期刊文献+
共找到6,383篇文章
< 1 2 250 >
每页显示 20 50 100
Research on College Network Information Security Protection in the Digital Economy Era
1
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
下载PDF
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
2
作者 Sami Saad Alsemairi 《Intelligent Information Management》 2023年第4期259-283,共25页
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ... In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors. 展开更多
关键词 Cybersecurity Policies COMPLIANCE protection information and Technology Assets
下载PDF
On the Expansion and Realization of the Right to Environmental Information in Environmental Protection Supervision
3
作者 吴昂 HU Liang 《The Journal of Human Rights》 2023年第2期307-327,共21页
As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environment... As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information. 展开更多
关键词 right to environmental information environmental protection supervision public participation information disclosure
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
4
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law Privacy security Privacy protection will
下载PDF
The Information Protection in Automatic Reconstruction of Not Continuous Geophysical Data Series 被引量:1
5
作者 Osvaldo Faggioni 《Journal of Data Analysis and Information Processing》 2019年第4期208-227,共20页
We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the infor... We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling &#8711Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories). 展开更多
关键词 Geomatic GEOMAGNETISM Not Continuous DATA SERIES Synthetic RECONSTRUCTION protection of the PHYSIC informations DATA Manipulation
下载PDF
Realization of the Function of Basic Rights to Balance Society--taking personal Information Rights as an example
6
作者 马康凤 XU Chao(Translated) 《The Journal of Human Rights》 2023年第6期1224-1250,共27页
The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and de... The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and deals with the dualistic horizontal relationship between“the state and individuals.”However,the increasing com-plexity of modern society has led to the emergence of different inter-ests and needs within society and the formation of new social powers,resulting in an unequal relationship between private subjects.In the digital era,this phenomenon has become particularly prominent,ev-idenced by the rise of data-based power and the frequent and serious intrusion of personal information by private subjects.In this context,the value of basic rights should radiate within society and function as a balancing force.taking the protection of personal information as an example,while innovating the idea of regulating society through basic rights,the state’s obligation to protect personal information should be further strengthened.Meanwhile,the direct effect of personal infor-mation rights,which are basic human rights,on the private subjects of data-based power should be established,so as to realize their function in balancing the interests of all parties in society. 展开更多
关键词 basic rights data-based power protection of per-sonal information direct effect
下载PDF
Compensatory Damages in Personal Information Public Interest Litigation in China: Challenges and Prospects
7
作者 Qi Haixia 《科技与法律(中英文)》 CSSCI 2024年第6期138-148,共11页
In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.How... In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.However,com⁃pensatory damages remain a contentious issue,both in theory and in practice,within the legal framework of personal in⁃formation public interest litigation.Through an empirical study conducted within China's judicial practice,this paper reveals that the pending issue concerning the nature and function of compensatory damages has caused highly contra⁃dictory verdicts regarding their calculation and allocation,as well as their relationship with other forms of pecuniary li⁃abilities.Only by acknowledging the role of compensatory damages imposed in personal information public interest liti⁃gation as"Skimming off Excess Profits",and affirming their function as deterrence rather than compensation can they truly achieve the broader objective of safeguarding personal information security and promoting public welfare,as well as avoid disrupting the harmony of the existing legal landscape. 展开更多
关键词 personal information protection compensatory damages public interest litigation skimming-off excess profits equal liability
下载PDF
Information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City──Application of GIS
8
作者 宋俊高 朱元清 +2 位作者 火恩杰 严大华 杨挺 《Acta Seismologica Sinica(English Edition)》 CSCD 2000年第4期454-465,共12页
For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on t... For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to 'the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)'. We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system. 展开更多
关键词 Geographical information System (GIS) protection against earthquake and disaster reduction evaluation of earthquake damage loss emergence decision
下载PDF
Empirical Research on Factors Influencing Level of Environmental Protection Information Disclosure in Annual Reportsby Listed Companies
9
作者 Zhu Jinfeng Xue Huifeng 《Chinese Journal of Population,Resources and Environment》 2009年第1期15-22,共8页
Taking 248 A-share manufacturing listed companies in 2006 Shanghai Stock Exchange as example, using "index method" to measure level of environmental protection infor-mation disclosure, this paper examines th... Taking 248 A-share manufacturing listed companies in 2006 Shanghai Stock Exchange as example, using "index method" to measure level of environmental protection infor-mation disclosure, this paper examines the factors influencing level of environmental protection information disclosure. The findings show that the disclosure level has improved, but the overall level is still low and unable to satisfy information users; there is positive correlation between corporate size, industry type, accounting firm's type and corporate environmental dis-closure index. The companies of large scale and heavy pollu-tion and those audited by international "Big 4" and domestic "Big 10" accounting firms have a high level of environmental disclosure, while the profitability and financial leverage has no impact on the disclosure level. Finally some suggestions are put forward to establish environmental information disclosure sys-tem in China. 展开更多
关键词 environmental protection information information disclosure index method signal theory
下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
10
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 PSEUDORANDOM SEQUENCES NON-LINEAR FEEDBACK FUNCTION information protection
下载PDF
Lightning Protection for the Computer Room of Electronic Information Systems
11
作者 Xuanying XIE Yiping LIN +1 位作者 Liqing ZHOU Liwen YE 《Meteorological and Environmental Research》 CAS 2022年第3期71-73,共3页
An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, an... An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed. 展开更多
关键词 Electronic information system Lightning protection grounding Grounding design
下载PDF
Ideas of establishing the information system for emergence decisions on the protection against earthquakes and disaster reduction in cities (application of GIS)
12
作者 宋俊高 朱元清 +1 位作者 严大华 夏从俊 《Acta Seismologica Sinica(English Edition)》 CSCD 1998年第2期112-121,共10页
ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information syst... ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system. 展开更多
关键词 Geographical information System\ protection against earthquake and disaster reduction evaluation of earthquake disaster loss\ emergency decision
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
13
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
14
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
The Model Selection of Personal Information Protection in Criminal Procedures
15
作者 吴桐 SU Yilong(Translated) 《The Journal of Human Rights》 2022年第3期462-482,共21页
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac... In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system. 展开更多
关键词 personal information basic rights Personal information protection Law dependency protection
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
16
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the protection of the Right of Communication through information Network
下载PDF
On China's Protection of Citizens' Right to Be Informed and Construction of Government Information Publicity System
17
作者 ZHAO ZHENGQUN 《The Journal of Human Rights》 2011年第2期22-26,共5页
I. The Unfolding Situation of the Philosophy of Right to Be Informed in China and Early Construction of Government Information Publicity System The origin of the thought,known as China's protection of right to be inf... I. The Unfolding Situation of the Philosophy of Right to Be Informed in China and Early Construction of Government Information Publicity System The origin of the thought,known as China's protection of right to be informed and the construction of government information publicity system 展开更多
关键词 Right to Be Informed and Construction of Government information Publicity System On China’s protection of Citizens BE
下载PDF
Preliminary Analysis of the Protection of Privacy in the Information Network Age
18
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the protection of Privacy in the information Network Age
下载PDF
The Analysis and Research Based on DEA Model and Super Efficiency DEA Model for Assessment of Classified Protection of Information Systems Security
19
作者 Jing Gao Yongiun Shen Guidong Zhang Qi Zhou 《计算机科学与技术汇刊(中英文版)》 2014年第4期140-145,共6页
关键词 安全等级保护 DEA模型 信息系统 评估模型 系统安全管理 决策单元 数据包络分析 DEA方法
下载PDF
Research on the Legality of Information Utilization in Epidemic Prevention and Control
20
作者 Chen Yumei 《学术界》 CSSCI 北大核心 2020年第5期193-200,共8页
Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divi... Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divided into general information and sensitive information,and the use of sensitive information should take"Consent"as its legality basis.In the process of personal information collection,the subject qualification of the collection organization or personnel should be clearly defined,and the starting conditions and process specifications of the collection work should be determined.The use of personal information should be in accordance with legal provisions or agreed ways and purposes and should not violate individual privacy rights and other personality rights,and should not improperly display the"digital image"of individuals. 展开更多
关键词 pandemic prevention and control personal information protection LEGALITY consent
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部