期刊文献+
共找到385篇文章
< 1 2 20 >
每页显示 20 50 100
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
1
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Digital Forensics and Cyber Crime Datamining 被引量:2
2
作者 K. K. Sindhu B. B. Meshram 《Journal of Information Security》 2012年第3期196-201,共6页
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th... Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability. 展开更多
关键词 CYBER forensic DIGITAL forensic TOOL Network forensic TOOL CRIME data MINING
在线阅读 下载PDF
Development of a risk index for cross-border data movement 被引量:5
3
作者 Jin Li Wanting Dong +1 位作者 Chong Zhang Zihan Zhuo 《Data Science and Management》 2022年第3期97-104,共8页
Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security asses... Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data. 展开更多
关键词 cross-border data data security Biomedical data Risk assessment data management
在线阅读 下载PDF
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
4
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
原文传递
Application of Big Data Analysis Technology in Cross-Border E-Commerce
5
作者 Yanan Song 《Journal of Electronic Research and Application》 2021年第4期1-3,共3页
Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the ... Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the influence of international trade.Based on big data technology,this paper builds an industry chain with cross-border e-commerce members'participation,and analyzes the specific application of big data in the product support,internal operation,external marketing,logistics service and service evaluation of cross-border e-commerce industry chain.The purpose is to effectively promote the healthy development of cross-border e-commerce and improve China's trade and economic level. 展开更多
关键词 Big data cross-border e-commerce E-COMMERCE
在线阅读 下载PDF
Issues in Symbian S60 platform forensics
6
作者 Antonio Savoldi Paolo Gubian 《通讯和计算机(中英文版)》 2009年第3期16-22,共7页
关键词 SYMBIAN S60 结构平台 文件系统 数据锁定
在线阅读 下载PDF
网络犯罪视野下对社交媒体取证规范性研究
7
作者 韩旭 樊刘佳 《法治研究》 北大核心 2026年第1期108-120,共13页
随着网络技术移动化和社交化发展,社交媒体成为人们获取信息、交流沟通的主要平台,社交媒体数据也因此成为当下最具价值的资源之一。实践中对社交媒体取证主要采取电子设备取证及网络取证两种模式并存的取证策略,突破现有的物理取证空... 随着网络技术移动化和社交化发展,社交媒体成为人们获取信息、交流沟通的主要平台,社交媒体数据也因此成为当下最具价值的资源之一。实践中对社交媒体取证主要采取电子设备取证及网络取证两种模式并存的取证策略,突破现有的物理取证空间并拓宽取证时间,为网络犯罪案件侦查取证工作提供了新思路。但同时社交媒体取证是一项复杂而具有挑战性的任务,网络公司的配合取证义务对数据隐私权造成一定冲击、新取证方式致使传统证据固定方法失效并带来溯源分析新难题。同时,不公开的社交媒体数据也亟须增补取证规则。为迎接新挑战,应把握“前端控制—中端完善—后端维序”的节奏优化社交媒体取证,规范社交媒体取证各主体行为,从完善冻结数据规则、转变“先取后固”取证理念以及增加不公开社交媒体数据的取证措施方面更新取证方式,并分级构建非法电子证据排除措施,以完善现有的证据采集体系。 展开更多
关键词 社交媒体取证 电子取证 网络犯罪 电子数据
在线阅读 下载PDF
新质生产力驱动司法鉴定的范式变革与制度响应机制研究
8
作者 王海霞 《中国司法鉴定》 2026年第1期85-96,共12页
新质生产力作为驱动经济高质量发展的核心引擎,赋能司法鉴定领域智能化转型。党的二十届四中全会、《中共中央关于制定国民经济和社会发展第十五个五年规划的建议》对发展新质生产力作出明确部署,为新质生产力与司法鉴定领域融合提供政... 新质生产力作为驱动经济高质量发展的核心引擎,赋能司法鉴定领域智能化转型。党的二十届四中全会、《中共中央关于制定国民经济和社会发展第十五个五年规划的建议》对发展新质生产力作出明确部署,为新质生产力与司法鉴定领域融合提供政策指引。解构新质生产力的核心内涵,分析其与司法鉴定领域的耦合共生关系,指出当前存在智能鉴定法律规范缺位、数据泄露风险、深度伪造问题、算法黑箱困境以及新质鉴定劳动者匮乏等阻碍新质生产力充分释放的障碍。为此,提出制定融合智能元素的《司法鉴定法》、构建分级分类的数据访问与区块链存证机制、加强人工智能鉴定结果的标识义务以化解深度伪造难题、建立算法透明化问责机制并通过产学研融合培养兼具鉴定知识与智能技术的复合型劳动者,为司法鉴定范式跃迁提供制度保障,助力推动我国司法鉴定领域高质量发展。 展开更多
关键词 新质生产力 司法鉴定智能化 数据安全 算法问责 人才培养
在线阅读 下载PDF
A Novel Forensic Computing Model 被引量:1
9
作者 XU Yunfeng LU Yansheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1865-1868,共4页
According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference me... According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence. 展开更多
关键词 forensic computing data fusion inference mechanism hidden Markov model petri network
在线阅读 下载PDF
Factors affecting forensic electric network frequency matching-A comprehensive study
10
作者 Guang Hua Qingyi Wang +3 位作者 Dengpan Ye Haijian Zhang Guoyin Wang Shuyin Xia 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1121-1130,共10页
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)... The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)criterion,enabled by the properties of random fluctuations and intra-grid consistency.In essence,this is a task of matching a short random sequence within a long reference,whose accuracy is mainly concerned with whether this match could be uniquely correct.In this paper,we comprehensively analyze the factors affecting the reliability of ENF matching,including the length of test recording,length of reference,temporal resolution,and Signal-to-Noise Ratio(SNR).For synthetic analysis,we incorporate the first-order AutoRegressive(AR)ENF model and propose an efficient Time-Frequency Domain noisy ENF synthesis method.Then,the reliability analysis schemes for both synthetic and real-world data are respectively proposed.Through a comprehensive study,we quantitatively reveal that while the SNR is an important external factor to determine whether timestamp verification is viable,the length of test recording is the most important inherent factor,followed by the length of reference.However,the temporal resolution has little impact on performance.Finally,a practical workflow of the ENF-based audio timestamp verification system is proposed,incorporating the discovered results. 展开更多
关键词 Digital forensics Audio forensics data authentication Timestamp verification Electric network frequency criterion
在线阅读 下载PDF
Computer Forensic Using Lazy Local Bagging Predictors
11
作者 邱卫东 鲍诚毅 朱兴全 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期94-97,共4页
In this paper, we study the problem of employ ensemble learning for computer forensic. We propose a Lazy Local Learning based bagging (L3B) approach, where base learners are trained from a small instance subset surr... In this paper, we study the problem of employ ensemble learning for computer forensic. We propose a Lazy Local Learning based bagging (L3B) approach, where base learners are trained from a small instance subset surrounding each test instance. More specifically, given a test instance x, L3B first discovers x's k nearest neighbours, and then applies progressive sampling to the selected neighbours to train a set of base classifiers, by using a given very weak (VW) learner. At the last stage, x is labeled as the most frequently voted class of all base classifiers. Finally, we apply the proposed L3B to computer forensic. 展开更多
关键词 computer forensic data mining CLASSIFICATION lazy learning BAGGING ensemble learning
原文传递
A Comparative Study of Email Forensic Tools
12
作者 Vamshee Krishna Devendran Hossain Shahriar Victor Clincy 《Journal of Information Security》 2015年第2期111-117,共7页
Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensi... Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only various fields that can be forged by hackers or malicious users, but also the flexibility of composing, editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications. Towards this direction, a number of open source forensics tools have been widely used by the practitioners. However, these tools have been developed in an isolated manner rather than a collaborative approach. Given that email forensic tool users need to understand to what extent a tool would be useful for his/her circumstances and conducting forensic analysis accordingly. In this paper, we examine a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic. 展开更多
关键词 EMAIL forensic HEADER and Content Analysis data Recovery SEARCH OPTION VISUALIZATION
暂未订购
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
13
作者 Samantha B. Larkin Shakour Abuzneid 《Journal of Information Security》 2024年第4期589-611,共23页
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about... Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles. 展开更多
关键词 Access Control Access Rights Artificial Intelligence Consumer Behavior Consumer Protection Criminal Law data Brokers data Handling data Privacy data Processing data Profiling Digital forensics
在线阅读 下载PDF
基于图像处理技术在声像资料鉴定中的应用
14
作者 徐金成 邹同浩 《科技风》 2025年第33期4-6,共3页
随着科学技术飞速发展,声像资料已成为现代司法诉讼中不可或缺的重要证据形式。它们以声音、图像等直观方式记录并再现案件现场,对于揭示事实真相、辅助法官做出公正裁决具有不可替代的作用。然而,与此同时,声像资料的易篡改性和伪造可... 随着科学技术飞速发展,声像资料已成为现代司法诉讼中不可或缺的重要证据形式。它们以声音、图像等直观方式记录并再现案件现场,对于揭示事实真相、辅助法官做出公正裁决具有不可替代的作用。然而,与此同时,声像资料的易篡改性和伪造可能性也给司法鉴定带来了新的挑战。图像处理技术在此背景下应运而生,其凭借强大的数据分析与处理能力,有效提高了声像资料鉴定的准确性和科学性。本文将深入探讨图像处理技术在声像资料鉴定中的应用及其重要意义。 展开更多
关键词 图像处理技术 司法鉴定 声像资料鉴定
在线阅读 下载PDF
补充实验数据规则适用与医药创新成果保护研究
15
作者 耿胜燕 姚云 苏莹 《中国发明与专利》 2025年第4期77-86,共10页
[目的/意义]补充实验数据对医药创新成果保护至关重要。近年来,越来越多的医药创新主体倾向于通过补充实验数据来支持其发明的可专利性,提升创新主体对补充实验数据规则的运用能力,对于强化技术成果的保护、提升核心竞争能力具有重大意... [目的/意义]补充实验数据对医药创新成果保护至关重要。近年来,越来越多的医药创新主体倾向于通过补充实验数据来支持其发明的可专利性,提升创新主体对补充实验数据规则的运用能力,对于强化技术成果的保护、提升核心竞争能力具有重大意义。[方法/过程]通过对比欧洲、美国和我国补充实验数据相关规则,分析总结国内司法实践中相关案件的分布特点,在此基础上选取近期具有代表性的典型司法判例,探究司法机关对补充实验数据的裁判标准和考量因素。[结果/结论]从专利申请文件和补充实验数据两个维度为医药创新主体提供具有实践性和前瞻性的建议,为实现高质量、高水平的医药创新成果保护提供助力。 展开更多
关键词 药品专利 补充实验数据 司法实践 接受标准 采信标准
在线阅读 下载PDF
违规违法飞行无人机电子数据取证技术
16
作者 孙永生 雷宗林 李恩特 《无线电工程》 2025年第9期1887-1893,共7页
无人机违规违法飞行相比于传统的违规违法行为,在发生场景、应对手段以及证据遗留形式上均有所不同,电子证据成了此类案件中最主要的证据形式,通过分析无人机违法飞行涉及的电子证据,能够将现场情况完美地进行还原。需要根据涉案无人机... 无人机违规违法飞行相比于传统的违规违法行为,在发生场景、应对手段以及证据遗留形式上均有所不同,电子证据成了此类案件中最主要的证据形式,通过分析无人机违法飞行涉及的电子证据,能够将现场情况完美地进行还原。需要根据涉案无人机中实物证据和电子证据并存、静态证据和动态证据兼具的特点,突破以静态和固态为主的物证认知和以存储态电子数据为主的电子证据认知中存在的局限,构建无人机证据的证据模型,形成体系化的现场勘验取证方法、取证技术、取证装备和取证操作规范,为低空安全治理工作提供全面的技术支撑、规范的法庭证据和专业的取证技术人才储备。 展开更多
关键词 无人机 违法飞行 电子数据取证技术
在线阅读 下载PDF
IPv6环境下无线网络入侵行为动态取证系统设计 被引量:2
17
作者 王庆刚 顾峰 +1 位作者 陈华春 张林 《现代电子技术》 北大核心 2025年第5期115-119,共5页
为在IPv6网络协议环境下对无线网络中的入侵行为进行准确监控和记录,以收集、保存无线网络入侵相关的证据,设计IPv6环境下无线网络入侵行为动态取证系统。该系统通过无线网卡连接IPv6环境下以太网,使用数据包捕获模块获取无线网络数据包... 为在IPv6网络协议环境下对无线网络中的入侵行为进行准确监控和记录,以收集、保存无线网络入侵相关的证据,设计IPv6环境下无线网络入侵行为动态取证系统。该系统通过无线网卡连接IPv6环境下以太网,使用数据包捕获模块获取无线网络数据包后,将其输入到IPv6协议解析模块内,通过该模块对无线网络数据包实施解析处理,得到无线网络数据属性值参数。再将无线网络数据属性值参数输入到入侵行为取证模块内,该模块对无线网络数据属性值参数进行量化后,运用Clameleon聚类算法对量化后的无线网络数据属性值参数进行聚类处理,得到无线网络数据属性值参数中的入侵行为参数,实现无线网络入侵行为动态取证。实验结果表明,该系统具备较强的无线网络数据包捕获能力和无线网卡驱动能力,并可有效对不同类型的网络入侵行为进行动态取证,应用效果较佳。 展开更多
关键词 IPV6环境 无线网络 入侵行为 动态取证 Clameleon聚类 网卡驱动 数据解析 数据量化
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部