排序方式: 共有58条查询结果,搜索用时 171 毫秒
41.
中外信息保密的立法精神比较及其思考 总被引:2,自引:0,他引:2
本文从秘密信息的法律保护及其特点出发,对中外主要国家信息保密的立法精神,从立法观念、立法指导思想两个方面进行了比较分析,并对建立健全我国信息保密法律制度提出了建设性的意见。 相似文献
42.
网络隐私保护策略分析 总被引:9,自引:0,他引:9
In the light of the present status of network privacy violations, this paper analyzes the network privacy protection strategies in USA and Europe, and puts forward some strategies that may be adopted in China. 相似文献
43.
政府信息公开立法受我国现有政府信息立法所确立的制度变迁路径的影响。现有的政府信息立法遵循的是以“保密为主,公开很少甚至不公开”立法思路,与现行政府信息公开立法所提倡的“公开为主,保密为辅”的立法思路不相一致。因此,政府信息公开立法应该避免路径依赖的影响,结合我国的实际情况,走以地方立法或部门立法先行的制度变迁路径。 相似文献
44.
房伟 《淮北职业技术学院学报》2005,4(3):76-77
随着人类的不断进步,社会文明的不断发展,人们对居住环境私密性问题的妥善处理愈来愈关注;只有充分认识和理解人的私密心理要求,并在环境设计中给予应有的重视和恰当的处理,我们的生活才能更融洽、更美满。 相似文献
45.
定密工作是高校保密管理的重要组成部分,定密的准确性,直接影响到采取的保密防护措施。通过分析目前高等学校定密工作存在的问题,分别从组织建设、保密培训和定密制度提出了建议和对策。 相似文献
46.
基于认证测试的鲁棒电子邮件协议形式化分析(英文) 总被引:1,自引:0,他引:1
基于认证测试方法及strand space模型,形式化分析了具有完美前向机密性的鲁棒电子邮件协议,指出该协议存在安全缺陷.同时给出了针对该协议的中间人攻击方法,即攻击者在协议的接收阶段通过伪造消息即可欺骗通信双方,使通信双方与其共享错误的会话密钥,由此使得协议的完美前向机密性得不到保证,针对协议的上述缺陷,提出一种改进方案,即通过在协议的接收阶段加入相应的签名信息,以保证改进协议能够克服中间人攻击并且提供完美前向机密性.最后,基于认证测试方法及strand space模型,形式化证明了改进协议在发起者、接收者及服务器之间的安全认证,确保了改进协议具备真正的完美前向机密性. 相似文献
47.
Maggie Jones Patterson Romayne Smith Fullerton Jorge Tuñón Navarro 《Journalism Practice》2017,11(9):1079-1100
This study of crime reporting shows that keeping crime records secret hurts democratic consolidation. While many reporters and journalism experts interviewed claimed to value the presumption of innocence, at the same time, many skirted legal restrictions and ethical codes. Police and prosecutors supplied leaks, and reporters sought further information from witnesses. This porous secrecy leads to publication of rumors and unreliable eye-witness accounts. Four exacerbating factors affect this reporting method: widespread “clientelism,” a partisan news media, an alternative definition of “public interest,” and weak professionalism. 相似文献
48.
Abstract The network model of organization plays a central role in recent sociological accounts of the information economy. This model is also often presented in organization and information and communication technologies (ICT) literature with an air of enthusiasm that underscores its advantages—flexibility, cooperative culture, innovativeness, and knowledge and technology intensity. Such themes are usually based on a “networking logic” that assumes the trustful cooperation of large and small production firms in a rapidly changing economic environment. We believe that both the logic and the themes based upon it are too narrow to be able to explain the complex dimensions of interorganizational networking. Using Enron as a case study, our goal in this article is to enrich the logic just described and to develop an extended model of the network enterprise. We argue that this is only possible by extending the unit of analysis beyond the production firm, to include, among others, subsidiaries, banks, investors, auditors, and government agencies. The proposed extended model allows the broadening of many of the aforementioned themes, making it possible to arrive at a realistic picture of the complexities of the network enterprise. The managerial advantages of the model are also discussed. 相似文献
49.
对WTLS握手协议的安全性能进行分析 ,指出其存在的安全缺陷和可能产生的安全威胁 ,利用签名加密机制对握手协议进行了改进 ,以实现向前保密和用户匿名保护 ,最后对改进协议的安全性作了讨论 . 相似文献
50.
浅议网络安全及防范 总被引:6,自引:0,他引:6
高颖 《成都教育学院学报》2006,20(3):100-101
通过对威胁网络安全的诸多因素的分析,从而使用户做到“知己知彼,百战不殆”,为其制定相应的防范措施,使网络安全地应用在各行各业中。 相似文献