首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
<正>近年来,伴随着高科技和信息产业的迅猛发展,手机、计算机、网上交易等蕴含高技术的新事物业已在日常生活中得到了广泛的使用。同时,随着这些新事物的出现的还有如影随形对个人信息侵犯的行为,归纳起来主要有两种表现形式:首先是对个人信息收集的不正当性,其次是对个人信息处理的不正当性。前者主要有个人信息的过度收集和非法收集两种情况;后者主要包括个人信息的不当泄露、恶意篡改和恶意传播、不当使用和利用。  相似文献   

2.
档案个人信息是档案内容的重要组成部分,但随着档案的社会利用而面临着权益受损的风险。通过《档案法》转介条款的指引,档案个人信息的保护以个人信息保护相关立法为依据。但为了实现档案个人信息保护与利用的平衡,以及档案个人信息保护的精准化,还需要通过对档案个人信息的法益分层,形成档案个人信息的分类标准,并以此为基础选择不同的保护模式:首先是对承载隐私权法益的隐私性档案个人信息,采取个体赋权模式,通过权利化方式进行强化保护;其次是对承载一般个人信息法益的私人性档案个人信息,采取行为规制模式,规范利用行为过程以形成间接保护;最后是对承载超个人信息法益的社会性档案个人信息,采取数据开放模式,强调信息利用的同时予以最低限度保护。  相似文献   

3.
文章以新《档案法》及国家档案局有关政策法规为基础,结合个人信息保护领域的法律法规解读,分析在数字档案建设背景下档案领域个人信息保护的重要性及现状,从法制体系建设、工作责任制度与监察工作落实、数字档案数据安全加固、科学救济途径建立和个人信息保护意识增强方面提出了建议。  相似文献   

4.
<正>2021年11月1日,《中华人民共和国个人信息保护法》(以下简称《个人信息保护法》)正式施行,这是我国第一部系统性保护个人信息的专门性法律,构筑了个人信息保护的法治防线。档案作为社会组织或个人在社会活动中直接形成的记录,其开放利用难免会涉及个人信息相关问题,将《个人信息保护法》与档案开放利用结合起来探讨具有重要的现实意义。目前国内学界对档案开放利用领域中的个人信息保护研究已有一些成果,  相似文献   

5.
大数据背景下,档案利用中个人信息保护“知情同意”的传统架构受到挑战,面临保护机制失效和全方位适法性的现实困境。基于大数据背景,完善我国档案中个人信息保护的基本路径,必须进行科学立法,平衡产业发展需求与权益保护诉求;加强全过程监管,防范行政司法化;实施统分结合,形成监管机构专责化,最终构建形成系统性档案中个人信息保护的法律框架。  相似文献   

6.
<正>2022年8月,《国家档案馆档案开放办法》(以下简称《档案开放办法》)正式施行,旨在进一步规范档案信息的利用管理。与此同时,数字网络时代下信息侵权行为频发,如何保护个人信息已逐渐成为世界各国的热议话题。对此,《中华人民共和国个人信息保护法》(以下简称《个保法》)第四十七条规定个人信息删除权(以下简称“删除权”),在法律规定情形出现时,信息主体有权要求个人信息处理者删除过时的、非必要的或保存期限届满的个人信息。  相似文献   

7.
政府信息公开过程中的个人信息保护策略   总被引:3,自引:0,他引:3  
政府信息中包含有大量个人信息。本文具体分析了政府机关在履行职责过程中可能收集、处理和利用的个人信息类型,提出了政府信息公开过程中个人信息开放与保护的基本策略。  相似文献   

8.
[目的/意义]破解突发公共卫生事件中全面收集个人信息、公开私人信息等不当个人信息操作等难题,对于促进我国个人信息保护生态系统建设具有现实意义。[方法/过程]从数据生命周期角度,整理分析欧盟与美国新冠疫情期间主要个人信息法律侧重点,可知欧美重视分类监管数据、分场景约束主体,亦存在延滞事件防控与忽视事件变化等不足。[结果/结论]提出个人信息定义场景化、个人信息收集精确化、个人信息传播媒体权威化、个人信息被遗忘权明朗化与个人信息利用行为规范化等五方面的建议。  相似文献   

9.
[目的/意义]个人信息被遗忘权作为一种新型私权,是平衡言论自由和隐私自主的重要途径,其在欧美国家的立法进程中均有重要体现。[方法/过程]从欧盟与美国对“个人信息被遗忘权”法理逻辑和立法进程的历史考察入手,探讨欧盟与美国“个人信息被遗忘权”法理逻辑差异的缘由,并对大数据时代背景下“个人信息被遗忘权”的法理逻辑再定位进行考量,以法律逻辑再定位为切入点,对被遗忘权的权利空间布局进行细分,以应对数字时代的新挑战。[结果/结论]信息控制者在收集和处理公民个人信息过程中必须履行审慎义务,构建个人信息利用中的主动保护模式,不断与国际个人信息保护趋势接轨,为互联网行业的发展保驾护航。  相似文献   

10.
隐私保护技术的发展具有社会选择性。不同的价值取向及保护策略,对隐私保护技术变革产生着重要的调节。隐私与个人信息一元化的保护策略,在技术上追求隐私信息"可用不可见",导致隐私保护技术离身化,隐私保护目标异化和保护思路偏差。"为利用而保护"的隐私保护技术混淆了个人信息与隐私的区别,忽视了隐私的内在价值,从根本上面临价值逻辑的困境。脆弱的隐私具有强烈的切己性和具身性,我们必须秉持隐私与个人信息二元化的保护策略,发展诸如联邦学习算法、区块链等具有切己性和具身化的技术,让隐私保护从离身转向具身,从积极控制转向消极防御,从中心化转向分布式。  相似文献   

11.
ABSTRACT

The article examines the most important periodicals of ethnic minorities in Poland. After 1989, many ethnic groups (e.g., Germans and Romanies) were allowed to publish journals and newspapers for the first time since the end of World War II. The publications examined show the rich cultural life of the various ethnic groups as well as their current status in Poland. In addition to popular titles, some scholarly publications are also discussed.  相似文献   

12.
ABSTRACT

In today's current political environment raising support for millage renewals, bond campaigns or even millage continuations for public libraries is affected by national politics, and a tendency towards tax aversion on principle across the country. The lessons we can learn from the governing boards of small and rural public libraries are worth raising up to a greater national consciousness. Board governance, community consciousness, and facilities management are clear and logical tools that elected boards of public libraries can use to politick for support of libraries.  相似文献   

13.
The author answers a reference question on bibliographic sources for the Ukrainian periodical press 1840–1850. Helpful publications include bibliographies, guides, and library catalogs. These potentially make mention of revolutionary developments in Hungary (such as the Twelve Points paragraph of the Demands of the Hungarian Nation in March 1848, the subsequent April Laws, and Hungary's declaration of independence in April 1949), and elsewhere in the Hapsburg Empire.  相似文献   

14.
ABSTRACT

The history of the almanac in Croatia is reconstructed through primary research in bibliographic and archival sources. The almanac is a vehicle for knowledge communication in informal contexts, engaging both oral tradition and literary forms traceable to medieval literacy and ways of structuring knowledge. The history of the almanac in Croatia reflects the changing context of the book trade, literacy, and the evolution of language. Four main stages are identified: (1) the beginning of the annual almanac in the seventeenth century; astrological almanacs reflecting the sensibility of the Baroque period; (2) the Enlightenment's stimulation of almanac publishing in the spirit of contemporary secular reforms in agriculture and education; (3) nineteenth-and twentieth-century almanac trade, showing complex and overlapping networks for the production, distribution and appropriation of printed almanacs;(4) roughly the end of World War II, when the almanac slowly moved out of the role of a popular mass medium and into specialized niches represented by regional, diaspora, and religious almanacs.  相似文献   

15.
Some key questions for publishers in today’s market are: Could Amazon’s recent merger and acquisitions strategy create a disruptive or paradigm shifting business model in the publishing industry? Do their recent actions post mergers and acquisitions illustrate a predicable pattern of behaviour that publishers can strategize around? This paper will explore these questions and look at some of the possible reasons behind Amazon’s business practices and the possible consequences to publishers.  相似文献   

16.
ABSTRACT

German authorities are expecting more than 1 million refugees by the end of 2015. These people come to Germany to seek protection and assistance and to build a new life, therefore it is important to welcome them and to assist them in their integration as soon as possible. This situation creates a versatile and perfectly fitting opportunity for cultural and educational programs, including libraries, which can play a vital role in this integration process. The key to integration is the knowledge of the German language, and the most important challenge now is to teach the necessary language skills to as many asylum-seekers as possible.  相似文献   

17.
Abstract

Many libraries use RSS to syndicate information about their collections to users. A survey of 65 academic libraries revealed their most common use for RSS is to disseminate information about library holdings, such as lists of new acquisitions. Even though typical RSS feeds are ill suited to the task of carrying rich bibliographic metadata, great potential exists for developing applications that can exploit metadata exposed to Web services via RSS. Using the MODS metadata format, entire catalog records can be seamlessly embedded in RSS 2.0 feeds. Existing tools, such as Library of Congress Java toolkits and XSLT stylesheets, can facilitate this process, while a new XSLT stylesheet may be used to create the RSS feeds complete with MODS records. As an example of the added functionality these MODS/RSS feeds can offer, records from a MODS-enriched RSS feed can be ingested into a non-RSS application such as Zotero. As more emerging library technologies use Web services architectures to handle data objects, the ability to syndicate catalog records will become more critical to providing innovative library Web services.  相似文献   

18.
This essay investigates key moments in the history of personal digital assistant (PDA) marketing to women. Analyzing promotional texts for three PDAs that received considerable press coverage from 1999 to 2001, this essay explores the cultural significance of the convergence of anxieties about women's place in the gendered division of labor with the computer industry's changing marketing imperatives. Drawing on an array of promotional texts, including news articles, press releases, promotional Web sites, and ads appearing in newspapers and magazines, this paper tells the story of how the computer industry aimed to sell smaller, faster computing devices to women while promising to mediate and thus reproduce women's overwork as paid and familial laborers. After experimenting with the PDA as a sexy fashionable gadget for working women, marketers approached women as mothers with “Audrey,” an Internet appliance designed for the kitchen.  相似文献   

19.
This study explores the attitudes and actions of bank managers toward communication spending during recession. Results of this study indicate that organizational leaders cut communication spending early during recession and also erroneously rely on the bank's financials to mitigate irrational customer withdrawals. This research is used to illustrate the need for public librarians to meet the needs of bank stakeholders when their institution ceases to communicate during crises, for academic librarians to educate students in undergraduate and graduate programs regarding heightened information needs during recession, and for corporate librarians to understand a potential avenue for competitive advantage during recession.  相似文献   

20.
毛彦妮  王菲菲 《图书情报工作》2012,56(18):93-98,126
指出共链分析已在商务网站评价、竞争情报分析、商业信息挖掘等领域有广泛应用。综合运用共链分析与社会网络分析的方法,对国内市场份额排名前50位的电子商务网站的企业竞争态势与竞争关系及地位进行综合分析,并对企业间潜在竞争关系挖掘进行初步探索,以期能对竞争情报方法论研究和国内电子商务市场的发展提供一定的启示和参考。研究发现,共链网络中节点的程度中心性与企业实际的市场份额之间存在显著的相关关系,且竞争关系多存在于不同组织下业务类型相似的企业实体,而有些互补服务的企业之间则是合作关系的存在,这一发现或许能为未来电子商务市场发展战略规划与制定提供一定的指导和帮助。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号