首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
网络信息资源的无限共享模式   总被引:22,自引:1,他引:22  
黄郴 《情报理论与实践》2001,24(2):84-85,114
Network is a new environment of information resources sharing. This paper analyzes the problems now existing in the construction of network information resources and in network information resources sharing. It also puts forward some proposals for constructing a pattern of unlimited sharing of network information resources.  相似文献   

2.
On February 21, 2012, a new global network using quantum communication technology to transmit financial information was launched at the Xinhua News Agency in Beijing. The network, jointly developed by scientists from the University of Science and Technology of China (USTC) and Xinhua workers, supports confidential audio-visual communication, real-time text transfers and the rapid transmission of data files with a bandwidth of hundreds of megabits, and can guarantee the absolute security and high efficiency of data transmission compared  相似文献   

3.
浅谈网络资源的组织   总被引:1,自引:0,他引:1  
The rapid growth of Intemet resources has brought great inconvenience to users in searching for useful information. How to organize Internet resources effectively has become a problem of concern to information organizers and users. This article analyzes the essential impact of Intemet resources on information organization, and discusses the difficulties of Intemet resources organization. Finally, it introduces some research examples of Intemet resources organization in foreign countries.  相似文献   

4.
情报交流研究的文本阐释学取向引论   总被引:5,自引:2,他引:5  
With a review of the evolution of the theory of hermeneutics, this paper raises the problem of knowledge gap in information communication, and from the viewpoint of hermeneutics, analyzes its crux and key issues to be resolved. It further discusses the cognitive viewpoints in information studies, compares them with the text receiving theory and stresses the positions and roles of information users as the main part in information communication. Finally, it concludes that the inevitability and impoaance of using hermeneutics to study information communication deserves to be studied and practiced in depth and breadth.  相似文献   

5.
专业信息服务网站的开展研究   总被引:2,自引:0,他引:2  
  相似文献   

6.
Electronic Commerce is a new business mode. Proceeding from information communication, this paper analyzes the information communication mode in Electronic Commerce, the impetus of information communication to Electronic Commerce and the influence of information communication on all stages of Electronic Commerce.  相似文献   

7.
我国信息服务业的发展策略研究   总被引:7,自引:0,他引:7  
With a brief introduction to the characteristics of information service industry, this article analyzes the gap between the information service industry in China and abroad, and predicts the challenges and chances brought by China's acceding to WTO to the information service industry in China. Suggestions about the develolanent of the information service industry in China are also given.  相似文献   

8.
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individually chosen by them. This is the first time to have put the right of communication through information network in place in the law in China. But, the legislators did not make any specific provisions concerning this right in the Copyright Law.  相似文献   

9.
电子商务中的安全数字签名技术   总被引:2,自引:0,他引:2  
The security requirement in electronic commerce and the way to realize digital signature are introduced. A scheme of securing digital signature is discussed. Finally, the article analyzes the security problem of this scheme.  相似文献   

10.
In today‘s Information Age, the protection of information is of critical importance for national security, business firms, and private individuals. The common long-dis-tance communication technology is poor in keeping privacy as it is vulnerable to eavesdropping. Quantum cryptography,  相似文献   

11.
我国农村社会保障制度创新研究   总被引:19,自引:0,他引:19  
目前,农村社会保障整体水平下滑,成为制约整个农村社会经济发展的瓶颈,建立新的农村社会保障制度已迫在眉睫。农村社会保障制度创新的原则是低水平,广覆盖,逐步完善。内容主要包括最低生活保障、医疗保险、养老保险和教育救助。  相似文献   

12.
网络上信息内容的安全侧重于保护信息的保密性、真实性和完整性。避免攻击者利用系统的安全漏洞进行窃听、冒充、诈骗等有损于合法用户的行为。本质上是保护用户的利益和隐私。  相似文献   

13.
信息时代的网络文化生态安全危机与化解   总被引:2,自引:0,他引:2  
解学芳  臧志彭 《情报科学》2008,26(5):767-773
信息时代的网络文化是一种技术文化,是新媒介技术与文化主体交融的结晶,表现出数字化、网络化、信息化为标志的生存状态。而恰是这一生存状态带来了新的文化安全问题,即网络文化生态安全危机。它主要表现在网络文化多样性危机、网络信息污染危机、信息膨胀与信息短缺导致的网络文化生态结构危机、网络安全危机、网络生态个体危机等方面。因此,在信息时代,维护网络文化生态安全要遵循内在的发展规律,以绿色的网络文化生态为目标,正确看待网络文化,并通过宏观层面的政府、中观层面的行业组织以及微观层面的企业的协同治理来实现。  相似文献   

14.
谢永  丁云正 《科技广场》2010,(3):234-236
网络安全作为计算机科学专业本科生的重要专业课程,对培养和提高学生网络安全与管理应用能力显得极为重要。Witkey模式是一种新型的价值体现模式,可充分调动人的积极性解决相关领域问题,因此可以作为一种提高学习者学习动力、激发学习热情的一种有效的激励措施。本文将Witkey模式应用到网络安全课程的教学改革中,着重从教学实践方面详细阐述了改革的主要思路与措施。实践结果表明,此次网络安全课程教学改革取得了良好的教学效果。  相似文献   

15.
基于演化博弈论的信息安全攻防问题研究   总被引:1,自引:0,他引:1  
本文利用演化博弈论研究信息安全的攻防问题,为解决现实社会中的信息安全问题提供了有益的建议。首先建立信息安全攻防的博弈模型,分析防守方和攻击方的复制动态及进化稳定策略。进而根据攻击方与防守方两群体复制动态的关系,得出信息安全攻防对抗的规律和长期稳定趋势,为解决现实社会中的信息安全问题提供了新的思路。  相似文献   

16.
网络信息安全问题,已经成为制约网络经济进一步发展的重要瓶颈.Web数据挖掘技术是提升网络信息安全防范绩效的关键技术.本文在构建基于Web数据挖掘的网络信息安全防范模型后,还对建立在Web数据挖掘基础上的网络信息安全防范模型运行的基本原理、Web挖掘的数据资源、Web挖掘的技术方法、防范模型的主要应用、模型运行的注意事项等进行了深入分析.  相似文献   

17.
随着网络时代的来临,计算机网络带来了无穷的资源,但也面临着越来越严重的网络安全威胁,网上信息的安全和保密是一个至关重要的问题。网络的安全措施应是能全方位地针对各种不同的威胁和脆弱性,这样才能确保网络信息的保密性、完整性和可用性,文章重点介绍了局域网信息面临的威胁、安全控制与病毒防治的一些策略。  相似文献   

18.
网络环境下信息安全的技术保护   总被引:16,自引:2,他引:14  
刘晓敏 《情报科学》1999,17(2):122-125,184
网络化在给信息交流带来方便的同时,也使信息的安全性问题变得日益严重,法律与技术保护是维护信息安全的重要途径。本文主讨论了信息安全的技术保护措施,包括密码技术、安全控制技术与安全保护技术。  相似文献   

19.
Network security is becoming a prominent issue for the development of information technology, and intelligent network attacks pose great challenges to system security due to its strong concealment. The existence of these attacks threatens the operation process of the complicated control system. Motivated by such a security problem, we study the secure distributed filtering algorithm under a kind of complex data integrity attack which can attack in two forms. We design a detection mechanism based on local outlier factor to distinguish the rightness of exchanged data, which determines whether to fuse the estimates by comparing the local density (LD) of the estimation of each sensor. Such a detection mechanism does not need the sensor to transmit redundant data information, thus greatly saving calculation cost and improving transmission efficiency. Meanwhile, we optimize the distributed filtering algorithm and obtain a suboptimal estimation gain. Finally, we demonstrate a numerical example to verify the availability of the filtering algorithm, and explore the influence of detector parameters on the performance of the estimation system.  相似文献   

20.
数字图书馆网络与信息系统安全评估指标体系研究   总被引:1,自引:0,他引:1  
本文依据数字图书馆面临的安全威胁,提出了一种定性分析与定量计算相结合的风险评估模型,构建了数字图书馆网络信息安全保障与安全建设体系。该评估体系具有可行性和指导性,对数字图书馆网络与信息系统安全防护和管理起到指导作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号