The informationization of accounting information systems has brought many improvements to those systems. This paper highlights some of those significant advances in the informationization of accounting information sys...The informationization of accounting information systems has brought many improvements to those systems. This paper highlights some of those significant advances in the informationization of accounting information systems in China. As China has become a major industrial power in the international economy, further improvements for these information systems are critical to the continued successes of China. To additionally improve these systems, China can draw upon the systems from other world economic leaders. With its fully developed capital markets, the United States offers development experience for the external reporting components of a fully integrated information system. This paper discusses a typical integrated information system in the United States and addresses the regulatory milestones that were instrumental in the development of those external components of accounting information systems. Recommendations are presented for improving informationization of systems in China based on U.S. systems' responses to those milestones.展开更多
For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on t...For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to 'the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)'. We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system.展开更多
An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, an...An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed.展开更多
ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information syst...ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system.展开更多
How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncol...How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncology (IHE-RO). This paper presents the research progress for constructing the system in the department of the radiation oncology at Cancer Hospital of Chinese Academy of Medical Sciences, and its system diagram based on IHE-RO technical framework, digital imaging and communication in medicine with radiotherapy (DICOM RT) data flow standard, and emphasizes the importance of DICOM RT in constructing the system and describes the generation process of DICOM RT objects. Finally, the related international standards are suggested on RT devices adopted by China State Food and Drug Administration (SFDA) when the system is constructed.展开更多
In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information tec...In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information technology equipment in a country that does not have a regulatory legislative framework or organized management channels.A methodological approach based on documentary research and semi-directed interviews was adopted in this work.The results showed that 54.55%of institutional managers are unaware of the existence of regulations for the management of WTE,both at the national and international levels;72.72%of these managers do not have a specific implementing text for this management;72.73%of institutions have adopted an acquisition policy based on the needs of workers and 81.82%of institutions store WTE in warehouses.Relations with waste collection SMEs(Small and Midsize Enterprises),especially for IT equipment,are limited for 72.73%of institutions.In terms of improving the capacity to manage WEEE(Waste Electrical and Electronic Equipment),90.91%of institutions do not offer training or awareness raising.Overall,no significant indicators are in place to assess WEEE management in institutions,which reflects a lack of commitment and awareness among institutional managers.In addition,there are no financial means for ecological and sustainable management.Although 27.27%of managers are aware of the dangers to human health and the environment related to IT equipment,they are often unaware of the harmful consequences of abandoning it in nature.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the infor...We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling ∇Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories).展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environment...As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information.展开更多
The MARGov Project consisted in strengthening the interaction among the Professor Luiz Saldanha Marine Park stakeholders, and to collaboratively construct, with social and institutional actors, a governance model for ...The MARGov Project consisted in strengthening the interaction among the Professor Luiz Saldanha Marine Park stakeholders, and to collaboratively construct, with social and institutional actors, a governance model for the Marine Park, located in the municipality of Sesimbra (Portugal). To pursue this goal, a PPGIS (public participation geographic information system) was developed, allowing the interaction, discussion and public participation of the stakeholders and actors involved. This PPGIS emerged as a crowdsourcing tool, with the purpose of assisting the georeferenced contributes from the local users of the Marine Park, regarding several relevant subjects, such as pollution, economic activities, opportunities and threats to the Marine Park, providing visual, analytical, and demonstrative qualities.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
The evolution of the society and economy has stimulated the development of Knowledge Service(KS), making it an indispensable solution to address future challenges facing libraries and information institutions. However...The evolution of the society and economy has stimulated the development of Knowledge Service(KS), making it an indispensable solution to address future challenges facing libraries and information institutions. However at present, academic research on knowledge service is falling short and its definition is far from clear and complete. As such,this article proposes the Three-dimensional Framework Knowledge Service(TdFKS) for libraries and information institutions based on the knowledge value chain model. By making reliability analysis and mean value analysis of a questionnaire survey result, the article clarifies the structure of the three-dimensional framework and verifies the rationality of the TdFKS.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
I. The Unfolding Situation of the Philosophy of Right to Be Informed in China and Early Construction of Government Information Publicity System The origin of the thought,known as China's protection of right to be inf...I. The Unfolding Situation of the Philosophy of Right to Be Informed in China and Early Construction of Government Information Publicity System The origin of the thought,known as China's protection of right to be informed and the construction of government information publicity system展开更多
文摘The informationization of accounting information systems has brought many improvements to those systems. This paper highlights some of those significant advances in the informationization of accounting information systems in China. As China has become a major industrial power in the international economy, further improvements for these information systems are critical to the continued successes of China. To additionally improve these systems, China can draw upon the systems from other world economic leaders. With its fully developed capital markets, the United States offers development experience for the external reporting components of a fully integrated information system. This paper discusses a typical integrated information system in the United States and addresses the regulatory milestones that were instrumental in the development of those external components of accounting information systems. Recommendations are presented for improving informationization of systems in China based on U.S. systems' responses to those milestones.
基金Science and Technology Development Fund Item of Shanghai !(962512006).
文摘For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to 'the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)'. We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system.
文摘An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed.
文摘ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system.
基金Supported by the Foundation for the Cancer Hospital of Chinese Academy of Medical Sciences~~
文摘How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncology (IHE-RO). This paper presents the research progress for constructing the system in the department of the radiation oncology at Cancer Hospital of Chinese Academy of Medical Sciences, and its system diagram based on IHE-RO technical framework, digital imaging and communication in medicine with radiotherapy (DICOM RT) data flow standard, and emphasizes the importance of DICOM RT in constructing the system and describes the generation process of DICOM RT objects. Finally, the related international standards are suggested on RT devices adopted by China State Food and Drug Administration (SFDA) when the system is constructed.
文摘In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information technology equipment in a country that does not have a regulatory legislative framework or organized management channels.A methodological approach based on documentary research and semi-directed interviews was adopted in this work.The results showed that 54.55%of institutional managers are unaware of the existence of regulations for the management of WTE,both at the national and international levels;72.72%of these managers do not have a specific implementing text for this management;72.73%of institutions have adopted an acquisition policy based on the needs of workers and 81.82%of institutions store WTE in warehouses.Relations with waste collection SMEs(Small and Midsize Enterprises),especially for IT equipment,are limited for 72.73%of institutions.In terms of improving the capacity to manage WEEE(Waste Electrical and Electronic Equipment),90.91%of institutions do not offer training or awareness raising.Overall,no significant indicators are in place to assess WEEE management in institutions,which reflects a lack of commitment and awareness among institutional managers.In addition,there are no financial means for ecological and sustainable management.Although 27.27%of managers are aware of the dangers to human health and the environment related to IT equipment,they are often unaware of the harmful consequences of abandoning it in nature.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
文摘We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling ∇Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories).
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
基金an initial progress of the“Research on Improving the Central Supervision System of Ecological and Environmental Protection”(Project No.21ZDA088)a National Social Science Foundation Major Project of the Research on the Interpretation of the Spirit of the Fifth Plenary Session of the 19th CPC Central Committee。
文摘As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information.
文摘The MARGov Project consisted in strengthening the interaction among the Professor Luiz Saldanha Marine Park stakeholders, and to collaboratively construct, with social and institutional actors, a governance model for the Marine Park, located in the municipality of Sesimbra (Portugal). To pursue this goal, a PPGIS (public participation geographic information system) was developed, allowing the interaction, discussion and public participation of the stakeholders and actors involved. This PPGIS emerged as a crowdsourcing tool, with the purpose of assisting the georeferenced contributes from the local users of the Marine Park, regarding several relevant subjects, such as pollution, economic activities, opportunities and threats to the Marine Park, providing visual, analytical, and demonstrative qualities.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
基金supported by the National Planning Office of Philosophy and Social Science(Grant No.06BTQ027)
文摘The evolution of the society and economy has stimulated the development of Knowledge Service(KS), making it an indispensable solution to address future challenges facing libraries and information institutions. However at present, academic research on knowledge service is falling short and its definition is far from clear and complete. As such,this article proposes the Three-dimensional Framework Knowledge Service(TdFKS) for libraries and information institutions based on the knowledge value chain model. By making reliability analysis and mean value analysis of a questionnaire survey result, the article clarifies the structure of the three-dimensional framework and verifies the rationality of the TdFKS.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
文摘I. The Unfolding Situation of the Philosophy of Right to Be Informed in China and Early Construction of Government Information Publicity System The origin of the thought,known as China's protection of right to be informed and the construction of government information publicity system