御针对位置隐私和查询隐私的联合攻击(语义范围攻击、时间关联攻击和长期观察攻击),能更有效地保护用户的LBS隐私。 展开更多
关键词 位置隐私 基于位置的服务 查询隐私 联合保护 虚拟序列
下载PDF
A Personalized Adverse Drug Reaction Early Warning Method Based on Contextual Ontology and Rules Learning
14
作者 Haixia Zheng Wei Wei 《Journal of Software Engineering and Applications》 2023年第11期605-621,共17页
Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: T... Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR. 展开更多
关键词 Health information services personalized Contextual Ontology Drug Adverse Reaction Early Warning REASONING
下载PDF
《民法典》背景下个人信息保护的司法考察与制度完善 被引量:1
15
作者 沃耘 乔鹏飞 《征信》 北大核心 2024年第5期31-42,共12页
大数据时代,为充分保障个人的信息安全,我国相继施行的《民法典》《个人信息保护法》对此作出了较为全面的规定。考察相关规则的司法适用,发现我国个人信息保护存在个人信息与隐私权界定不清、损害赔偿威慑作用不足、公益诉讼制度效用... 大数据时代,为充分保障个人的信息安全,我国相继施行的《民法典》《个人信息保护法》对此作出了较为全面的规定。考察相关规则的司法适用,发现我国个人信息保护存在个人信息与隐私权界定不清、损害赔偿威慑作用不足、公益诉讼制度效用未充分发挥、“知情—同意”标准不一且流于形式等问题。为解决上述问题,可通过构建可识别的场景化模式界定个人信息,引入情境脉络完整性理论判定隐私,审慎引入惩罚性赔偿,明晰个人信息保护公益诉讼的适用条件,构建“国家—行业—平台”三层规则体系实现实质同意,全面保护个人信息。 展开更多
关键词 个人信息保护 隐私权 惩罚性赔偿 “知情—同意” 《民法典》
下载PDF
《个人信息保护法》视角下的隐私保护方法设计研究:隐私告知及其对隐私不确定性的影响
16
作者 刘百灵 李洁 +1 位作者 易明 李玉海 《中国图书馆学报》 北大核心 2024年第3期47-66,共20页
要确保社会稳定和数字经济高质量发展,加强移动应用(App)的个人信息保护至关重要。本文以2021年11月施行的《中华人民共和国个人信息保护法》作为缓解用户对个人信息被收集、使用与保护的不确定性的突破口,展开隐私保护方法设计研究。... 要确保社会稳定和数字经济高质量发展,加强移动应用(App)的个人信息保护至关重要。本文以2021年11月施行的《中华人民共和国个人信息保护法》作为缓解用户对个人信息被收集、使用与保护的不确定性的突破口,展开隐私保护方法设计研究。总结归纳《个人信息保护法》中App服务商需要告知用户的隐私相关信息,理解用户对这些隐私相关信息的偏好,据此提出并设计App下载阶段面向用户的隐私告知方法,并通过基于插图的实验方法展开三项研究,系统探究用户在App下载阶段感知的隐私不确定性,以及隐私告知对用户隐私不确定性和App下载意愿的影响机理。研究发现,在中国App应用中,用户普遍存在隐私不确定性,且用户感知的隐私不确定性具有情境依赖性,即在信息敏感度更高的移动应用环境下,用户感知的隐私不确定性更高。本文提出的隐私告知能够有效缓解用户感知的隐私不确定性,并且显著缓解隐私不确定性对App下载意愿的负向影响。 展开更多
关键词 个人信息保护 隐私不确定性 隐私告知 隐私保护
下载PDF
能源区块链的跨链服务安全技术研究进展
17
作者 何云华 罗明顺 +3 位作者 胡晴 吴槟 王超 肖珂 《计算机研究与发展》 EI CSCD 北大核心 2024年第4期1018-1037,共20页
在“双碳”目标推动下,能源产业数字化转型势在必行.随着区块链在能源行业数字化转型应用和发展,能源区块链概念逐渐形成共识,它是区块链与能源互联网深度融合的产业新形态,可助力能源主体之间的高效协作,为绿色低碳等创新业务模式提供... 在“双碳”目标推动下,能源产业数字化转型势在必行.随着区块链在能源行业数字化转型应用和发展,能源区块链概念逐渐形成共识,它是区块链与能源互联网深度融合的产业新形态,可助力能源主体之间的高效协作,为绿色低碳等创新业务模式提供技术支撑与服务.能源区块链的规模化发展离不开多层次跨链技术的突破,但能源区块链的跨链服务还面临着许多问题.将目前能源区块链领域的研究现状分为5类,即能源区块链架构、智能合约应用、跨链技术、区块链节点管理和区块链隐私保护,针对这5个方向分别总结相关研究工作,详细梳理出各研究方案的原理、优势与不足;然后,为促进能源区块链的跨链服务安全技术的发展,根据能源区块链的现实需求,结合监管机制与共识机制提出多层次跨链协同监管的能源区块链架构;最后,总结出能源区块链跨链服务安全技术中亟待解决的问题,并提出区块链在能源领域的研究展望. 展开更多
关键词 能源区块链 监管架构 跨链服务 节点管理 隐私保护
下载PDF
关于现代图书馆信息服务之个性化与常规化的思考
18
作者 孔庆祝 张伟俊 《泰州职业技术学院学报》 2024年第4期77-79,共3页
个性化服务与常规化服务是图书馆信息服务的一体两面,某种程度上说既对立又统一,从时间维度看,某些个性化服务随着技术的发展和服务内容的深化逐渐转化为常规化服务,但总体来说,找到两者最佳结合点,依据各自馆情,合理配置资源,才是服务... 个性化服务与常规化服务是图书馆信息服务的一体两面,某种程度上说既对立又统一,从时间维度看,某些个性化服务随着技术的发展和服务内容的深化逐渐转化为常规化服务,但总体来说,找到两者最佳结合点,依据各自馆情,合理配置资源,才是服务好读者,发展图书馆事业的正确途径。 展开更多
关键词 信息服务 个性化 常规化
下载PDF
基于多场景的智慧图书馆个性化推荐服务模式研究
19
作者 谭璐 何超 《长沙航空职业技术学院学报》 2024年第3期88-91,96,共5页
随着信息技术和互联网的飞速发展,面对海量的信息资源,智慧图书馆的智慧便捷服务显得越来越重要,但适应多场景的即时性、主动性、精准性的个性化推荐服务尚未有效开拓。文章论述了个性化推荐概念及图书馆多场景的特点,指出智慧图书馆个... 随着信息技术和互联网的飞速发展,面对海量的信息资源,智慧图书馆的智慧便捷服务显得越来越重要,但适应多场景的即时性、主动性、精准性的个性化推荐服务尚未有效开拓。文章论述了个性化推荐概念及图书馆多场景的特点,指出智慧图书馆个性化推荐服务的理念原则,提出智慧图书馆个性化推荐服务运行模式,其有场景数据采集分析、读者画像构建、推荐算法设计、信息推荐等四个流程,并给出相应的实施要素参考建议,以期为智慧图书馆服务的发展和优化提供有价值的参考和借鉴。 展开更多
关键词 智慧图书馆 个性化 信息推荐 服务模式
下载PDF
医学图书馆与文化遗产保护和传承——以中山大学孙逸仙纪念医院图书馆为例
20
作者 王海芳 黄铿 +1 位作者 任毅 林世铎 《医院与医学》 2024年第1期31-35,共5页
在“互联网+”和大数据时代,提供医学信息服务和传播医学知识的医学图书馆在实施“健康中国”战略中扮演着举足轻重的角色,尤其是许多历史悠久的百年老院,见证着整个医学文明的发展史。以中山大学孙逸仙纪念医院为例,是中国第一家西医医... 在“互联网+”和大数据时代,提供医学信息服务和传播医学知识的医学图书馆在实施“健康中国”战略中扮演着举足轻重的角色,尤其是许多历史悠久的百年老院,见证着整个医学文明的发展史。以中山大学孙逸仙纪念医院为例,是中国第一家西医医院,中国西医学和西医教育的发源地,其图书馆珍藏着许多古老的医学文献,这些人类瑰宝培育着一代代的医学大家,悬壶济世,不断攀登医学高峰,只为造福人类。因此,保护好这些医学文化瑰宝,探讨医学图书馆与文化遗产保护和传承管理体系,对理论研究和学科建设具有重要意义。 展开更多
关键词 医院图书馆 医学文化遗产 保护传承 数字记录 个性化服务
下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部