首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
蓝雪芬 《大众科技》2009,(4):22-23,17
网络黑客是一种通过网络对计算机用户进行入侵和攻击,破坏或非法窃取计算机用户信息,从事犯罪活动,是目前网络安全的一大威胁。如防范黑客的攻击,是网络安全必须思考的重要问题。文章从黑客入侵的手段及入侵后的特征出发,分析了几种常见的黑容攻击及其防范的方法,以免受到黑客的入侵和攻击。  相似文献   

2.
数字化图书馆网络安全策略   总被引:23,自引:0,他引:23  
数字图书馆依托网络环境传输数字化信息。因此对网络黑客防范和服务器安全管理必不可少,文中提出七点措施可使数字图书馆服务器的运行安全率达到85%。  相似文献   

3.
网络黑客通过网络对计算机用户进行入侵和攻击,破坏或非法窃取计算机用户信息,从事犯罪活动,是目前网络安全的一大威胁。网络时代网络黑客与信息传播的关系,是网络安全必须思考的问题。本文在网络黑客的概念及其特点的基础上,分析了网络黑客对信息传播的影响,旨在广大网络用户能够做好抵御措施,防止黑客攻击。  相似文献   

4.
在信息时代,计算机网络系统的安全、可靠性成为用户最为关注的焦点。而各类不安全因素中,又属黑客攻击最为棘手,认真研究当今黑客入侵的手段及其相应的防范对策,对计算机网络用户提供安全是很有必要的,该文对黑客常用的攻击手段进行了较为全面地剖析,并提出了防范黑客的一些可行性措施。  相似文献   

5.
霍汉强 《大众科技》2007,(11):69-70
在信息时代,计算机网络系统的安全、可靠性成为用户最为关注的焦点.而各类不安全因素中,又属黑客攻击最为棘手,认真研究当今黑客入侵的手段及其相应的防范对策,对计算机网络用户提供安全是很有必要的,该文对黑客常用的攻击手段进行了较为全面地剖析,并提出了防范黑客的一些可行性措施.  相似文献   

6.
赵俊来 《情报探索》2014,(11):53-57
依据现行法律的有关规定,对用户信息的法律界定进行了分析,并就通信企业收集、存储、查询、使用和废弃用户信息的管理环节中可能发生的问题进行了梳理。从法律风险防范的角度提出规范管理的建议:加强宣传教育,增强用户信息保护法律意识;完善管理制度,构建用户信息保护管理体系;优化管理流程,防范用户信息保护法律风险;运用技术手段,提升用户信息管理IT化水平;强化监督引导,规范合作伙伴用户信息管理。  相似文献   

7.
最近频频发生的网站注册用户信息被黑客盗取事件,给互联网带来了挑战,网民个人信息安全受到严重威胁。现就如何防治网站用户密码泄露问题进行分析。  相似文献   

8.
本文主要从黑客入侵的技术中如何掩盖其行踪,达到保护自己目的,为大家查找入侵途径及防范入侵提供帮助。  相似文献   

9.
蔡颢 《科协论坛》2007,(8):391-392
随着黑客对政府网站的频频攻击,如何保障政府网站信息安全以及系统安全成为电子政务发展的重中之重。本文通过对电子政务黑客之危及黑客主要攻击方式的简析,拟从安全防范、安全管理、财政保障、法律规范四个方面入手提出防范黑客攻击之路径依赖。  相似文献   

10.
通过对Google、淘宝等网站界面的视觉交互设计特征包括色彩,信息呈现方式和交互操作方式等的分析,综合讨论了网站的视觉交互设计的现状和存在的问题,以及如何设计能够更好的吸引并留住用户。  相似文献   

11.
Journalists, emergency responders, and the general public use Twitter during disasters as an effective means to disseminate emergency information. However, there is a growing concern about the credibility of disaster tweets. This concern negatively influences Twitter users’ decisions about whether to retweet information, which can delay the dissemination of accurate—and sometimes essential—communications during a crisis. Although verifying information credibility is often a time-consuming task requiring considerable cognitive effort, researchers have yet to explore how people manage this task while using Twitter during disaster situations.To address this, we adopt the Heuristic-Systematic Model of information processing to understand how Twitter users make retweet decisions by categorizing tweet content as systematically processed information and a Twitter user’s profile as heuristically processed information. We then empirically examine tweet content and Twitter user profiles, as well as how they interact to verify the credibility of tweets collected during two disaster events: the 2011 Queensland floods, and the 2013 Colorado floods. Our empirical results suggest that using a Twitter profile as source-credibility information makes it easier for Twitter users to assess the credibility of disaster tweets. Our study also reveals that the Twitter user profile is a reliable source of credibility information and enhances our understanding of timely communication on Twitter during disasters.  相似文献   

12.
With the increasing provenance of hedonic and social information systems, systems are observed to employ other forms of feedback and design than purely informational in order to increase user engagement and motivation. Three principle classes of motivational design pursuing user engagement have become increasingly established; gamification, quantified-self and social networking. This study investigates how the perceived prominence of these three design classes in users’ use of information system facilitate experiences of affective, informational and social feedback as well as user’s perceived benefits from a system and their continued use intentions. We employ survey data (N = 167) gathered from users of HeiaHeia; an exercise encouragement system that employs features belonging to the three design classes. The results indicate that gamification is positively associated with experiences of affective feedback, quantified-self with experiences of both affective and informational feedback and social networking with experiences of social feedback. Experiences of affective feedback are further strongly associated with user perceived benefits and continued use intentions, whereas experiences of informational feedback are only associated with continued use intentions. Experiences of social feedback had no significant relationship with neither. The findings provide practical insights into how systems can be designed to facilitate different types of feedback that increases users’ engagement, benefits and intentions to continue the use of a system.  相似文献   

13.
Pre-adoption expectations often serve as an implicit reference point in users’ evaluation of information systems and are closely associated with their goals of interactions, behaviors, and overall satisfaction. Despite the empirically confirmed impacts, users’ search expectations and their connections to tasks, users, search experiences, and behaviors have been scarcely studied in the context of online information search. To address the gap, we collected 116 sessions from 60 participants in a controlled-lab Web search study and gathered direct feedback on their in-situ expected information gains (e.g., number of useful pages) and expected search efforts (e.g., clicks and dwell time) under each query during search sessions. Our study aims to examine (1) how users’ pre-search experience, task characteristics, and in-session experience affect their current expectations and (2) how user expectations are correlated with search behaviors and satisfaction. Our results with both quantitative and qualitative evidence demonstrate that: (1) user expectation is significantly affected by task characteristics, previous and in-situ search experience; (2) user expectation is closely associated with users’ browsing behaviors and search satisfaction. The knowledge learned about user expectation advances our understanding of users’ search behavioral patterns and their evaluations of interaction experience and will also facilitate the design, implementation, and evaluation of expectation-aware user models, metrics, and information retrieval (IR) systems.  相似文献   

14.
病毒破坏和黑客攻击是目前网络中危害电脑系统的两大不安全因素。黑客是破坏网络安全的根源。建立完善的保护系统,有效地防范黑客的恶意攻击,是维护电脑安全的根本所在。  相似文献   

15.
针对如何促进信息服务领域用户对信息技术以及信息系统有效接受的问题,从人机交互的角度对影响因素进行探索性研究。首先分析影响用户技术接受的因素,将其分为用户、系统、服务方面;其次,根据这些影响因素进行实地调研与分析,得出修订后的用户技术接受影响因素。  相似文献   

16.
While users’ discontinuance of use has posed a challenge for social media in recent years, there is a paucity of knowledge on the relationships between different dimensions of overload and how overload adversely affects users’ social media discontinuance behaviors. To address this knowledge gap, this study employed the stressor–strain–outcome (SSO) framework to explain social media discontinuance behaviors from an overload perspective. It also conceptualized social media overload as a multidimensional construct consisting of system feature overload, information overload, and social overload. The proposed research model was empirically validated via 412 valid questionnaire responses collected from Facebook users. Our results indicated that the three types of overload are interconnected through system feature overload. System feature overload, information overload, and social overload engender user exhaustion, which in turn leads to users’ discontinued usage of social media. This study extends current technostress research by demonstrating the value of the SSO perspective in explaining users’ social media discontinuance.  相似文献   

17.
To improve search engine effectiveness, we have observed an increased interest in gathering additional feedback about users’ information needs that goes beyond the queries they type in. Adaptive search engines use explicit and implicit feedback indicators to model users or search tasks. In order to create appropriate models, it is essential to understand how users interact with search engines, including the determining factors of their actions. Using eye tracking, we extend this understanding by analyzing the sequences and patterns with which users evaluate query result returned to them when using Google. We find that the query result abstracts are viewed in the order of their ranking in only about one fifth of the cases, and only an average of about three abstracts per result page are viewed at all. We also compare search behavior variability with respect to different classes of users and different classes of search tasks to reveal whether user models or task models may be greater predictors of behavior. We discover that gender and task significantly influence different kinds of search behaviors discussed here. The results are suggestive of improvements to query-based search interface designs with respect to both their use of space and workflow.  相似文献   

18.
Inferring users’ interests from their activities on social networks has been an emerging research topic in the recent years. Most existing approaches heavily rely on the explicit contributions (posts) of a user and overlook users’ implicit interests, i.e., those potential user interests that the user did not explicitly mention but might have interest in. Given a set of active topics present in a social network in a specified time interval, our goal is to build an interest profile for a user over these topics by considering both explicit and implicit interests of the user. The reason for this is that the interests of free-riders and cold start users who constitute a large majority of social network users, cannot be directly identified from their explicit contributions to the social network. Specifically, to infer users’ implicit interests, we propose a graph-based link prediction schema that operates over a representation model consisting of three types of information: user explicit contributions to topics, relationships between users, and the relatedness between topics. Through extensive experiments on different variants of our representation model and considering both homogeneous and heterogeneous link prediction, we investigate how topic relatedness and users’ homophily relation impact the quality of inferring users’ implicit interests. Comparison with state-of-the-art baselines on a real-world Twitter dataset demonstrates the effectiveness of our model in inferring users’ interests in terms of perplexity and in the context of retweet prediction application. Moreover, we further show that the impact of our work is especially meaningful when considered in case of free-riders and cold start users.  相似文献   

19.
[目的/意义]探索信息技术背景下用户量化自我持续参与意愿的影响因素及其作用机制,为提升用户的健康行为意愿提供合理的理论支撑.[方法/过程]基于用户感知视角,以技术接受模型为理论基础,运用问卷调查方法收集数据,利用SPSS软件和AMOS软件进行数据分析,建立了用户量化自我持续参与意愿影响因素模型.[结果/结论]感知有用性...  相似文献   

20.
本文将同侪影响引入在线创新社区的用户行为研究中,从广度和深度两方面考察同侪影响对用户贡献行为的影响,并分析感知收益的中介作用。研究以小米社区MIUI功能与讨论区的创意集市板块为对象构建S-O-R模型,采用6567名用户发布的8830条创意、5.26万条评论和收到的103.36万条评论数据,利用Mplus8.1分析检验,结果发现:同侪影响广度与深度均有利于促进用户贡献行为,综合收益在同侪影响广度、深度与用户贡献行为间起正向中介效应,情感收益仅在同侪影响广度、深度与主动贡献行为间起正向中介效应,而认知收益则在同侪影响深度与反应贡献行为间起负向中介效应。研究拓展了在线网络情境下知识管理与社会学领域的交叉研究,并为在线创新社区社交网络和知识管理提供重要启示。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号