首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 421 毫秒
1.
李力 《现代情报》2005,25(11):24-26
文章分析了网络信息隐私问题突出的原因,论述了保护网络信息隐私的意义,重点介绍并分析了国外典型的一些网络信息隐私保护法的情况,最后阐述了其对我国立法工作的启示。  相似文献   

2.
网络环境下的隐私与隐私保护   总被引:3,自引:0,他引:3  
刘一兵 《情报科学》2003,21(6):605-608
网络隐私问题已经引起学术界的广泛关注,本文首先分析了网络隐私产生的四种渠道和侵害网络隐私的四种可能方式,然后研究了网络隐私保护的行业自律措施和立法保护措施,最后就我国的网络隐私保护问题给出了建设性的意见。  相似文献   

3.
网络隐私问题研究综述   总被引:2,自引:0,他引:2  
随着计算机的广泛使用和网络技术的不断进步,在网络交易过程中收集、利用和出售个人隐私数据的现象十分普遍.网络隐私的侵犯问题已成为信息社会的最大困扰之一,如何有效地保护个人的网络隐私成为亟待解决的问题.本文首先介绍了网络隐私保护的出现及其发展;其次,对网络隐私的价值问题以及电子商务中的信任问题进行讨论,重点探讨了目前网络隐私保护的4种方式;最后给出了网络隐私问题未来的研究方向.  相似文献   

4.
网络隐私的概念、研究进展及趋势   总被引:2,自引:0,他引:2  
回顾了网络隐私的相关概念,并对其进行了界定;对消费者网络隐私关注、网络隐私行为意向、网络隐私关注和行为的影响因素这三个优先领域的研究进展进行了总结;最后讨论了网络隐私的研究趋势和前景。  相似文献   

5.
网络隐私与保护策略   总被引:6,自引:0,他引:6  
胡冰 《现代情报》2003,23(7):69-71
本文分析了网络隐私的表现形式、受侵害现状、保护现状.提出了网络隐私的保护策略。  相似文献   

6.
崔丽  吴迪 《科技风》2015,(5):18
本文介绍了网络隐私的主要内容,分析了网络隐私侵权的表现,提出了保护互联网络隐私的一些建议。  相似文献   

7.
本文阐述了网络环境下图书馆用户隐私与隐私侵权的特点.指出了我国现行法律法规对隐私权保护的相对不足,并提出了一些在网络环境下加强图书馆用户隐私权法律保护的对策。  相似文献   

8.
美国网络隐私权法律保护   总被引:2,自引:0,他引:2  
徐瑾 《现代情报》2005,25(6):222-223,F003
介绍了网络隐私权的内容,用数据分析了网络隐私保护的必要性,阐述了美国隐私权法包括网络隐私权法并得出相应的结论,希望对我国尚未颁布的网络隐私权法起到借鉴作用。  相似文献   

9.
范靖  王恩界 《中国科技纵横》2011,(12):127-127,5
在这个多元化价值观的网络社会,人们开始喜欢在网上去窥探他人的隐私:通过对网络隐私的相关了解,探讨网民的窥私欲心理,并提出保护网络隐私的一些方法:  相似文献   

10.
网络隐私顾虑被认为是阻碍用户披露个人信息的重要影响因素并越来越受到学术界的重视。鉴于隐私是与情境相联系的多维、动态的概念,情境的变化会影响用户对隐私的理解,本文结合现实背景提出了电子商务环境下网络隐私顾虑的理论概念,在以往研究的基础上确定了网络隐私顾虑的构成维度,开发出初始的测量指标,然后通过3套独立的样本数据进行探索式因子分析、验证式因子分析和关联效度分析。结果表明量表具有良好的信度和效度,网络隐私顾虑由控制、收集、二次使用、错误、不当访问与补救5个维度和19个题项构成。  相似文献   

11.
网络环境下个人信息安全与隐私问题的探析   总被引:7,自引:1,他引:7  
颜祥林 《情报科学》2002,20(9):937-940
随着互联网的发展,关于个人信息安全方面的问题已经越来越受到人们的关注,个人信息安全实际上强调的是隐私权的保护,本文分别从个人数据和私人生活安宁的两个角度,分析目前网络环境下存在的侵犯隐私权的若干情形。  相似文献   

12.
王丽明 《科技广场》2012,(3):250-253
随着经济的发展和互联网的普及,在电子商务环境下,侵犯消费者隐私权的事件日益增多,引起了业内的广泛关注。本文主要论述了在电子商务环境下消费者隐私权保护的问题,并在分析问题后提出了相应的解决方法。  相似文献   

13.
Based on the Elaboration Likelihood Model (ELM), this study identifies the differences between perceived privacy risks and privacy concern. Furthermore, the study analyses how perceived privacy risks and privacy concerns affect the disclosure intention and the actual information disclosure behavior of Internet users. In addition, the study discusses the moderating effects of platform types, from the perspective of privacy elaboration likelihood. By applying meta-analyses and SEM on 104 independent studies with 42,256 samples from existing empirical studies, we attempt to systematically reveal the relationship between privacy cognition and information disclosure. The results show that perceived privacy risks can significantly reduce personal information disclosure intention, as well as actual information disclosure behavior. However, privacy concerns only affect disclosure intention, but do not have a significant effect on actual information disclosure behavior. The study also verified that platform types have moderating effects on the privacy decision making of Internet users. The findings yield important and useful implications, both for research and for practice.  相似文献   

14.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

15.
In the United States, Congress has had a long-standing interest in consumer privacy and the extent to which company practices are based on fair information practices. Previously, public policy was largely informed by anecdotal evidence about the effectiveness of industry self-regulatory programs. However, the Internet has made it possible to unobtrusively sample web sites and their privacy disclosures in a way that is not feasible in the offline world. Beginning in 1998, the Federal Trade Commission relied upon a series of three surveys of web sites to assess whether organizations post online privacy disclosures and whether these disclosures represent the U.S. definition of fair information practices. While each year's survey has provided an important snapshot of U.S. web-site practices, there has been no longitudinal analysis of the multiyear trends. This study compares a subset of equivalent individual-level web-site data for the 1998, 1999, 2000, and 2001 web surveys. Implications for using this type of research to inform public policy are discussed.  相似文献   

16.
尊重隐私、保护隐私已逐渐被现实社会所认同,然而对为什么要保护隐私以及隐私的价值仍各有歧见。西方社会对隐私保护的辩护主要有绝对价值论和相对价值论两种思路,两种思路都是从自由主义和个人主义的角度出发的,与以集体主义为背景的中国社会不相符合。在集体主义的框架内,也能对隐私的保护提供有力的辩护。保护隐私不仅能增加个体的福利,而且能增进社会的总体福利,促进社会和谐。  相似文献   

17.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

18.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, "Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference." It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions.  相似文献   

19.
Anonymous communication on the Internet offers new opportunities but has ill-understood risks. This article helps to ground the policy debates by examining some fundamental aspects of anonymous social behavior and current controversies over anonymous communications. It is a companion to the article in this issue, "Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference." It examines the social character of anonymous communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. It also explains some of the new technological supports for anonymous communication on the Internet. The openness, decentralization, and transnational character of the Internet challenge the efficacy of traditional control mechanisms and have raised issues related to accountability, law enforcement, security and privacy, governmental empowerment, and e-commerce. Yet, to ban or restrict all anonymous communication online because of the harms it could bring would deny its benefits to those people who may legitimately gain from it. This article helps to understand how to balance these positions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号