期刊文献+

国际网络信息研究的主题分析

Subject Analysis of International Network Information Research
下载PDF
导出
摘要 通过检索Web of Science平台,获得国际上关于网络信息研究的相关文献共2613条,利用Excel、Cite Space工具,通过关键词共现的方法,揭示了目前国际上对网络信息的研究主题主要集中在网络安全、社交网络以及无线网络这3个方面,同时指出对网络安全和信息安全的研究是不可忽视的问题,指出研究者要进一步加大对网络信息安全问题的研究和关注。 By searching the Web of Science platform,2613 international relevant literatures on network information research are obtained.Using Excel and Cite Space tools and the method of keyword cooccurrence,it is revealed that the current international research topics on network information mainly focus on three aspects:network security,social network and wireless network.At the same time,it points out that the research on network security and information security can not be ignored,and points out that researchers should further increase the research and attention on network information security.
作者 陈京莲 CHEN Jinglian(Library of Jinggangshan University,Ji'an,Jiangxi Province,343009 China)
出处 《科技资讯》 2021年第14期62-65,69,共5页 Science & Technology Information
关键词 网络信息 信息安全 中心性 主题 网络安全 Network information Information safety Centrality Theme Network security
  • 相关文献

参考文献7

二级参考文献75

  • 1马费成,张勤.国内外知识管理研究热点——基于词频的统计分析[J].情报学报,2006,25(2):163-171. 被引量:515
  • 2DANAH B, KATE C. Six Provocations for Big Data [ EB/OLI. [ 2011-09-21 ]. http : //softwarestudies. com/cuhural_ analyt- ics/Six_Provocations_for Big Data- pdf.
  • 3SIMMONS J L. Buying you : the government's use of fourth-par- ties to launder data about the people [ J]. Columbia Business Law Review, 2009 (3): 956.
  • 4FROOMKIN A M. The Internet as a source of regulatory arbi- trage [ MI //KAHIN B, NESSON C. Borde~ in cyberspace: information policy and the global information structure. Massa- chusetts, MITPress, 1997: 129.
  • 5DUPONT B. The cyber security environment to 2022 : trends, drivers and implications [ EB/OL]. [2013-01-29 ]. http: // papers, ssm. com/sol3/papers, cfm? abstract_id = 2208548.
  • 6IRA R. Big data: the end of privacy or a new beginning? [J]. International Data Privacy Law, 2013, 3 (2) : 74.
  • 7KUNER C, CATE F H, MILLARD C, et al. The challenge of "Big data" for data Protection [ J]. International Data Privacy Law, 2012, 2 (2): 47-49.
  • 8TENE O, POLONETSKY J. Big data for all: privacy and user control in the age of anatytics [ J]. Northwestern Journal of Technology and Intellectual Property, 2013 (5) : 261.
  • 9INSTITUTE M G. Big data: the next frontier for innovation, competition, and productivity [ EB/OL]. [ 2011-06-04 ]. ht- tp : //www. mckinsey, com/insights/business_ technology/big_ data the next frontier for innovation.
  • 10TELANG R, WATFAL S. Impact of software vulnerability an- nouncements on the market value of software vendors-an empiri- cal investigation [ J]. IEEE Transactions on Software Engineer- ing, 2007, 33: 8.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部