The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to ac...In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.展开更多
With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Sinc...With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation.展开更多
In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the ...In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat...It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .展开更多
As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environment...As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information.展开更多
Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in t...Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests.展开更多
The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy r...The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.展开更多
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua...In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.展开更多
We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the infor...We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling ∇Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories).展开更多
Mobile SNS is one of the most popular topics of mobile Internet.In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources,the...Mobile SNS is one of the most popular topics of mobile Internet.In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources,the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios,the system makes use of the existent specification of FOAF(Friendof-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites.Ticket-based Access Authorization System(TAAS) is provided to grant permission to acquire resources on personal portal.Meanwhile,the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios.展开更多
This paper presents the evaluation results of protective performance of the respirators(full face supplied-fresh air respirators and half-mask active charcoal filter) and personal exposure measurement (Infacepiece sam...This paper presents the evaluation results of protective performance of the respirators(full face supplied-fresh air respirators and half-mask active charcoal filter) and personal exposure measurement (Infacepiece sampling) in a Belgian viscose rayon factory. With in-facepiece sampling technique and personal sampling method, we measured the CS2 concentrations inside and outside of the dirferent respirators. We found two kinds of the respirators have significant effect on decreasing the CS2, exposure level for the subject,especially for the spinners. Full face supplied-fresh air respirator have good protective effect for the spinners and have limit protection for the high exposure Job although the PF value is more than 10. It still need to improve more. In-facepiece sampling for all the subjects exposed to CS2, in the factory found most subjects have exposed to low CS2, concentration, most exposure levels were under the control range, but sulfuror are high exposure, the exposure level is higher than ACGIH TLV value.展开更多
For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on t...For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to "the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)". We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system.展开更多
With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce ...With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce casualties and maintain military combat effectiveness,is widely developed.This paper systematically reviewed various PPE based on individual combat through literature research and comprehensive discussion,and introduced in detail the latest application progress of PPE in terms of material and technology from three aspects:individual integrated protection system,traditional protection equipment,and intelligent protection equipment,respectively,and discussed in depth the functional improvement and optimization status brought by advanced technology for PPE,focusing on the achievements of individual equipment technology application.Finally,the problems and technical bottlenecks in the development of PPE were analyzed and summarized,and the development trend of PPE were pointed out.The results of the review will provide a forward-looking reference for the current development of individual PPE,and are important guidance for the design and technological innovation of advanced equipment based on the future technological battlefield.展开更多
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met...This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, an...An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed.展开更多
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
文摘In criminal procedures,the right to personal information does not conform to the human rights characteristics of criminal procedures centered on due process right,in which the right to be forgotten and the right to access data possess no attributes of independent litigation right.The theory of the independent right to personal information lacks a legitimate basis and should not be used as the protection model for personal information in criminal proceedings.Given the particularity of interest measurement and the individuality and negativity of human rights in criminal procedures,the protection of personal information in the criminal procedure should be aimed at the risk of transformation from collective general information to private sensitive information.Specifically,it is the right of personal information not to be excessively collected.Accordingly,the personal information protection should be included in the scope of criminal procedures by the conceptual interpretation of the informational privacy,i.e.,the dependency protection model.In this regard,the criminal proceeding should appropriately introduce the basic principles of personal information protection and the limited general forensic to deal with the impact and challenge of emerging right claim on the criminal justice system.
基金Project Supported: Beijing National Social Science Foundation (Project number: 13ZHB013), the Chinese National Social Science Foundation (Project number: 12&ZD220 & 13 &ZD 184), and the Chinese National Natural Science Foundation (Project number: 71133006/G0314).
文摘With the development of the internet and the increasing role played by information technology in the economy,personal information protection has become one of the most significant legal and public policy problems.Since 2013,China has accelerated its legislation efforts towards protecting personal information.The Cybersecurity Law of the People's Republic of China took effect on June 1,2017.Legal scholars focus on the nature of personal information,discuss the necessity of enacting specific laws on protecting personal information,and attempt to propose relevant draft laws regarding personal information protection.Personal information protection,however,is not only a legal issue but also a political one.We need to look at the decision-making process about legislation on personal information protection in China.Why has China sped up its legislation on personal information protection since 2013?Is privacy,civil rights,or legal interest the main reason behind the legislation?Only after placing personal information protection legislation in a broader context,can we have a better understanding of the underlying logic and dynamics of personal information protection in China,and can perceive the potential content and possible future of these legislation.This paper argues that Internet industry development,the social consequences of personal information infringement,and national security are the main drivers of China's personal information protection legislation.
文摘In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .
基金an initial progress of the“Research on Improving the Central Supervision System of Ecological and Environmental Protection”(Project No.21ZDA088)a National Social Science Foundation Major Project of the Research on the Interpretation of the Spirit of the Fifth Plenary Session of the 19th CPC Central Committee。
文摘As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information.
文摘Protecting personal credit information through constitutional rights is not only essemtial for individuals to defend against infringements on their personal credit information rights and interests by public power in the social credit system,but also a requirement for unified legislation on social credit to explore the basis for constitutional norms.In the era of the credit economy,personal credit information has become a vital resource for realizing personal autonomy.Along with the increase in the state’s supervision and control of personal credit,the realization of the autonomous value in the interests related to personal credit information has also set more obligations for the state.Therefore,interests related to personal credit information should be regarded as a constitutional right.Because of its significant economic interest and value,the right to personal credit information should be classified as a constitutional property right.As a constitutional property right,the right to personal credit information can not only help protect people’s economic interests,but also achieve the goal of safeguarding their personality interests.
文摘The model for protection of personal information dis-closed according to the law has changed from indirect protection to direct protection.The indirect protection model for traditional repu-tation rights and privacy rights was not enough to meet the practical needs of governance.However;due to the ambiguity in the application of the“reasonable”processing requirements,the direct protection model centered on Article 27 of the Personal Information Protection Law also is not enough to effectively respond to practical disputes.The essence of the problem is to resolve the tension between informa-tion circulation and risk control and reshape the legal order for the protection of personal information disclosed according to the law.The determination of“reasonable”should be centered on the scenario theory and holism interpretation and carried out by using the interpre-tation technique of the dynamic system under Article 998 of the Civil Code.With the support of scenario-based discussions and comparative propositions,the crawling and tag extraction of personal information.disclosed according to the law should be considered as reasonable processing;profiling and automated decision-making should not be covered in the scope of reasonable processing,in principle;for behav-iors such as correlation analysis,elements like information subject,identifiability and sensitivity should be comprehensively considered to draw open and inclusive conclusions in individual cases.
文摘In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.
文摘We show a quantitative technique characterized by low numerical mediation for the reconstruction of temporal sequences of geophysical data of length L interrupted for a time ΔT where . The aim is to protect the information acquired before and after the interruption by means of a numerical protocol with the lowest possible calculation weight. The signal reconstruction process is based on the synthesis of the low frequency signal extracted for subsampling (subsampling ∇Dirac = ΔT in phase with ΔT) with the high frequency signal recorded before the crash. The SYRec (SYnthetic REConstruction) method for simplicity and speed of calculation and for spectral response stability is particularly effective in the studies of high speed transient phenomena that develop in very perturbed fields. This operative condition is found a mental when almost immediate informational responses are required to the observation system. In this example we are dealing with geomagnetic data coming from an uw counter intrusion magnetic system. The system produces (on time) information about the transit of local magnetic singularities (magnetic perturbations with low spatial extension), originated by quasi-point form and kinematic sources (divers), in harbors magnetic underwater fields. The performances of stability of the SYRec system make it usable also in long and medium period of observation (activity of geomagnetic observatories).
基金supported by the National Natural Science Foundation of China under Grant No.61272521the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20110005130001
文摘Mobile SNS is one of the most popular topics of mobile Internet.In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources,the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios,the system makes use of the existent specification of FOAF(Friendof-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites.Ticket-based Access Authorization System(TAAS) is provided to grant permission to acquire resources on personal portal.Meanwhile,the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios.
文摘This paper presents the evaluation results of protective performance of the respirators(full face supplied-fresh air respirators and half-mask active charcoal filter) and personal exposure measurement (Infacepiece sampling) in a Belgian viscose rayon factory. With in-facepiece sampling technique and personal sampling method, we measured the CS2 concentrations inside and outside of the dirferent respirators. We found two kinds of the respirators have significant effect on decreasing the CS2, exposure level for the subject,especially for the spinners. Full face supplied-fresh air respirator have good protective effect for the spinners and have limit protection for the high exposure Job although the PF value is more than 10. It still need to improve more. In-facepiece sampling for all the subjects exposed to CS2, in the factory found most subjects have exposed to low CS2, concentration, most exposure levels were under the control range, but sulfuror are high exposure, the exposure level is higher than ACGIH TLV value.
基金Science and Technology Development Fund Item of Shanghai !(962512006).
文摘For meeting the need of rapid development of economy in Shanghai and the protection against earthquake and disaster reduction in the mega city, it is necessary to build a information system for emergence decision on the protection against earthquake and disaster reduction in the city. In this paper, GIS is applied to "the information system for emergence decision on the protection against earthquake and disaster reduction in Shanghai City (Baoshan experiment region)". We introduce to the structure and effect of each functional module in this information system. This information system consists of 7 functional modules:background information of seismology and geology, subsystem for rapid evaluation of damage loss from earthquake, subsystem for the decisive information on earthquake emergence, information query, maintenance and management of system, help, quit. The key parts of this information system are the subsystem for rapid evaluation of damage loss from earthquake and the subsystem for the decisive information on earthquake emergence. Also, this paper introduces to the application of technology of color infra-red aerial photograph remote sensing to this information system.
基金supported by the National Outstanding Youth Science Fund Project of National Natural Science Foundation of China(Projects No.52202012)the National Natural Science Foundation of China(Projects No.51834007)。
文摘With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce casualties and maintain military combat effectiveness,is widely developed.This paper systematically reviewed various PPE based on individual combat through literature research and comprehensive discussion,and introduced in detail the latest application progress of PPE in terms of material and technology from three aspects:individual integrated protection system,traditional protection equipment,and intelligent protection equipment,respectively,and discussed in depth the functional improvement and optimization status brought by advanced technology for PPE,focusing on the achievements of individual equipment technology application.Finally,the problems and technical bottlenecks in the development of PPE were analyzed and summarized,and the development trend of PPE were pointed out.The results of the review will provide a forward-looking reference for the current development of individual PPE,and are important guidance for the design and technological innovation of advanced equipment based on the future technological battlefield.
文摘This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
文摘An electronic information system is composed of multiple groups of components. With the improvement of technology, its accuracy is getting higher and higher. The voltage during normal operation is only a few volts, and the information current is only microamp, so the withstand voltage to lightning electromagnetic pulse is extremely low. In this paper, the negative impact of lightning and static electricity on the computer room of an electronic information system was analyzed firstly, and then the design for the lightning protection of the computer room was discussed.