The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as so...With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.How...In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.However,com⁃pensatory damages remain a contentious issue,both in theory and in practice,within the legal framework of personal in⁃formation public interest litigation.Through an empirical study conducted within China's judicial practice,this paper reveals that the pending issue concerning the nature and function of compensatory damages has caused highly contra⁃dictory verdicts regarding their calculation and allocation,as well as their relationship with other forms of pecuniary li⁃abilities.Only by acknowledging the role of compensatory damages imposed in personal information public interest liti⁃gation as"Skimming off Excess Profits",and affirming their function as deterrence rather than compensation can they truly achieve the broader objective of safeguarding personal information security and promoting public welfare,as well as avoid disrupting the harmony of the existing legal landscape.展开更多
Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ...Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ATN, there are conflicts between negotiation success and sensitive information protection, that is, these two needs cannot be given priority at the same time, which is a challenging problem to resolve. In this paper, a language independent ATN framework, which is dynamic, flexible and adaptive, is presented to address this problem, ensuring negotiation success without sensitive information leakage. This framework is independent of the policy language which is used. However, the language used should have the capability to specify all kinds of sensitive information appearing in credentials and policies, and support the separation of attribute disclosure from credential disclosure. Thus definitions of new language features, which can be incorporated into existing policy languages, are given, enabling the used language to support the capabilities mentioned above.展开更多
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc...With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation.展开更多
Taking 248 A-share manufacturing listed companies in 2006 Shanghai Stock Exchange as example, using "index method" to measure level of environmental protection infor-mation disclosure, this paper examines th...Taking 248 A-share manufacturing listed companies in 2006 Shanghai Stock Exchange as example, using "index method" to measure level of environmental protection infor-mation disclosure, this paper examines the factors influencing level of environmental protection information disclosure. The findings show that the disclosure level has improved, but the overall level is still low and unable to satisfy information users; there is positive correlation between corporate size, industry type, accounting firm's type and corporate environmental dis-closure index. The companies of large scale and heavy pollu-tion and those audited by international "Big 4" and domestic "Big 10" accounting firms have a high level of environmental disclosure, while the profitability and financial leverage has no impact on the disclosure level. Finally some suggestions are put forward to establish environmental information disclosure sys-tem in China.展开更多
ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information syst...ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system.展开更多
Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information s...Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information system was designed based on the IoT.A detailed analysis was conducted on the problem of rescue vehicle scheduling and the evacuation of trapped persons in the process of fire rescue.Methods The intelligent fire visualization platform based on the three-dimensional(3D)Geographic Information Science(GIS)covers project overview,equipment status,equipment classification,equipment alarm information,alarm classification,alarm statistics,equipment account information,and other modules.The live video accessed through the visual interface can clearly identify the stage of the fire,which facilitates the arrangement of rescue equipment and personnel.The vehicle scheduling model in the system primarily used two objective functions to solve the Pareto Non-Dominated Solution Set Optimization:emergency rescue time and the number of vehicles.In addition,an evacuation path optimization method based on the Improved Ant Colony(IAC)algorithm was designed to realize the dynamic optimization of building fire evacuation paths.Results The experimental results indicate that all the values of detection signals were significantly larger in the smoldering fire scene at t=17s than the initial value.In addition,the probability of smoldering fire and the probability of open fire were relatively large according to the probability function of the corresponding fire situation,demonstrating that this model could detect fire.Conclusions The IAC algorithm reported here avoided the passages near the fire and spreading areas as much as possible and took the safety of the trapped persons as the premise when planning the evacuation route.Therefore,the IoT-based fire information system has important value for ensuring fire safety and carrying out emergency rescue and is worthy of popularization and application.展开更多
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and de...The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and deals with the dualistic horizontal relationship between“the state and individuals.”However,the increasing com-plexity of modern society has led to the emergence of different inter-ests and needs within society and the formation of new social powers,resulting in an unequal relationship between private subjects.In the digital era,this phenomenon has become particularly prominent,ev-idenced by the rise of data-based power and the frequent and serious intrusion of personal information by private subjects.In this context,the value of basic rights should radiate within society and function as a balancing force.taking the protection of personal information as an example,while innovating the idea of regulating society through basic rights,the state’s obligation to protect personal information should be further strengthened.Meanwhile,the direct effect of personal infor-mation rights,which are basic human rights,on the private subjects of data-based power should be established,so as to realize their function in balancing the interests of all parties in society.展开更多
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a...The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.展开更多
Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divi...Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divided into general information and sensitive information,and the use of sensitive information should take"Consent"as its legality basis.In the process of personal information collection,the subject qualification of the collection organization or personnel should be clearly defined,and the starting conditions and process specifications of the collection work should be determined.The use of personal information should be in accordance with legal provisions or agreed ways and purposes and should not violate individual privacy rights and other personality rights,and should not improperly display the"digital image"of individuals.展开更多
Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics c...Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics committee members, and the public, and clarify specific practices of these subjects or entities to meet the requirements of human rights obligations. Based on the human dignity principle, humans must never be used as a means to an end in scientific research. The right to physical and mental health requires the implementation of the principles of informed consent, the primacy of life, and risk control in genome editing, as well as the proper treatment of embryos. The right to privacy corresponds to the confidentiality obligations and non-intervention obligations of relevant parties, and the protection of sensitive personal information points to the special compliance requirements regarding information processing. Differential treatment of genome-edited humans requires objective and reasonable justification, and should also meet the requirements of the proportionality principle.展开更多
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a...The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks.展开更多
The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing ...The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection.展开更多
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol...We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields.展开更多
This article examines current issues of regulation of economical relations in the lnternet environment. Complexities, created by global and virtual features of the Internet economy, are characterize& Problems associa...This article examines current issues of regulation of economical relations in the lnternet environment. Complexities, created by global and virtual features of the Internet economy, are characterize& Problems associated with the implementation of the tax and customs policy, regulation of e-money circulation, virtual labor, intellectual property rights protection and consumer rights, as well as personal information are analyzed. Specifics of economic crimes and problems of their control in a virtual environment are commented. Also, the ways to address these problems are indicated.展开更多
Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasm...Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasmonic encoding patterns because of the technical difficulty of assembling multiplex nanostructures on a single platform,which cannot satisfy the requirements of high encoding capacity for increasing information security.Herein,we developed a strategy based on plasma etching combined with in-situ growth to fabricate patterned arrays of quasi-three-dimensional(3-D)plasmonic Au nano-mushrooms with controlled morphologies,and successfully realized ideal high-capacity plasmonic encoding by arranging Au nano-mushrooms on one platform.On this basis,such multiplex encoding patterns have been transferred to the flexible substrate to realize the triple-mode encryption of the Morse code of"FUNSOM",indicating great prospects in the applications of information encryption and data storage.展开更多
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
基金Project Supported: Beijing National Social Science Foundation (Project number: 13ZHB013), the Chinese National Social Science Foundation (Project number: 12&ZD220 & 13 &ZD 184), and the Chinese National Natural Science Foundation (Project number: 71133006/G0314).
文摘With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
文摘In contrast to private interest litigation,public interest litigation provides a more potent solution to personal information infringements marked by extensive scope,unspecified victims,and limited individual loss.However,com⁃pensatory damages remain a contentious issue,both in theory and in practice,within the legal framework of personal in⁃formation public interest litigation.Through an empirical study conducted within China's judicial practice,this paper reveals that the pending issue concerning the nature and function of compensatory damages has caused highly contra⁃dictory verdicts regarding their calculation and allocation,as well as their relationship with other forms of pecuniary li⁃abilities.Only by acknowledging the role of compensatory damages imposed in personal information public interest liti⁃gation as"Skimming off Excess Profits",and affirming their function as deterrence rather than compensation can they truly achieve the broader objective of safeguarding personal information security and promoting public welfare,as well as avoid disrupting the harmony of the existing legal landscape.
文摘Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ATN, there are conflicts between negotiation success and sensitive information protection, that is, these two needs cannot be given priority at the same time, which is a challenging problem to resolve. In this paper, a language independent ATN framework, which is dynamic, flexible and adaptive, is presented to address this problem, ensuring negotiation success without sensitive information leakage. This framework is independent of the policy language which is used. However, the language used should have the capability to specify all kinds of sensitive information appearing in credentials and policies, and support the separation of attribute disclosure from credential disclosure. Thus definitions of new language features, which can be incorporated into existing policy languages, are given, enabling the used language to support the capabilities mentioned above.
文摘With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation.
基金Northwestern Polytechnical University and the support of 2006 and 2007 scientific research project of Xi’an international studies university to this item
文摘Taking 248 A-share manufacturing listed companies in 2006 Shanghai Stock Exchange as example, using "index method" to measure level of environmental protection infor-mation disclosure, this paper examines the factors influencing level of environmental protection information disclosure. The findings show that the disclosure level has improved, but the overall level is still low and unable to satisfy information users; there is positive correlation between corporate size, industry type, accounting firm's type and corporate environmental dis-closure index. The companies of large scale and heavy pollu-tion and those audited by international "Big 4" and domestic "Big 10" accounting firms have a high level of environmental disclosure, while the profitability and financial leverage has no impact on the disclosure level. Finally some suggestions are put forward to establish environmental information disclosure sys-tem in China.
文摘ith urban reformation and opening becoming deeper,the work of protection against earthquake and disaster reduction would be more important.In this paper,some ideas are suggested about establishing the information system for emergency decisions on protection against earthquake and disaster reduction in cities .The information system mainly includes a subsystem for rapid evaluation of damage loss from earthquake (which includes input of seismic information,distribution of earthquake intensity,evaluation of seismic fragility on all social factors and etc.) and a subsystem for the decisive information of seismic emergency(which mainly includes project of disaster relief,project of personnel evacuation,dangerous degree warning for the dangerous articlesstoring places and protection measures against them,assistant decision on fire due to earthquake,location of headquarter for providing disaster relief,and etc.). It is thought that the data investigation and collection about all kinds of buildings(including lifeline engineering)are the most important and difficult work as establishing this system.
基金Supported by the Key Area Research and Development Program of Guangdong Province(2019B111102002)Shenzhen Science and Technology Program(KCXFZ202002011007040)National Key Research and Development Program of China(2019YFC0810704)。
文摘Background This work aims to build a comprehensive and effective fire emergency management system based on the Internet of Things(IoT)and achieve an actual intelligent fire rescue.A smart fire protection information system was designed based on the IoT.A detailed analysis was conducted on the problem of rescue vehicle scheduling and the evacuation of trapped persons in the process of fire rescue.Methods The intelligent fire visualization platform based on the three-dimensional(3D)Geographic Information Science(GIS)covers project overview,equipment status,equipment classification,equipment alarm information,alarm classification,alarm statistics,equipment account information,and other modules.The live video accessed through the visual interface can clearly identify the stage of the fire,which facilitates the arrangement of rescue equipment and personnel.The vehicle scheduling model in the system primarily used two objective functions to solve the Pareto Non-Dominated Solution Set Optimization:emergency rescue time and the number of vehicles.In addition,an evacuation path optimization method based on the Improved Ant Colony(IAC)algorithm was designed to realize the dynamic optimization of building fire evacuation paths.Results The experimental results indicate that all the values of detection signals were significantly larger in the smoldering fire scene at t=17s than the initial value.In addition,the probability of smoldering fire and the probability of open fire were relatively large according to the probability function of the corresponding fire situation,demonstrating that this model could detect fire.Conclusions The IAC algorithm reported here avoided the passages near the fire and spreading areas as much as possible and took the safety of the trapped persons as the premise when planning the evacuation route.Therefore,the IoT-based fire information system has important value for ensuring fire safety and carrying out emergency rescue and is worthy of popularization and application.
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
基金the national major project of social sciences“Research on Chinese Characteristics and System Construction of the Constitution Implementation Guarantee Mechanism”(Project Approval No.20ZDA030)the Ministry of Education Humanities and Social Science Key Base major project“New Development of Human Rights and Basic Rights in the Context of a New Era of Smart Society”(Project Approval No.19JJD820011)。
文摘The main function of basic rights is to defend against the state’s public power.the traditional theory of basic rights con-structs logic based on the dualistic framework of“state power and individual rights,”and deals with the dualistic horizontal relationship between“the state and individuals.”However,the increasing com-plexity of modern society has led to the emergence of different inter-ests and needs within society and the formation of new social powers,resulting in an unequal relationship between private subjects.In the digital era,this phenomenon has become particularly prominent,ev-idenced by the rise of data-based power and the frequent and serious intrusion of personal information by private subjects.In this context,the value of basic rights should radiate within society and function as a balancing force.taking the protection of personal information as an example,while innovating the idea of regulating society through basic rights,the state’s obligation to protect personal information should be further strengthened.Meanwhile,the direct effect of personal infor-mation rights,which are basic human rights,on the private subjects of data-based power should be established,so as to realize their function in balancing the interests of all parties in society.
文摘The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.
文摘Big data is playing an important role in preventing,control and monitoring COVID-19,but during the process,the legality of the use of personal information shall be paid attention to.Personal information should be divided into general information and sensitive information,and the use of sensitive information should take"Consent"as its legality basis.In the process of personal information collection,the subject qualification of the collection organization or personnel should be clearly defined,and the starting conditions and process specifications of the collection work should be determined.The use of personal information should be in accordance with legal provisions or agreed ways and purposes and should not violate individual privacy rights and other personality rights,and should not improperly display the"digital image"of individuals.
基金phased result of the project “study on the legislation of genome editing in human embryos”(Project No. 19SFB2035)National Rule of Law and Legal Theory Research Program by the Ministry of Justice in 2019。
文摘Introducing the human rights perspective into the multi-dimensional governance of human genome editing activities would help define boundaries for the behaviors of stakeholders such as the state, researchers, ethics committee members, and the public, and clarify specific practices of these subjects or entities to meet the requirements of human rights obligations. Based on the human dignity principle, humans must never be used as a means to an end in scientific research. The right to physical and mental health requires the implementation of the principles of informed consent, the primacy of life, and risk control in genome editing, as well as the proper treatment of embryos. The right to privacy corresponds to the confidentiality obligations and non-intervention obligations of relevant parties, and the protection of sensitive personal information points to the special compliance requirements regarding information processing. Differential treatment of genome-edited humans requires objective and reasonable justification, and should also meet the requirements of the proportionality principle.
文摘The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks.
文摘The protection of personal information plays an extremely important role in the construction of digital government.The duty to inform is a prerequisite core obligation that the government should fulfill in processing personal information,a concrete expression of the right to self-determination of personal information,and a prerequisite for the right to protection of personal information that works as a fundamental right to defense the intrusion from the government,as well as a procedural regulatory tool to restrain the government’s information power and prevent the risk of infringement.As the rules on the processing of personal information and the duty to inform have both the nature of public law,the government’s processing of personal information is also public law in nature,especially because of the constitutional value and power control function of the duty to inform,the construction of a system for the duty to inform cannot be copied from the rules applicable to private subjects,but should be tailored to the public law characteristics of the government’s processing of personal information,overcoming the shortcomings of the current rough and fragmented legislation,and set up a systematic regulation based on the public law in term of the legal subject,procedure,content,consequences of obligation violations and legal protection.
基金Supported by the National Natural Science Foundation of China(70373047)
文摘We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields.
文摘This article examines current issues of regulation of economical relations in the lnternet environment. Complexities, created by global and virtual features of the Internet economy, are characterize& Problems associated with the implementation of the tax and customs policy, regulation of e-money circulation, virtual labor, intellectual property rights protection and consumer rights, as well as personal information are analyzed. Specifics of economic crimes and problems of their control in a virtual environment are commented. Also, the ways to address these problems are indicated.
基金supported by the National Natural Science Foundation of China(21822202,22072104)the National Key R&D Program of China(International Collaboration program)granted by Chinese Ministry of Science and Technology(2018YFE0200700)+1 种基金project funded by Suzhou Key Laboratory of Functional Nano&Soft Materials,Collaborative Innovation Center of Suzhou Nano Science&Technologythe 111 Project,Joint International Research Laboratory of Carbon-Based Functional Materials and Devices。
文摘Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasmonic encoding patterns because of the technical difficulty of assembling multiplex nanostructures on a single platform,which cannot satisfy the requirements of high encoding capacity for increasing information security.Herein,we developed a strategy based on plasma etching combined with in-situ growth to fabricate patterned arrays of quasi-three-dimensional(3-D)plasmonic Au nano-mushrooms with controlled morphologies,and successfully realized ideal high-capacity plasmonic encoding by arranging Au nano-mushrooms on one platform.On this basis,such multiplex encoding patterns have been transferred to the flexible substrate to realize the triple-mode encryption of the Morse code of"FUNSOM",indicating great prospects in the applications of information encryption and data storage.