共查询到20条相似文献,搜索用时 62 毫秒
1.
云计算的高速发展,在各行各业都得到了广泛的应用。但用户隐私数据的安全问题成为了云计算进一步推广的重大障碍。在本文中,我们提出了隐私管理器,并使用混淆算法来对用户隐私数据进行管理。通过相关实例证明,该方法能对用户隐私数据进行有效保护。 相似文献
2.
目前,云计算受到产业界的极大推崇并推出了一系列基于云计算平台的服务。但在已经实现的云计算服务中,安全问题一直令人担忧,以至于使得安全和隐私问题成为云计算普及过程中面临的一个巨大挑战。 相似文献
3.
欧美金融隐私保护法律制度比较研究 总被引:3,自引:0,他引:3
金融隐私权利作为一项重要的民事权利,日益受到世界关注.欧盟对金融隐私的综合保护模式,代表了世界最高的保护水平;美国对金融隐私的分业保护模式,具有很强的实用性.这两种保护模式分别与其特殊的保护理念、社会经济背景相适应,借鉴意义非常大.文章在比较分析这两种金融隐私保护模式的基础上,结合我国金融隐私保护的现状,提出具体的完善措施. 相似文献
4.
针对当前大数据时代的信息隐私泄漏问题,运用实证研究方法,通过设计、发放、收集及分析、处理调查问卷,了解我国网民的信息隐私关注情况和隐私保护行为的影响因素,从而提出相应的隐私保护建议,以引导和提升网民对信息隐私的关注和保护能力。 相似文献
5.
随着数据库技术和数据库管理系统的广泛应用,数据挖掘技术得到了广泛应用,尤其在电子商务领域,成为企业挖掘客户信息进而为客户提供个性化服务的重要手段,但是电子商务领域的数据挖掘也不可避免地触到隐私保护这块"雷区"。本文首先介绍了电子商务数据挖掘中涉及到的隐私,并结合我国网络隐私权保护的现状,对电子商务领域中的数据挖掘下隐私保护面临的挑战进行了研究,并探讨了保护个人隐私权的手段。 相似文献
6.
数据挖掘中的隐私保护问题近年来得到了广泛研究。本文首先分析了在数据挖掘中进行隐私保护的必要性,随后对隐私保护的主要技术进行了研究,最后指出了数据挖掘领域中隐私保护方法未来的主要研究方向。 相似文献
7.
用户提供个人信息是电子商务交易过程中必不可少的要素,个人信息开发利用与隐私保护之间的矛盾也日益受到人们的关注。文章从理论上阐述了客户信息的类型、客户信息利用的形式以及保护客户隐私的途径,在此基础上,以Alexa排名前100的购物类网站作为样本,就网站对个人数据的收集情况、网站对人口统计学信息的收集情况、网站隐私政策情况等方面进行了调查,研究发现:网站收集个人信息涉及面广,对隐私保护政策较为含糊,用户隐私保护意识不强。文章最后提出了我国电子商务发展中加强用户隐私保护的具体对策。 相似文献
8.
9.
随着社会的进步,人们法律意识的增强,自我隐私保护的观念也逐渐得到社会的认同。对公民隐私权的保护程度标志着一个社会的法制和文明程度。世界各国对公民隐私权保护都有相关的立法,然而,我国法律在隐私权保护方面的立法显然不足,同其他国家相比在隐私权保护方面 相似文献
10.
吴晓明 《中国对外贸易(英文版)》2012,(8)
在互联网迅猛发展的时代,我国对于未成年人网络隐私还缺少有效的手段进行保护.文章从立法模式、权利主体等方面分析了对未成年人网络隐私保护应该采取的法律措施,以期对我国未成年人的网络隐私保护能有所促进. 相似文献
11.
云计算是新一代信息技术变革和业务应用模式变革的核心。本文总结了我国云计算发展现状及未来发展趋势,分析了我国云计算发展中的问题,从扭转观念、政府引导、搭建示范平台、筹建公共平台及鼓励中小企业应用等几个方面,提出了对云计算发展的对策建议。 相似文献
12.
13.
14.
15.
由于不以传统的双方事先达成仲裁合意作为确定管辖权的基础,初现于20世纪80年代末的“无默契仲裁”模式自产生起至今备受争议,如何完善该模式造成的管辖权不当扩大弊端是消解其争议的务实之举。以广泛适用该模式的国际投资争端解决中心的实践为切入点进行考察发现,国际投资争端解决中心公约及仲裁规则对确立管辖权的法律适用规则的缺失和管辖权异议处理程序上的不足将对“无默契仲裁”模式下管辖权的确立产生不良影响,应通过直接在国际投资争端解决中心仲裁规则中明确相关法律适用规则、建立管辖权先行审查制度以及提倡东道国在双边条约中参考2012年美国BIT范本第30条制定法律适用规则予以完善。 相似文献
16.
随着物联网和云计算等新兴技术的高速发展,加强农业科技和服务体系建设成为加快发展现代农业的必然。当前,大连地区农村信息化建设取得了明显进展,政府主导型服务模式蓬勃发展:信息呈爆炸性增长;数字化信息程度高;终端多样化;信息需求个性化强;信息服务成本下降。通过构建信息采集模块、网络模式、云计算模块、信息服务展现模块,建立一个全方位、多角度、立体化、智能化、人性化与个性化的大连特色农业信息服务模式,推进农业信息服务领域中物联网与云计算技术整合的时机已经成熟。 相似文献
17.
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical
to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility
for information privacy because they have the most extensive knowledge of their organization’s systems and programs, as well
as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information
privacy is of great importance to both researchers and practitioners. This research addresses the question of whether male
computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information
privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes
three measures: protection (protecting privacy information), non-distribution (not distributing privacy information to others), and non-acquisition (not acquiring privacy information). The findings show (1) significant gender differences exist in the subjects’ overall
self-regulatory efficacy for information privacy, and, in particular, (2) that female subjects in this study exhibited a higher
level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification
of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research
directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention,
and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use
in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural
practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided
to improve the situation.
Feng-Yang Kuo holds a B.S. degree in Management Science from Chiao-Tung University, Taiwan and a Ph.D.degree in Information
Systems from University of Arizona. He was a faculty of Information Systems at University of Colorado at Denver from 1985
to 1997 and is currently an associate professor of Information Management in Sun Yat-Sen University, Taiwan. He has published
articles in Communications of ACM, MIS Quarterly, Communications of AIS, Journal of Business Ethics, Information & Management, Journal
of Systems and Software, Decision Support Systems, and Sun Yat-Sen Management Review. Among his current interests are information ethics, managerial cognition, and human-computer interfaces.
Cathy S.Lin Professor Cathy S.Lin is an assistant professor of Information Management at National University of Kaohsiung,
Taiwan. Her Ph.D.is in Management Information Systems from National Sun Yat-Sen University. She has published articles in the Information & Management, Journal of Information Management, and Sun Yat-Sen Management Review. Among her current interests are information ethics, ethical decision making, electronic commerce, and information management.
Meng-Hsiang Hsu Professor Meng-Hsiang Hsu is a professor of information management at National Kaohsiung of First University
of Science and Technology. His Ph.D. is in Management Information Systems from National Sun Yat-Sen University. He has published
articles in the J. of Business Ethics, Behavior & information Technology, Decision Support System, and Industrial Management and Data
Systems. Among his current interests are knowledge management, information ethics, strategic information systems, and electronic commerce. 相似文献
18.
刘琳丽 《湖北商业高等专科学校学报》2012,(6):112-117
国外成功的实践经验已经证明,公职人员财产申报制度是一种有效防止官员贪污腐败的措施。这种极具约束力的反腐机制却与公民的隐私权的保障产生了冲突,唯有通过对公职人员财产申报制度的完善来确定公职人员的隐私权的限制界限,才是解决两者冲突的最佳途径。 相似文献
19.
I. T. Hawryszkiewycz 《Journal of Organizational Computing & Electronic Commerce》2014,24(2-3):174-185
This paper describes how to design systems that support large scale collaboration between enterprises on the cloud. To do this, the paper proposes an innovative modeling method for large scale collaboration. The modeling method identifies the collaborative spaces in the collaboration and describes ways to support the collaboration in cloud environments, including defining knowledge flows across system boundaries.The modeling focuses on the ability to deploy the cloud to quickly create collaborative environments. Common access to the cloud makes it an enhancer of collaboration, especially across large business networks such as outsourcing or co-design and to support the agility needed in such collaboration. The paper proposes that cloud provides an advantage where it can foster the collaboration needed to maintain sustainable communities and defines the support needed from the cloud for collaboration. This is particularly relevant to smart cities and the greater emphasis on the Internet of things. 相似文献
20.
随着电子商务各种安全技术的发展,网络交易安全成为电子商务发展的核心和关键因素,个人信息保护虽然已是电子商务中早已受到关注的话题,不过到目前为止,电子商务网站对消费者个人因素保护特别是网络隐私权的保护仍存在种种问题,这种状况已经成为电子商务发展的制约因素之一,为此在电子商务环境下如何对网络隐私权实施安全的有效保护,成为电子商务顺利发展的重要因素。 相似文献