共查询到20条相似文献,搜索用时 78 毫秒
1.
基于大数据的图书馆用户个性化隐私保护策略 总被引:1,自引:0,他引:1
近年来,用户隐私保护问题已成为大数据时代图书馆的研究热点,用户数据隐私保护的意义显得尤为重要。本文介绍了大数据时代图书馆用户隐私保护问题的研究背景,提出了一种基于大数据的图书馆用户个性化隐私保护策略,从隐私政策、隐私保护技术、数据可用性分析和图书馆监管4个重要方面,对图书馆用户的隐私保护问题进行了分析与总结。 相似文献
2.
大数据浪潮在全球范围内呈愈演愈烈的趋势。既有的隐私乱象在灵活多变的大数据影响下,会受到更多的挑战,但同时,大数据也为个人隐私的妥善处理与保护带来了多种可能,危机与机遇并存。全文从新的视角出发,运用哲学的思维,采取以定性论述为主,定量建模为辅的方法,重新探讨信息的时效性,并针对现有的隐私问题逐一进行探究,并分别提出相应的对策。隐私问题不仅关乎个人,更关乎国家,良好的隐私意识和智慧保护技术都将保证现有的隐私问题最终得以妥善解决。 相似文献
3.
针对大数据环境下用户信息隐私泄露问题,论文首先分析当前用户信息隐私保护的现状与趋势,并指出当前用户信息隐私保护存在的问题;然后通过典型案例、统计分析和系统分析等手段,研究大数据环境下用户信息隐私泄露的发生机制和成因;最后聚焦用户信息隐私泄露的成因,分析研究用户信息隐私保护的关键社会方法与技术方法,并构建用户信息隐私保护的社会技术模型以及优化策略。 相似文献
4.
针对"大数据"背景下,我国数据隐私法律缺失的现状,本文以日本数据隐私法律为研究对象,介绍了日本目前2部数据隐私保护适用法律——《个人信息保护法案》和《"通用号码"法案》,从数据操作规定、数据服务规定、执行处罚规定3个方面,对日本数据隐私法律内容进行研究分析,并得出制定数据隐私专门法,鼓励多方机构参与,建立行业部门规范标准,建立数据隐私保护倒逼机制4个方面的启示,以期为我国数据隐私立法提供借鉴参考。 相似文献
5.
美国和欧盟的数据隐私保护策略 总被引:2,自引:0,他引:2
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。 相似文献
6.
7.
8.
张志悦 《内蒙古科技与经济》2020,(9)
随着信息技术发展的日新月异,5G、区块链和人工智能逐步取代大数据成为新的发展热点,而大数据经过一定时间的发展沉淀,逐渐成为一种常态化的技术丰富着人们的生活,人们也开始用更加理性和长远的眼光来看待降温后的大数据技术,逐步平衡大数据带来的便利性与个人隐私安全之间的关系,思考如何更好地保护隐私数据的安全。 相似文献
9.
10.
[目的/意义]从国家安全观视角,不仅能考察美国数据隐私保护框架的顶层设计,也能充分、全面、立体地揭示出美国数据隐私保护制度的整体趋势与优劣,为我国跨境数字贸易流通有效安全政策的制定提供理论依据。[方法/过程]运用文献研究与内容分析法,对美国新型国家安全观的基本构成与特点、数据隐私立法演化历程及其数据隐私框架进行了分析。[结果/结论]美国新型国家安全观下的数据隐私保护以数字经济优先发展为前提;其数据隐私整体框架,由国内和跨境数据保护与流动规则两个部分组成;美国数据隐私保护统一立法、跨境数据流动监管与治理现代化立法成为趋势;美国主导的同盟国跨境数据流动圈的形成,成为逆全球化的数据贸易壁垒;构建“共同价值观下的网络空间命运共同体”成为中国的必然选择。 相似文献
11.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but
more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become
more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these
changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional
Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the
right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review
of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this
work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures
of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches. 相似文献
12.
Tony Doyle 《Ethics and Information Technology》2009,11(3):181-189
I argue that there is nothing wrong with perfect voyeurism, covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts
from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their
case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely
punished. I conclude with some thoughts on the stubborn intuition that perfect voyeurism is wrong despite the absence of harm. 相似文献
13.
S.Y. Kung 《Journal of The Franklin Institute》2018,355(4):1846-1872
This paper explores a Compressive Privacy (CP) methodology for optimal tradeoff between utility gain and privacy loss. CP represents a dimension-reduced subspace design of optimally desensitized query that may be safely shared with the public. Built upon the information and estimation theory, this paper proposes a “differential mutual information” (DMI) criterion to safeguard the privacy protection (PP). Algorithmically, DMI-optimal solutions can be derived via the Discriminant Component Analysis (DCA). Moreover, DCA has two machine learning variants (one in the original space and another is the kernel space) good for supervised learning applications. By extending the notion of DMI to the utility gain and privacy loss, CP unifies the conventional Information Bottleneck (IB) and Privacy Funnel (PF) and lead to two constrained optimizers, named Generalized Information Bottleneck (GIB) and Generalized Privacy Funnel (GPF). In the supervised learning environments, DCA can be further extended to a DUCA machine learning variant to reach an optimal tradeoff between utility gain and privacy loss. Finally, for fast convergence, a golden-section iterative method is developed particularly for solving the two constrained optimization problems: GIB and GPF. 相似文献
14.
[目的/意义]智能系统使人们享受便捷数字生活的同时,也对用户隐私产生事实或潜在的威胁。尽管用户对威胁的感知及其规避行为有助于保证隐私信息的安全,但在好奇心和从众动机的驱使下,用户的隐私意识变得脆弱甚至瓦解。文章整合技术威胁规避理论和采纳动机理论中的好奇心与从众要素,探讨智能系统用户隐私意识对隐私保护意愿的作用机制。[方法/过程]收集296份有效问卷数据,采用PLS-SEM方法进行实证检验。[结果/结论]隐私意识通过正向影响感知威胁和感知可规避性对用户隐私保护意愿起积极作用;好奇心和从众对隐私意识产生直接负面影响,并对隐私意识和感知威胁/感知可规避性之间的关系起着间接的调节作用。研究揭示了隐私意识对隐私保护意愿的作用路径和边界条件,加深了对用户隐私决策行为背后障碍类因素的理解,有助于智能系统服务企业进一步完善用户隐私保护措施,为智能信息技术应用提供良好生态。 相似文献
15.
Paul B. Thompson 《Ethics and Information Technology》2001,3(1):13-19
I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a clearer statement of what is ethicallyimportant, as well as what is ethically problematic. Once theissues of security have been articulated clearly, it becomespossible to make out genuine issues of privacy in contrast tothem. 相似文献
16.
顾客担心个人隐私信息得不到有效保护是其不愿意使用网络银行的主要原因之一。研究表明,在网站上张贴隐私协议和隐私印章,能提高顾客对网络商家的信任和使用意愿。为此,本文以网络银行为研究背景,以理性行为理论为基础,探究隐私协议、隐私印章对我国网络银行顾客信任及其使用意向的影响作用,并应用结构方程方法进行实证研究。通过对198个有效调查样本的研究结果表明:隐私协议、隐私印章两者既会直接正向影响顾客对网络银行的信任和使用意向,又会通过信任这一中介变量,对顾客的使用意向产生间接正向影响。 相似文献
17.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing
and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed:
freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the
potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored
as well. 相似文献
18.
DeCew JW 《Ethics and Information Technology》2004,6(1):5-14
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research. 相似文献
19.
20.
介绍了网络隐私权的概念和内容。分析了网络空间中隐私侵权的表现方式以及在国外网络隐私权方面两种稳定的立法模式。针对我国隐私权保护的现状,提出了完善我国网络隐私权法律保护的对策和建议。 相似文献