首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 671 毫秒
1.
网络个人信息隐私认证机制探讨   总被引:1,自引:0,他引:1  
通过实例介绍美国、日本和我国开展个人信息认证保护的实践情况,评析网络个人信息隐私认证机制的优势和不足,提出完善的对策,并对发展我国的网络个人信息隐私认证机制阐明观点。  相似文献   

2.
《科技风》2020,(24)
近年来,我国互联网发展成绩巨大且辉煌,随着网络用户的不断增加,商业服务产业的发展在互联网平台上有较大进步,早已与人们的生活密不可分,与此同时个人信息难免被加以利用,其并存的个人信息侵权问题的负面影响也随之而来。本文从保护个人信息权利不被侵犯的角度出发,希望尽可能最大限度上维护网络信息主体的权利。基于此,论文首先对网络环境下个人信息侵权进行概述,了解概念及特征;其次,对网络环境下个人信息侵权保护的立法现状和侵权现象进行分析和阐述;最后,对我国网络环境下个人信息的保护提出完善建议,以求在网络环境下个人信息侵权行为发生后具有全面的、适合的法律依据。  相似文献   

3.
翟青竹 《情报探索》2012,(10):94-97
通过对网络环境下的个人信息组织进行研究,提出了网络环境下个人信息组织的定义,描述了网络环境下个人信息的特点和个人信息的组织方法.以Twine为实例,详细描述了大众分类法及其在个人信息组织中的应用,并指出了大众分类法在个人信息组织中存在的问题,同时展望了未来个人信息组织研究的发展方向.  相似文献   

4.
孙瑞英  李杰茹 《情报科学》2021,39(11):157-166
【 目的/意义】个人信息保护政策作为公民个人信息保护的法律保障依据,具有重要的研究价值,将词频分 析、社会网络分析法、内容分析法用于政策解读与分析,推动我国个人信息保护工作的进一步开展。【方法/过程】本 文以《中华人民共和国个人信息保护法(二审稿草案)》(2021年4月29日发布)的政策文本为研究对象,运用词频分 析、社会网络分析法、内容分析的方法,对该法律草案文本进行研究,从而达到以更多视角挖掘分析法律政策条款 内涵的目的,以法律文本的分析为依据完成对我国个人信息推进现状的描述。【结果/结论】通过定量与定性相结合 的研究方法,解读《中华人民共和国个人信息保护法(二审稿草案)》,归纳并揭示法律文本中所蕴含的个人信息保 护工作的运行机理,明确我国个人信息保护立法的进程。【创新/局限】综合运用词频分析、社会网络分析法及内容分 析法解读《中华人民共和国个人信息保护法(二审稿草案)》的内容。但本文只针对我国个人信息保护的现状进行 了分析,并未涉及策略、改进方法等更进一步的讨论。  相似文献   

5.
影响互联网用户网络隐私保护行为的因素分析   总被引:1,自引:0,他引:1  
借鉴国外的网络隐私保护行为模型,运用随机抽样问卷调查数据,研究了隐私关注度、感知公平和感知投诉效益对我国互联网用户网络隐私保护行为的影响.研究表明,隐私关注度对拒绝提供个人信息、伪造个人信息和投诉行为都有显著的正向影响,感知公平对伪造个人信息具有显著的负向影响,感知投诉效益时投诉行为具有显著的正向影响.研究结果对网络公司优化客户关系管理具有一定的参考价值.  相似文献   

6.
赵静 《现代情报》2014,34(3):29-31,35
个人信息网络侵权主要有个人信息的不当收集、个人信息的不当利用、个人信息的不当管理3种形式,可以通过“加强宣传教育,提高个人信息保护意识,营造尊重个人隐私的社会氛围”、“制定可操作性强的政策和法律,规范网络业者的行为”、“开展标准制定和隐私认证,实施行业自律”、“实施多方监管,提高个人信息网络侵权成本”及“积极运用技术手段,防个人信息网络侵权于未然”等多维途径进行治理。  相似文献   

7.
处在当前的网络发展环境下,大数据时代已经到来,这为数据信息的准确分析以及充分利用,辅助企业以及个人能够带来很大的利益。但是在网络中个人信息的保护也成了一个比较严重的问题,本文主要就个人信息的类型及大数据时代网络下个人信息侵害问题加以详细分析,然后就对个人信息保护的困境及解决策略进行探究,希望此次理论研究对个人信息的保护起到一定积极作用。  相似文献   

8.
“裸奔”的个人信息——信息时代个人信息泄露问题分析   总被引:1,自引:1,他引:0  
分析我国个人信息保护的现状及存在问题,并从公众生活、网络环境、立法建设等方面提出相应的解决方案。  相似文献   

9.
浅谈我国个人信息保护问题   总被引:1,自引:0,他引:1  
李颖  许皓 《情报探索》2009,(9):17-18
阐述了与个人信息相关的一些概念,分析了我国个人信息遭受侵害的现状及保护的必要性,探讨了我国个人信息保护应注意的问题及时策建议。  相似文献   

10.
网络隐私第三方认证机制初探   总被引:4,自引:1,他引:3  
研究表明,由于担心个人信息得不到有效的保护,人们对使用基于互联网的各种服务心存疑虑,严重影响到电子商务的发展.旨在给电子商务的发展营造宽松的发展环境,在网络隐私法律框架之外,以美国为代表的国家产生了基于市场运作的网络隐私第三方认证.为了减少网络用户担心隐私遭到侵犯的不安全感,不少网站加入网络隐私认证计划.本文介绍了网络隐私第三方认证运行机制,以及在保护个人隐私方面存在的不足之处,并提出完善第三方认证机制的策略,以期对我国的个人信息保护提供新的思路.  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号