首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 61 毫秒
1.
李雪  许晓东 《现代情报》2015,35(6):166-171
随着信息社会化不断深入,网络隐私的侵犯与保护问题成为人们探讨的焦点。本文以SSCI收录的网络隐私问题研究型论文为研究对象,采用文献计量法从文献来源情况、被引情况、关键词等角度分析了目前网络隐私问题国际研究特点;并采用内容分析法对文章内容进行分析,总结出目前该领域的4个热点研究主题:隐私概念争议与发展、隐私关注量表体系、网络隐私观形成前因和社交平台中的隐私问题。以期引起国内学界的注意,为我国学者深入研究网络隐私问题提供参考。  相似文献   

2.
针对社交网络隐私保护问题,本文提出一种新的隐私保护方法——k-subgraph划分算法,它通过对社交网络进行分割,通过泛化顶点标签和扰乱图的结构特征,来对社交网络进行匿名化处理,拟达到隐私保护的目的;仿真实验表明,该方法可以有效地保护社交网络中个体的隐私信息,同时保证了社交网络中匿名数据的可用性。  相似文献   

3.
随着当前无线传感器的应用范围的不断扩大和使用频次的不断提升,无线传感器网络数据的隐私保护对于当前的网络数据安全具有重要的作用和意义。无线传感器网络的特征使得数据的隐私容易被窃取。针对无线传感器网络数据的隐私保护技术已经成为了当前的研究热点。本文主要是针对数据网络中的隐私保护问题,对无线传感器网络中的数据安全威胁进行分析,对存在于传感器节点中的保护技术进行研究。  相似文献   

4.
随着无线宽带介入技术和移动终端技术的发展,使得移动互联网迅速发展,但是由于云计算平台、移动通信网络和移动终端的开放性,使得传统的隐私保护机制不再适合现在的移动互联网,目前,信息安全和隐私保护已经成为全社会广泛关注的问题。本文主要对移动互联网的隐私保护问题研究,首先提出了移动互联网中存在的隐私保护问题,其次对存在的隐私问题进行研究,提出了几条隐私保护措施。  相似文献   

5.
网络环境下的隐私与隐私保护   总被引:3,自引:0,他引:3  
刘一兵 《情报科学》2003,21(6):605-608
网络隐私问题已经引起学术界的广泛关注,本文首先分析了网络隐私产生的四种渠道和侵害网络隐私的四种可能方式,然后研究了网络隐私保护的行业自律措施和立法保护措施,最后就我国的网络隐私保护问题给出了建设性的意见。  相似文献   

6.
随着信息技术的发展和电子商务技术的不断完善,网络交易安全成为了电子商务发展的核心和关键问题,对网络隐私安全的有效保护,成为电子商务顺利发展的重要市场环境条件。网络信息安全技术、信息安全协议、P2P技术成为网络隐私安全保护的有效手段。  相似文献   

7.
针对社交网络隐私保护问题,本文提出一种新的隐私保护方法——k-subgraph划分算法,它通过对社交网络进行分割,通过泛化顶点标签和扰乱图的结构特征,来对社交网络进行匿名化处理,拟达到隐私保护的目的。仿真实验表明,该方法可以有效的保护社交网络中个体的隐私信息,同时保证了社交网络中匿名数据的可用性。  相似文献   

8.
信息通讯技术(ICT)的迅速发展使得人们可以通过微博、即时通信软件(IM)、手机终端应用及社交网络(SNS)来发布个人真实信息,网络将以往零散的碎片信息整合成完整的个体信息,造成隐私泄露现象日益严重。本文总结了个体隐私泄露的渠道和类别,通过访谈研究,分析了个体隐私感知风险以及个体隐私保护行为特征:个体特征差异(受教育水平、网络经验)导致隐私关注差异;信息关联及商业价值在不同程度上与隐私关注的变化相关;隐私关注对感知隐私风险产生影响;个体隐私保护行为(常规保护、技术保护)因隐私风险感知不同而发生变化。在此基础上,构建了个体隐私感知与保护行为模型。  相似文献   

9.
介绍了网络用户信息行为研究中的相关问题和隐私侵权现象,探讨并提出了网络隐私保护时研究者和网络用户各自应该遵循的原则。  相似文献   

10.
韩江 《大众科技》2006,(6):111-112
随着计算机网络技术的迅猛发展和电子商务的兴起,对网络与电子商务中隐私的侵权已成为突出的社会问题而备受社会各界的关注.文章从网络空间与电子商务活动中存在的侵犯个人隐私权的主要形式入手,分析了国外网络与电子商务隐私权的法律保护模式.提出了我国保护网络与电子商务中隐私权的立法建议.  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

16.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号