首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
李强 《信息网络安全》2011,(2):13-14,18
“维基解密”事件给如何在表达自由与保障国家安全之间取得平衡带来了新的课题。“维基解密”的泄密行为从某种程度上说并非表达自由的正当行使,但相关国家采取的干预措施同样不符合国际人权法的要求。要解决这一问题,必须重新审视国际人权法中关于表达自由的限制性规定,并依据互联网的特性加以调整。  相似文献   

2.
随着物联网技术的发展带来了新的安全隐患,使人们传统的安全观念不断发生变化。文章从对物联网管控概念入手,提出了公安机关作为维护国家安全的重要力量,应当依法享有法律授权对物联网进行管理的权利,并根据互联网的管控工作原则,提出了中国物联网公安管控机制和方法。  相似文献   

3.
Many researchers advocate that the real-world narratives shared by experts or knowledge workers are helpful in teaching and educating novices to learn new knowledge and skills. Narrative analysis is a useful method for experts to understand narratives. However, it does not produce any clear or explicit layouts. This is not easy for a new learner without prior knowledge to glean the right messages from narratives within a short time. In this paper, a narrative knowledge extraction and representation system (NKERS) is presented to extract and represent narrative knowledge in an effective manner. The NKERS is composed of a narrative knowledge element extraction algorithm, a narrative knowledge representation method and a narrative knowledge database. A prototype system has been built and trial implemented in the construction industry. The results show that the domain experts agree that the narrative maps generated by the NKERS can effectively represent narrative elements and flows. Three-quarters of respondents expressed that they will use the produced narrative maps in their training courses to facilitate students’ learning.  相似文献   

4.
近几年,随着物联网技术的不断研究与发展,其逐步走向了实用阶段。物联网技术在智能交通,智能家居,智慧物流等方面得到了广泛的应用。而物联网在各个方面越来越广泛的应用,也对其传输数据、信息的安全性提出了更高的要求。结合物联网特征,就物联网在应用中面临的安全问题展开讨论,就对物联网各逻辑层的安全需求分析,找出物联网环境中最需要关注身份认证的环节,为物联网安全问题的研究与发展起到一定的建言作用。  相似文献   

5.
Internet所具有的开放性、国际性和自由性,以及TCP/IP协议在制定时本身所具有的缺陷,使得网络安全问题日益严重。为了建立安全可靠的信息网络,进行网络安全技术的研究与设计是极其必要与迫切的。防火墙作为信息安全保障的重要措施已经应用在众多组织机构的网络中,但基于静态安全策略的防火墙无法及时响应实时的安全问题。文中在防火墙的智能化方面做一些有益的尝试,提出了新一代具有自主学习能力的防火墙系统结构。  相似文献   

6.
As nations expand the telecommunications interception and access powers of their law enforcement agencies to address heightened threats to national security and accelerating technological convergence, the proper application of the proportionality principle is becoming an increasingly contentious issue. The ‘proportionality principle’ in telecommunications law mandates the weighing of a likely threat to public security against the potential violation of individual rights so as to ensure that the intrusive impact of a particular interception and access activity is reasonable proportionate to the potential outcome sought. The reform discourse of recent years has largely focused on expanding investigative powers, to the possible detriment of the protection of individual rights. Whilst the present environment makes such a focus wholly understandable, the present paper considers potential legislative and policy measures that could strengthen the proportionality principle in the telecommunications regulatory framework to support a more precise calibration of the relevant competing public and private interests. As Australia has recently undertaken a comprehensive review of its telecommunications access and interception laws, commencing with a 2013 referral to its Senate Committee and culminating in a 2015 law reform report, the article focuses on that nation’s experience. The analysis is, however, placed within an overarching public policy framework to ensure that the discussion is of relevance to nations around the world who are similarly engaged in telecommunications law reform.  相似文献   

7.
The Internet phenomena and high technology in general has rapidly changed the way we think, work, live and play. The changes brought on by the Internet and technology increases at a more and more rapid rate like a snowball growing in size and picking up speed as it rolls down the hill. The side effect of all this has been the increased risks to all those who travel the Internet. This article addresses the variables that have contributed to the security risks of using the Internet for both businesses’ and government agencies’ purposes.  相似文献   

8.
With the increasing sophistication of mobile computing, a growing interest has been paid to locative media that aim at providing immersive experiences. Location aware narratives are a particular kind of locative media that aim at “telling stories that unfold in real space”. This paper presents a study that aimed at assessing an underlying hypothesis of location-aware narratives: that the coupling between the physical space and the narrative will result in increased levels of immersion in the narrative. Forty-five individuals experienced a location-aware video narrative in three locations: (a) the original location that contains physical cues from the narrative world, (b) a different location that yet portrays a similar atmosphere, and (c) a location that contains neither physical cues nor a similar atmosphere. Significant differences were found in users’ experiences with the narrative in terms of immersion in the story and mental imagery, but not with regard to feelings of presence, emotional involvement or the memorability of story elements. We reflect on these findings and the implications for the design of location-aware narratives and highlight questions for further research.  相似文献   

9.
Acquisition of knowledge must be interwoven with the process of applying it. However, traditional training methods which provide abstract knowledge have shown ineffective for gaining experience of the work. In order to solve this problem, more and more researchers have included narrative in simulation, which is known as narrative simulation. By providing the narratives, participants recognize the choices, decisions, and experience that lead to the consequences of those decisions. It has been proven that narrative simulation is very useful in facilitating in-depth learning and reflective learning. However, conventional methods of data collection and narrative construction for narrative simulation are labor intensive and time consuming. They make use of previous narratives manually and directly. They are inadequate to cope with the fast moving world where knowledge is changing rapidly. In order to provide a way for facilitating the construction of narrative simulation, a novel computational narrative construction method is proposed. By incorporating technologies of knowledge-based system (KBS), computational linguistics, and artificial intelligence (AI), the proposed method provides an efficient and effective way for collecting narratives and automating the construction of narratives. The method converts the unstructured narratives into a structural representation for abstraction and facilitating computing processing. Moreover, it constructs the narratives that combine multiple narratives into a single narrative by applying a forecasting algorithm. The proposed method was successfully implemented in early intervention in mental health care of a social service company in Hong Kong since the case records in that process have structural similarities to narrative. The accuracies of data conversion and predictive function were measured based on recall and precision and encouraging results were obtained. High recall and precision are achieved in the data conversion function, and high recall for the predictive function when new concepts are excluded. The results show that it is possible for converting multiple narratives into a single narrative automatically. Based on the approach, it helps to stimulate knowledge workers to explore new problem solving methods so as to increase the quality of their solutions.  相似文献   

10.
Multimedia Tools and Applications - Distributed Denial of Service attack has been a huge threat to the Internet and may carry extreme losses to systems, companies, and national security. The...  相似文献   

11.
“棱镜门”事件的曝光引发全球对国家安全和隐私保护的讨论。在美国网络监控法律框架下去审视美国国家安全局情报监控项目,可发现明确的适用范围、严密的审查监督制度与严格的实施程序要求,让美国政府可在维护国家安全利益的同时力求最大限度保护民众隐私权,做到了“有法可依”。构建政府与互联网公司互利共赢的新关系,完善网络监控法律体系和法律运作程序是从美国网络监控法律保障体系分析中所提炼出对我国具有启发性意义的措施。  相似文献   

12.
随着计算机网络技术的飞速发展,尤其是互联网的应用变得越来越广泛,在带来了前所未有的海量信息的同时,网络的开放性和自由性也产生了私有信息和数据被破坏或侵犯的可能性,网络信息的安全性变得日益重要起来,已被信息社会的各个领域所重视。本文对目前计算机网络存在的安全隐患进行了分析,并探讨了针对计算机安全隐患的防范策略。  相似文献   

13.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   

14.
This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution's Interim Guidelines.  相似文献   

15.
基于Linux的具有DMZ防火墙的实现   总被引:5,自引:0,他引:5  
Intemet的飞速发展,使得越来越多的网络与其联网,Internet上的信息量迅速增长。人们在利用网络获取、发布信息的同时,同样受到了网络安全性的威胁。而防火墙,则是用来防止互联网损坏的一种安全防范措施。文中简要介绍了Linux内核防火墙的发展,即ipfwadm,ipchains,iptables。重点探讨了目前Linux内核防火墙的最新技术Netfilter,在介绍了非军事区(DMZ)的概念后,用iptables构建了一个具有DMZ的防火墙。  相似文献   

16.
The Internet, originally a development of the USA government, opened to commercial traffic in the early 1990s. Since then, its growth internationally has been phenomenal. In several nations, the Internet is now fundamental for communication, and it has become basic to society, including supporting several aspects of the USA national critical information infrastructure. Because the Internet was built as all information-sharing network, security did not figure prominently in its original architecture. This deployment is beneficial but it has also brought serious risks.  相似文献   

17.
An ever-increasing emphasis is placed on E-commerce — it is the new trading place and most businesses are keen to jump aboard. As a result of the rush, the security challenges that security managers face are diverse and increasing in number. With big names hitting the headlines, the use of the Internet as a viable trading mechanism has been questioned by industry commentators and, more importantly, by consumers. These concerns led the UK’s National Consumer Council (NCC) to research consumers’ fears about E-commerce. They drew the worrying conclusion that online security is hindering Internet expansion. How then can these worries about E-commerce security be assuaged?  相似文献   

18.
我国高校信息安全专业教师的专业出身(学缘)特点,可以为新建学科“网络空间安全”的师资队伍建设提供参考依据。以已有相关全国院校调查结果为线索,运用Web内容分析法对网上的信息安全教师简历资料进行了内容分析。分析结果表明,我国信息安全专业教师主要出身于计算机、数学、通信、电子这 4个学科,从本科到硕士、博士、博士后,他们的专业逐渐向信息安全专业聚拢。  相似文献   

19.
Narrative generation has historically suffered from poor writing quality, stemming from a narrow focus on story grammars and plot design. Moreover, to-date natural language generation systems have not been capable of faithfully reproducing either the variety or complexity of naturally occurring narratives. In this article we first propose a model of narrative derived from work in narratology and grounded in observed linguistic phenomena. Next we describe the Author architecture for narrative generation and an end-to-end implementation of the Author model in the StoryBook narrative prose generation system. Finally, we present a formal evaluation of the narratives that StoryBook produces.  相似文献   

20.
物联网是继计算机、互联网之后世界信息技术的第三次革命,是将信息化技术的应 用更加全面地为人类生活和生产服务的信息化大升级,其开发应用前景巨大.目前世界各国已将发展物联网提升为重要的国家发展战略,在我国物联网已成为信息产业中的下一个战略高点.本文用通俗易懂的语言向读者介绍物联网的体系架构,结合现代图书馆管理分析物联网的关键技术,为物联网更加广泛的普及和应用打好基础.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号