期刊文献+
共找到1,775篇文章
< 1 2 89 >
每页显示 20 50 100
Research on College Network Information Security Protection in the Digital Economy Era
1
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
3
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
The Analysis and Research Based on DEA Model and Super Efficiency DEA Model for Assessment of Classified Protection of Information Systems Security
4
作者 Jing Gao Yongiun Shen Guidong Zhang Qi Zhou 《计算机科学与技术汇刊(中英文版)》 2014年第4期140-145,共6页
关键词 安全等级保护 DEA模型 信息系统 评估模型 系统安全管理 决策单元 数据包络分析 DEA方法
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
5
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law Privacy security Privacy protection will
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
6
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 information warfare Proactive security Intrusion tolerant DSPS(Database security and protection System)
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
7
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information Hiding Key Exchange MODULAR ELLIPTIC Curve secure Communication
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
8
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
Techniques for Hiding Mobile Node's Location Movement Information in Mobile IP
9
作者 Robert H.DENG 《China Communications》 SCIE CSCD 2007年第1期85-94,共10页
Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement... Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement can be tracked by simply monitoring the IP addresses in IP packets.Recently, the issue of protecting location information in Mobile IP has received increasing attention,especially within the IETF and the 3GPP standard bodies.In this paper we propose a technique for hiding a mobile node’s location movement information from eavesdroppers during route optimization and as well as from its correspondent node during reverse tunneling. The proposed technique is highly efficient and fully compatible with the base Mobile IPv6 operation. 展开更多
关键词 security pricacy protection LOCATION information MOBILE IP
下载PDF
Privacy,National Security,and Internet Economy:An Explanation of China's Personal Information Protection Legislation
10
作者 QU Bo HUO Changxu 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期339-366,共28页
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc... With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation. 展开更多
关键词 LEGISLATION personal information protection national security internet industry PRIVACY cybersecurity law
原文传递
智慧校园一卡通系统安全防护策略 被引量:2
11
作者 王利巧 买若毅 《办公自动化》 2024年第6期25-28,共4页
高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校... 高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校园卡结构、终端安全、数据存储安全、数据传输安全、数据库安全等几个方面构建相应的安全策略,为高校智慧校园一卡通信息系统的安全建设和管理提供理论借鉴。 展开更多
关键词 智慧校园 一卡通系统 信息安全 防护策略
下载PDF
跨层次视角下信息安全氛围对员工信息安全制度遵守意愿的影响作用
12
作者 李文琴 刘荣敏 +1 位作者 孙林辉 高杰 《科学技术与工程》 北大核心 2024年第8期3479-3487,共9页
员工安全遵守行为已成为保护企业信息资产安全的重要保障。侧重人因因素,讨论如何通过有效方法来规范和引导员工遵守信息安全制度。基于保护动机理论(protection motivation theory,PMT)和社会认知理论,采用跨层次分析方法,以员工信息... 员工安全遵守行为已成为保护企业信息资产安全的重要保障。侧重人因因素,讨论如何通过有效方法来规范和引导员工遵守信息安全制度。基于保护动机理论(protection motivation theory,PMT)和社会认知理论,采用跨层次分析方法,以员工信息安全制度遵守意愿为因变量,信息安全氛围为组织层面变量,感知严重性、感知易感性、反应效能和自我效能为个体层面变量构建研究模型。借鉴成熟量表设计问卷,发放问卷并获取有效数据,应用SPSS 26.0软件对研究模型进行假设验证。实证结果表明:感知严重性、感知易感性、反应效能和自我效能均正向影响员工信息安全制度遵守意愿;信息安全氛围跨层次既能直接影响员工信息安全制度遵守意愿,又可通过个体层面变量对结果变量产生影响作用。为强化企业安全管理提供一定的理论支撑。 展开更多
关键词 信息安全氛围 保护动机理论(PMT) 跨层次分析 信息安全制度遵守意愿
下载PDF
基于区块链的农产品供应链溯源研究综述
13
作者 胡祥培 都牧 +2 位作者 孔祥维 朱姗 张源凯 《管理科学学报》 CSCD 北大核心 2024年第5期1-12,共12页
中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块... 中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块链的农产品供应链溯源系统的实际需求以及应用实践出发,对区块链技术及应用、区块链中的隐私保护与农产品信息安全、信任传递与融合方法这三个方面对国内外相关研究进行综述,并据此提出我国建设这类溯源系统的两个核心难题--“如何建”和“如何查”.针对这两个难题,从管理科学视角各提出四类关键科学问题,展望未来研究的发展趋势,并从应用实践层面提出基于区块链的农产品供应链溯源系统的发展建议. 展开更多
关键词 农产品供应链 区块链 质量追溯 隐私保护与信息安全 信任传递与融合
下载PDF
基于TOPSIS和GRA的信息安全风险评估
14
作者 马冬青 崔涛 《信息安全研究》 CSCD 北大核心 2024年第5期474-480,共7页
信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估... 信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估时,采用熵权法进行客观的指标赋权,并结合优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)和灰色关联分析(grey relational analysis,GRA)进行综合评估.实例分析表明,依据信息熵进行客观赋权相对减少了主观因素的影响;基于TOPSIS和GRA进行信息安全风险评估,综合被评价对象整体因素和内部因素,较有效地将多项信息安全风险评估指标综合成单一评分,便于对多个被评对象进行信息安全风险的择优与排序. 展开更多
关键词 信息安全 风险评估 优劣解距离法 灰色关联分析 等级保护
下载PDF
个人信息安全影响评估标准在支付业务领域的应用实践
15
作者 华锦芝 呼如生 +3 位作者 刘磊 欧阳琛 吴彦涵 钟伟 《信息技术与标准化》 2024年第S01期187-190,共4页
围绕《中华人民共和国个人信息保护法》提出的个人信息保护影响评估要求,遵循GB/T 39335—2020《信息安全技术个人信息安全影响评估指南》,构建符合企业业务实际的个人信息保护影响评估体系,通过评估业务或产品对个人的自主选择权、财... 围绕《中华人民共和国个人信息保护法》提出的个人信息保护影响评估要求,遵循GB/T 39335—2020《信息安全技术个人信息安全影响评估指南》,构建符合企业业务实际的个人信息保护影响评估体系,通过评估业务或产品对个人的自主选择权、财产权、公平权等权益的影响程度以及个人信息全生命周期安全保护措施的适应性,并配套管理制度和平台工具,提前识别并降低业务可能存在的个人信息安全风险,主要应用在转接清算、二维码支付、无卡支付等各种支付业务场景且取得良好效果。 展开更多
关键词 个人信息保护法 GB/T 39335—2020 个人信息安全影响评估 支付业务
下载PDF
基于VOSviewer的测评机构市场竞争特征分析模型的构建
16
作者 王云丽 杨文焕 +2 位作者 邵云霞 成彬 陈志宾 《现代信息科技》 2024年第7期151-160,共10页
网络安全等级保护在网络安全保障、网络强国建设方面发挥着至关重要的作用。随着资质管理从审核推荐模式向服务认证模式的转变,网络安全等级保护测评机构的资质管理得到网络安全界越来越多的关注。在分析网络安全等级保护测评机构投标... 网络安全等级保护在网络安全保障、网络强国建设方面发挥着至关重要的作用。随着资质管理从审核推荐模式向服务认证模式的转变,网络安全等级保护测评机构的资质管理得到网络安全界越来越多的关注。在分析网络安全等级保护测评机构投标项目信息的基础上,应用VOSviewer知识图谱软件构建一种市场竞争特征分析模型,为等级测评行业的高质量发展提供参考借鉴。首先对采集数据进行清洗以及基于相似度去重;然后采用机器学习算法对项目信息进行“关键词”(项目类型、项目所属行业)的抽取和标注;最后将项目信息进行RefWorks格式转换并导入VOSviewer,可视化呈现测评机构的竞争关系和市场特征。 展开更多
关键词 网络安全等级保护测评机构 VOSviewer 项目信息 市场竞争特征 模型构建
下载PDF
美国数据泄露通知制度研究
17
作者 于增尊 王羽 《红河学院学报》 2024年第3期119-123,129,共6页
为应对日益频繁的数据泄露事件,具有及时止损功能的数据泄露通知制度逐渐受到各法治国家的重视。美国是世界上最早确立数据泄露通知制度的国家,截至2018年,其50个州均颁布了数据泄露通知法,内容涉及触发条件、通知流程、处罚机制等诸多... 为应对日益频繁的数据泄露事件,具有及时止损功能的数据泄露通知制度逐渐受到各法治国家的重视。美国是世界上最早确立数据泄露通知制度的国家,截至2018年,其50个州均颁布了数据泄露通知法,内容涉及触发条件、通知流程、处罚机制等诸多方面。通过对美国各州立法的考察,可以为我国的数据泄露通知制度立法提供借鉴。在立法模式层面,国家应出台详尽的数据泄露通知规范;在立法理念层面,应在保护消费者权益的同时兼顾数据处理者的利益;在立法技术层面,应当从触发条件、通知流程、处罚机制等方面制定系统完善的数据泄露通知规则。 展开更多
关键词 数据泄露 数据泄露通知 美国 数据安全法 个人信息保护法
下载PDF
高校教务管理系统安全防范研究
18
作者 张铭军 《信息与电脑》 2024年第11期121-123,共3页
信息技术的广泛应用显著提高了高校教务管理系统的效率。然而,这也给系统的信息安全带来了新的挑战。网络攻击、数据泄露和未授权访问等威胁不断增加,对信息安全防护措施提出了更高的要求。文章通过分析现有的网络安全技术,探讨如何通... 信息技术的广泛应用显著提高了高校教务管理系统的效率。然而,这也给系统的信息安全带来了新的挑战。网络攻击、数据泄露和未授权访问等威胁不断增加,对信息安全防护措施提出了更高的要求。文章通过分析现有的网络安全技术,探讨如何通过综合安全管理、数据保护和风险管理策略来强化高校教务管理系统的计算机网络信息安全。 展开更多
关键词 计算机网络 信息安全 防护措施
下载PDF
高校数字档案信息安全防护策略研究
19
作者 郑新兴 《办公自动化》 2024年第2期58-60,共3页
随着信息技术的发展,档案数字化管理应用越来越广泛。因数字档案依托信息技术,导致档案管理面临病毒的入侵、存储介质不稳定等新的安全问题,这制约数字档案的信息安全。为保障电子档案信息的安全,文章以高校数字档案信息安全为研究对象... 随着信息技术的发展,档案数字化管理应用越来越广泛。因数字档案依托信息技术,导致档案管理面临病毒的入侵、存储介质不稳定等新的安全问题,这制约数字档案的信息安全。为保障电子档案信息的安全,文章以高校数字档案信息安全为研究对象,重点研究高校电子档案信息安全保障方案,首先拟就高校数字档案信息安全的研究现状、影响因素、存在问题,然后分析高校数字档案的具体防护策略,希望能为高校数字档案信息的安全防护提供针对性和建设性的策略选择。 展开更多
关键词 高校 数字档案信息 安全防护 策略
下载PDF
卫生智库的信息网络安全建设探讨
20
作者 施骏 《科学与信息化》 2024年第7期187-189,共3页
目的:探索信息网络安全在卫生智库建设中的作用,为助力卫生智库信息网络安全建设提供参考建议;方法:通过文献综述的方法,对国内卫生智库信息网络安全现状进行分析;结果:我国卫生智库信息网络安全目前存在意识淡薄、措施薄弱、专业人员... 目的:探索信息网络安全在卫生智库建设中的作用,为助力卫生智库信息网络安全建设提供参考建议;方法:通过文献综述的方法,对国内卫生智库信息网络安全现状进行分析;结果:我国卫生智库信息网络安全目前存在意识淡薄、措施薄弱、专业人员配置欠缺、制度不完善等问题;结论:明确卫生智库信息网络安全建设的方向、增强信息网络安全防护措施、加强信息网络安全人才队伍建设。 展开更多
关键词 卫生智库 信息网络安全 防护措施
下载PDF
上一页 1 2 89 下一页 到第
使用帮助 返回顶部