首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 359 毫秒
1.
As security and safety requirements were not considered during the creation of networks, there is a growing number of threats for individuals, enterprises, government agencies and organizations. This paper reviews these threats and the difficulties of dealing with them now. The Internet, as a consequence, is hardly adequate for processing sensitive information, because it can be protected neither by technology nor by law. In this situation, future “information societies” will be more risk-oriented than today: individual rights will be less significant and traditional legal instruments will need to be adapted to different sets of values.  相似文献   

2.
��[Purpose/significance] Under ubiquitous information environment, the sharing of the cloud, personalized service process and ubiquitous access increase the privacy threat of users. Exploring the weaken factors on perceived threats of personal cloud storage users and their coping strategies will help to analyze users' complicated information protection action, and promote the further development and large-scale application of cloud storage services.[Method/process] Drawing upon the optimism bias and coping theories in psychology, based on the research logic "weaken factors→perceived threat→coping", we analyzed different influences on perceived threat of 3 factors (i.e., optimism bias, prior experience and the official certification), and verified the moderating effect of optimism bias between perceived threats and coping behavior. Through the online questionnaire survey, we tested the model with the partial least square method.[Result/conclusion] The results reveal that prior experience and optimistic bias negatively affect perceived threat of cloud storage users, while official certification does not play a significant role. Besides, optimistic bias will be negative to adjust the relationship between perceived threat and emotion-focused coping, but will not affect the relationship between perceived threat and emotion-focused coping. The results help reveal the law and internal mechanism of personal cloud storage users' perceived threats and coping strategy, and provide advices and references for risk control of the cloud service providers and regulatory policies of Industry and Information Technology Ministry.  相似文献   

3.
[目的/意义] 泛在信息环境下,云内的共享性、个性化服务过程及泛在接入使得用户的隐私威胁不断加大,探索用户感知威胁的削弱因素及应对策略,将有助于解析泛在信息环境下用户自身复杂的信息保护行为,促进云存储服务的进一步发展和规模化应用。[方法/过程] 结合心理学中的乐观偏差及应对理论,基于削弱因素--感知威胁--应对策略的研究逻辑,从乐观偏差、使用经验、官方认证3个维度分析对云存储用户感知威胁的不同影响,并验证乐观偏差对感知威胁到应对策略的调节作用。通过在线问卷调查,采用偏最小二乘法对结构模型进行估计。[结果/结论] 研究发现,使用经验、乐观偏差负向影响感知威胁,而官方认证的作用并不显著。此外,乐观偏差会负向调节感知威胁与问题应对之间的关系,但不会影响其与情绪应对的关系。研究结果可有助于揭示云储存用户感知威胁与应对策略的发生规律及内在机理,并为云服务提供商的风险管控以及国家工信部门的监管政策提供建议和参考。  相似文献   

4.
美国高等院校图情学教育的危机与困惑   总被引:18,自引:0,他引:18  
美国高等院校图情学教育的危机与困惑金旭东宁苹ABSTRACTTodiscussthethreatstoandconfusionoflibraryandinformationscienceeducationintheUnitedStates,theau...  相似文献   

5.
The paper examines the management of change and the embedding of innovation in academic libraries and information services during a period of considerable and continuous change. Detailed examples are given from the author's own institution that adopts a very structured and corporate approach to strategic planning. The internal and external factors driving organisational change in the UK Higher Education (HE) sector are identified using a PEST (Political, Economic, Social, Technological) analysis, and a detailed SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is presented which will enable institutions to assess the strengths, weaknesses, opportunities and threats of their services being able to deliver the changes required. Examples are given of the kinds of changes library and information services will need to implement in order to respond effectively to the changing external environment. Some of the barriers to the successful implementation of change are identified, with some practical measures to bear in mind to help ensure successful outcomes.  相似文献   

6.
This case study describes collaboration between an instructor and business librarian to maximize a one-shot information literacy session for a required marketing class for business majors. It includes an active-learning exercise where groups use three key business databases to conduct a company and industry analysis and an environmental scan for a company. The instructor then guides them in developing a strengths, weaknesses, opportunities, threats (SWOT) analysis. This session prepares students for the SWOT analysis they will have to submit for their actual projects. This article includes assessment of groups' in-class exercises as well as citation analysis of the assignments they turned in for their actual projects.  相似文献   

7.
8.
Aboriginal communities in Australia have adopted new information technologies in innovative ways. The most well known is the Ara Irititja project software, now increasingly adopted by many local community groups in Australia. These developments demand a policy response from public collecting institutions and governments. There is a raft of opportunities being presented by current archival and record-keeping, and information and record-development programs and activities in Aboriginal communities. These include economic empowerment through the development and distribution of new products; community empowerment through “owning” histories, stories, images and other associated material and being able to manage the context of, and access to this material; and the development of opportunities for young people. Accompanying these opportunities, however, are serious threats to the protection, preservation, collection and use of this material. These threats are both immediate and long-term and include technology changes and format shifting; physical threats to local collections; the lack of IT expertise and archival knowledge; a lack of knowledge or agreement on the archiving system, standards and principles, and many others. This paper proposes that archives held, and being developed in Aboriginal communities, are developed as a nationally distributed collection with community-generated protocols and community-based management, supported within a fully integrated national framework.  相似文献   

9.
This paper explores the impact of new information technologies on the development of social communication and social systems. The properties and features of the modern information environment are analyzed. The factors and technologies of information warfare and confrontation are investigated. The role of information communication technologies in the operation of social-network movements is demonstrated. The means and methods of the mass media, social networks, and destructive network technologies that are applied to manipulate group behavior and to transform public opinion are exposed. The potential of sociodynamics as a new instrument of targeted impact on social systems is explored. Possible risks and threats that face the development of telecommunication systems and networks are assessed. Conclusions and relevant activities are formulated to prevent the rise of information confrontations and to mitigate hidden impacts and threats to the country’s social-economic, scientific, and technological development.  相似文献   

10.
数字档案服务工作在日益稳健推进的过程中产生了大量数字档案用户个人信息,如何在复杂的大数据环境中妥善保障用户个人信息安全是关乎档案事业发展前景的重要问题。本文基于数字档案用户个人信息的相关特点,分析大数据环境下个人信息面临的现实困境,从网络空间安全威胁、国家法律规约、用户信息素养等角度分析其原因,强调应拓宽法律保护途径,提高技术保护能力,增强用户信息素养以及防范新型档案传播方式带来的信息安全风险。  相似文献   

11.
This study assessed the security of the U.S. state e-government sites to identify opportunities for and threats to the sites and their users. The study used a combination of three methods – web content analysis, information security auditing, and computer network security mapping – for data collection and analysis. The findings indicate that most state e-government sites posted privacy and security policy statements; however, only less than half stated clearly what security measures were in action. Second, the information security audit revealed that 98% of the sites secured users' accounts with SSL encryption for data transmission, and the sites' search tools enable public users to search for public information only. Third, although the sites had most of their internet ports filtered or behind firewalls, all of them had their main IP addresses detected and their port 80/tcp open. The study discussed the threats and opportunities and suggested possible solutions for improving e-government security.  相似文献   

12.
研究图书馆2020:嵌入式协作化知识实验室?   总被引:11,自引:1,他引:10  
研究图书馆正面临着价值质疑、贡献边缘化等危机,而解决危机必须从重新认识研究图书馆支持科技创新的目标与需要出发。通过对科技创新工作流中新的关键知识瓶颈进行分析,认为当前和未来科技创新需要宏知识、科研数据管理和基于知识的交互协同创造能力。图书馆服务应抓住机遇,建立支持战略性知识需求的新型知识服务范式,建立覆盖综合科技创新资源和覆盖科研过程的新型知识管理模式,建立支持合作创新、群组学习和交互传播的协同知识服务能力。以中国科学院文献情报体系为例,提出要建设综合数字知识基础设施,完善科技发展态势监测分析服务,构建嵌入科研一线的科研知识服务,建立虚实结合的协同知识服务机制。  相似文献   

13.
网络环境下档案信息开放存取的SWOT分析   总被引:1,自引:0,他引:1  
计算机技术、通信技术和网络的出现给档案信息服务工作带来深刻影响。传统档案信息服务已不能满足公众档案信息需求。网络环境下,信息开放存取(OA)对档案工作有重要借鉴意义和影响,鉴于此,文章认为档案信息OA应成为档案部门拓展档案信息资源开发利用新路径,在具体分析档案信息OA的优势、弱势、机会和威胁后,提出了几种优势互补、扬长避短的组合策略。  相似文献   

14.
分析当前云图书馆所面临的安全威胁,总结目前图书馆行业安全技术的应用现状,通过引入信任管理机制,尝试构建云图书馆可信服务监督体系。建立可信服务监督模型,对云图书馆服务中动态信任评估所涉及的关键问题进行深入探讨。针对云图书馆服务模式下信任度信息无法有效共享的问题,设计一种云图书馆服务信任本体CLTM-Ont,对动态信任评估过程中的反馈信任度和信任上下文匹配等进行算法设计,以推动云图书馆可信服务环境的形成,保障数字资源安全及用户个人隐私。  相似文献   

15.
e-Science与文献情报服务的变革   总被引:9,自引:0,他引:9  
e-Science是一种新的数字科研环境,它的高共享性、高协同性等特性将变革文献情报服务的用户环境,从而使得文献情报服务的服务理念、服务内容、服务手段等方面发生深刻变化,文献情报服务的服务理念将从以需求拉动服务转变为以服务促进需求;知识服务将成为文献情报服务的核心竞争力;将出现新的服务对象如科学数据;嵌入式服务将成为服务的主要组织方式;一站式服务、联合服务等将是实现e-Science环境下文献情报服务的主要手段。  相似文献   

16.
论电子档案开放利用中信息安全保障存在的问题与对策   总被引:2,自引:0,他引:2  
本文论述了电子档案开放利用中信息安全面临的主要威胁和存在的问题,在此基础上,提出了保障电子档案信息安全应采取的多项对策,进而提出在网络环境下电子档案开放利用信息安全保障体系。  相似文献   

17.
This article is aimed at examining the causes of insecurity and violence in Nigeria and around the world. It discusses the active roles libraries play in promoting peace and security in different countries. It highlights the fact that several threats to lives, ranging from terrorism, communal and tribal clashes, kidnapping, pollution, health, physical and environmental hazards, and economic crisis among others, can be curbed through information and intelligence services. Premised on these, this article seeks to analyze and make recommendations for the promotion of literacy by libraries, build collaborative relationships between librarians and security operatives, and provide suggestions for the provision of current information against terrorism and security of lives and properties. It also seeks to provide current news on terrorism and intelligence services in Nigeria and around the world, and on social and national security for peaceful co-existence in communities.  相似文献   

18.
19.
图书馆与学习型社会   总被引:2,自引:0,他引:2  
构建读书型社会的过程就是人类摆脱学习的实用功利行为而逐渐走向阅读愉悦、超越物质追求的精神享受过程;图书馆在读书型社会中是不可替代的信息文献中心,也是保障公民信息公开享有权的最好场所;构建读书型社会是图书馆的自觉追求,并大有可为,倡导读书、吸引读者到图书馆读书是图书馆最日常和基本的责任与义务,同时走普及与提高相结合的工作路线,紧紧围绕“送书下乡工程”和“文化信息资源共享工程”普及与提高的这两个龙头来开展工作。  相似文献   

20.
一种敏感信息共享隐私保护框架   总被引:1,自引:0,他引:1  
刘小波 《图书情报工作》2011,55(13):116-120
通过对敏感信息共享中的隐私威胁分析,探讨敏感信息共享的隐私保护技术策略,并在此基础上提出一种敏感信息共享隐私保护框架,该框架可实现隐私访问策略的形式化表示以及基于语义的信息匿名化计算。最后,对实现该框架的关键技术进行简要介绍。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号