期刊文献+
共找到380篇文章
< 1 2 19 >
每页显示 20 50 100
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
1
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Digital Forensics and Cyber Crime Datamining 被引量:2
2
作者 K. K. Sindhu B. B. Meshram 《Journal of Information Security》 2012年第3期196-201,共6页
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th... Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability. 展开更多
关键词 CYBER forensic DIGITAL forensic TOOL Network forensic TOOL CRIME data MINING
在线阅读 下载PDF
Development of a risk index for cross-border data movement 被引量:3
3
作者 Jin Li Wanting Dong +1 位作者 Chong Zhang Zihan Zhuo 《Data Science and Management》 2022年第3期97-104,共8页
Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security asses... Cross-border data transmission in the biomedical area is on the rise,which brings potential risks and management challenges to data security,biosafety,and national security.Focusing on cross-border data security assessment and risk management,many countries have successively issued relevant laws,regulations,and assessment guidelines.This study aims to provide an index system model and management application reference for the risk assessment of the cross-border data movement.From the perspective of a single organization,the relevant risk assessment standards of several countries are integrated to guide the identification and determination of risk factors.Then,the risk assessment index system of cross-border data flow is constructed.A case study of risk assessment in 358 biomedical organizations is carried out,and the suggestions for data management are offered.This study is condusive to improving security monitoring and the early warning of the cross-border data flow,thereby realizing the safe and orderly global flow of biomedical data. 展开更多
关键词 cross-border data data security Biomedical data Risk assessment data management
在线阅读 下载PDF
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
4
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
原文传递
Application of Big Data Analysis Technology in Cross-Border E-Commerce
5
作者 Yanan Song 《Journal of Electronic Research and Application》 2021年第4期1-3,共3页
Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the ... Under the background of national development strategy in the new era,cross-border e-commerce with the help of Internet platfbnn can realize the interconnection between producers and consumers,and gradually expand the influence of international trade.Based on big data technology,this paper builds an industry chain with cross-border e-commerce members'participation,and analyzes the specific application of big data in the product support,internal operation,external marketing,logistics service and service evaluation of cross-border e-commerce industry chain.The purpose is to effectively promote the healthy development of cross-border e-commerce and improve China's trade and economic level. 展开更多
关键词 Big data cross-border e-commerce E-COMMERCE
在线阅读 下载PDF
Factors affecting forensic electric network frequency matching-A comprehensive study
6
作者 Guang Hua Qingyi Wang +3 位作者 Dengpan Ye Haijian Zhang Guoyin Wang Shuyin Xia 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1121-1130,共10页
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)... The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)criterion,enabled by the properties of random fluctuations and intra-grid consistency.In essence,this is a task of matching a short random sequence within a long reference,whose accuracy is mainly concerned with whether this match could be uniquely correct.In this paper,we comprehensively analyze the factors affecting the reliability of ENF matching,including the length of test recording,length of reference,temporal resolution,and Signal-to-Noise Ratio(SNR).For synthetic analysis,we incorporate the first-order AutoRegressive(AR)ENF model and propose an efficient Time-Frequency Domain noisy ENF synthesis method.Then,the reliability analysis schemes for both synthetic and real-world data are respectively proposed.Through a comprehensive study,we quantitatively reveal that while the SNR is an important external factor to determine whether timestamp verification is viable,the length of test recording is the most important inherent factor,followed by the length of reference.However,the temporal resolution has little impact on performance.Finally,a practical workflow of the ENF-based audio timestamp verification system is proposed,incorporating the discovered results. 展开更多
关键词 Digital forensics Audio forensics data authentication Timestamp verification Electric network frequency criterion
在线阅读 下载PDF
Issues in Symbian S60 platform forensics
7
作者 Antonio Savoldi Paolo Gubian 《通讯和计算机(中英文版)》 2009年第3期16-22,共7页
关键词 SYMBIAN S60 结构平台 文件系统 数据锁定
在线阅读 下载PDF
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
8
作者 Samantha B. Larkin Shakour Abuzneid 《Journal of Information Security》 2024年第4期589-611,共23页
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about... Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles. 展开更多
关键词 Access Control Access Rights Artificial Intelligence Consumer Behavior Consumer Protection Criminal Law data Brokers data Handling data Privacy data Processing data Profiling Digital forensics
在线阅读 下载PDF
基于图像处理技术在声像资料鉴定中的应用
9
作者 徐金成 邹同浩 《科技风》 2025年第33期4-6,共3页
随着科学技术飞速发展,声像资料已成为现代司法诉讼中不可或缺的重要证据形式。它们以声音、图像等直观方式记录并再现案件现场,对于揭示事实真相、辅助法官做出公正裁决具有不可替代的作用。然而,与此同时,声像资料的易篡改性和伪造可... 随着科学技术飞速发展,声像资料已成为现代司法诉讼中不可或缺的重要证据形式。它们以声音、图像等直观方式记录并再现案件现场,对于揭示事实真相、辅助法官做出公正裁决具有不可替代的作用。然而,与此同时,声像资料的易篡改性和伪造可能性也给司法鉴定带来了新的挑战。图像处理技术在此背景下应运而生,其凭借强大的数据分析与处理能力,有效提高了声像资料鉴定的准确性和科学性。本文将深入探讨图像处理技术在声像资料鉴定中的应用及其重要意义。 展开更多
关键词 图像处理技术 司法鉴定 声像资料鉴定
在线阅读 下载PDF
补充实验数据规则适用与医药创新成果保护研究
10
作者 耿胜燕 姚云 苏莹 《中国发明与专利》 2025年第4期77-86,共10页
[目的/意义]补充实验数据对医药创新成果保护至关重要。近年来,越来越多的医药创新主体倾向于通过补充实验数据来支持其发明的可专利性,提升创新主体对补充实验数据规则的运用能力,对于强化技术成果的保护、提升核心竞争能力具有重大意... [目的/意义]补充实验数据对医药创新成果保护至关重要。近年来,越来越多的医药创新主体倾向于通过补充实验数据来支持其发明的可专利性,提升创新主体对补充实验数据规则的运用能力,对于强化技术成果的保护、提升核心竞争能力具有重大意义。[方法/过程]通过对比欧洲、美国和我国补充实验数据相关规则,分析总结国内司法实践中相关案件的分布特点,在此基础上选取近期具有代表性的典型司法判例,探究司法机关对补充实验数据的裁判标准和考量因素。[结果/结论]从专利申请文件和补充实验数据两个维度为医药创新主体提供具有实践性和前瞻性的建议,为实现高质量、高水平的医药创新成果保护提供助力。 展开更多
关键词 药品专利 补充实验数据 司法实践 接受标准 采信标准
在线阅读 下载PDF
违规违法飞行无人机电子数据取证技术
11
作者 孙永生 雷宗林 李恩特 《无线电工程》 2025年第9期1887-1893,共7页
无人机违规违法飞行相比于传统的违规违法行为,在发生场景、应对手段以及证据遗留形式上均有所不同,电子证据成了此类案件中最主要的证据形式,通过分析无人机违法飞行涉及的电子证据,能够将现场情况完美地进行还原。需要根据涉案无人机... 无人机违规违法飞行相比于传统的违规违法行为,在发生场景、应对手段以及证据遗留形式上均有所不同,电子证据成了此类案件中最主要的证据形式,通过分析无人机违法飞行涉及的电子证据,能够将现场情况完美地进行还原。需要根据涉案无人机中实物证据和电子证据并存、静态证据和动态证据兼具的特点,突破以静态和固态为主的物证认知和以存储态电子数据为主的电子证据认知中存在的局限,构建无人机证据的证据模型,形成体系化的现场勘验取证方法、取证技术、取证装备和取证操作规范,为低空安全治理工作提供全面的技术支撑、规范的法庭证据和专业的取证技术人才储备。 展开更多
关键词 无人机 违法飞行 电子数据取证技术
在线阅读 下载PDF
IPv6环境下无线网络入侵行为动态取证系统设计 被引量:2
12
作者 王庆刚 顾峰 +1 位作者 陈华春 张林 《现代电子技术》 北大核心 2025年第5期115-119,共5页
为在IPv6网络协议环境下对无线网络中的入侵行为进行准确监控和记录,以收集、保存无线网络入侵相关的证据,设计IPv6环境下无线网络入侵行为动态取证系统。该系统通过无线网卡连接IPv6环境下以太网,使用数据包捕获模块获取无线网络数据包... 为在IPv6网络协议环境下对无线网络中的入侵行为进行准确监控和记录,以收集、保存无线网络入侵相关的证据,设计IPv6环境下无线网络入侵行为动态取证系统。该系统通过无线网卡连接IPv6环境下以太网,使用数据包捕获模块获取无线网络数据包后,将其输入到IPv6协议解析模块内,通过该模块对无线网络数据包实施解析处理,得到无线网络数据属性值参数。再将无线网络数据属性值参数输入到入侵行为取证模块内,该模块对无线网络数据属性值参数进行量化后,运用Clameleon聚类算法对量化后的无线网络数据属性值参数进行聚类处理,得到无线网络数据属性值参数中的入侵行为参数,实现无线网络入侵行为动态取证。实验结果表明,该系统具备较强的无线网络数据包捕获能力和无线网卡驱动能力,并可有效对不同类型的网络入侵行为进行动态取证,应用效果较佳。 展开更多
关键词 IPV6环境 无线网络 入侵行为 动态取证 Clameleon聚类 网卡驱动 数据解析 数据量化
在线阅读 下载PDF
基于区块链的电子数据取证及自动化监测系统 被引量:1
13
作者 许晓东 牛任恺 +3 位作者 刘晶 张艳丽 刘继鹏 郭伟 《电子设计工程》 2025年第5期65-69,74,共6页
随着互联网和数字技术的快速发展,电子数据的数量越来越多,电子数据取证已经成为一种更加高效、准确和便捷的取证方式,代替了传统取证方法。设计的基于区块链的电子数据取证及自动化监测系统,克服了传统方法无法实现动态取证,缺乏自动... 随着互联网和数字技术的快速发展,电子数据的数量越来越多,电子数据取证已经成为一种更加高效、准确和便捷的取证方式,代替了传统取证方法。设计的基于区块链的电子数据取证及自动化监测系统,克服了传统方法无法实现动态取证,缺乏自动化监测机制的问题。电子数据动态取证模块由取证客户端与取证服务器端构成。在线存证模块分为证据存储与证据打包两个子模块,其核心业务是将系统产生的日志文件与用户取证以后上传的证据文件一起打包为证据包,存储在链下IPFS节点,构建出证据核心信息在区块链中存储。为了确保证据数据的隐私性与安全性,利用加密模块对证据包实施加密操作。在自动化监测模块中,设计数据采集卡,通过ReadDirectoryChangesW函数对采集数据实施过滤,实现电子数据的自动化监测模块。测试结果表明,设计系统既可以查询到注册表的改变,也可以查询到进程123.exe,通过自动化监测功能能够较好地跟踪外来入侵活动,对于不同实验案例的证据获取量均较高,能够实现动态取证。 展开更多
关键词 区块链技术 取证服务器端 电子数据取证 数据采集卡 自动化监测
在线阅读 下载PDF
闪存芯片的取证难题:从可靠性角度分析和优化
14
作者 胡海华 沈芙辉 +1 位作者 童宇 赵娜 《中国人民公安大学学报(自然科学版)》 2025年第1期89-94,共6页
闪存芯片因其体积密度高、读写速度快等优势,在移动电子设备中得到广泛应用。然而,闪存芯片在数据存储和维护方面存在不可靠性,这对取证技术提出新挑战。针对上述问题,提出了一种数据迁移检测方案,主要依靠权衡数据迁移次数和纠错码译... 闪存芯片因其体积密度高、读写速度快等优势,在移动电子设备中得到广泛应用。然而,闪存芯片在数据存储和维护方面存在不可靠性,这对取证技术提出新挑战。针对上述问题,提出了一种数据迁移检测方案,主要依靠权衡数据迁移次数和纠错码译码可迭代次数来实现取证数据完整性。实验结果显示该方案在不影响数据迁移次数的情况下,还能保证数据可靠性。该方案为公安机关在硬盘证据的收集环境中提供了有力支持。 展开更多
关键词 闪存芯片 硬盘取证 纠错码 电子取证 数据完整性
在线阅读 下载PDF
一种全流程保护的电子证据存证系统研究
15
作者 孙皓 王强 +2 位作者 韦狄山 卢达 张中雷 《信息安全与通信保密》 2025年第2期36-45,共10页
电子取证业务的快速发展产生了海量的电子证据,为保证电子证据的安全存储、高效查询,结合区块链技术和大数据存储技术的优势,设计了一种全流程保护的电子证据存证系统。该系统将原始电子证据存储在链下的大数据存储模块中,将与电子证据... 电子取证业务的快速发展产生了海量的电子证据,为保证电子证据的安全存储、高效查询,结合区块链技术和大数据存储技术的优势,设计了一种全流程保护的电子证据存证系统。该系统将原始电子证据存储在链下的大数据存储模块中,将与电子证据相关联的电子指纹存储在链上的区块链存储模块中,同时结合密码学相关算法,对电子证据的上传和下载过程进行全流程保护,既保证了原始电子证据不被篡改,又保证了电子证据的高效传输,为后续的断案提供了不可辩驳的铁证。 展开更多
关键词 电子取证 数据存储 区块链 全流程保护
在线阅读 下载PDF
电子数据勘验技术创新教学方法探索与实践
16
作者 李子川 《科教导刊》 2025年第16期39-41,共3页
电子数据勘验技术作为一种前沿的侦查工具,已成为司法实践中的重要组成部分。然而随着技术的不断更新迭代,如何在刑事司法教育中融入这一高新技术以培养适应未来司法需求的复合型人才,成为当前教育体系中亟待解决的问题。文章基于电子... 电子数据勘验技术作为一种前沿的侦查工具,已成为司法实践中的重要组成部分。然而随着技术的不断更新迭代,如何在刑事司法教育中融入这一高新技术以培养适应未来司法需求的复合型人才,成为当前教育体系中亟待解决的问题。文章基于电子数据勘验技术的发展特点,分析当前电子数据勘验技术教学中的难点,提出动态更新课程与教材体系、加强师资培养、建设实践教学平台等实施策略,以推动学科与技术的深度融合,培养适应新时代要求的专业人才。 展开更多
关键词 电子数据 勘验技术 教学创新 司法教育
在线阅读 下载PDF
即时通信数据区块链存证防纂改技术研究——基于手机取证过程 被引量:1
17
作者 丁丽萍 杜漠 +2 位作者 彭业浩 罗海飙 甘荣仕 《智能物联技术》 2025年第3期36-41,共6页
即时通信数据涉及大量个人隐私和敏感信息。在手机取证过程中,即时通信数据存在易被篡改等诸多安全隐患。对此,提出一种手机取证中即时通信数据区块链存证防篡改技术。采用分片式方法将即时通信数据存储到区块链上,构建改进的基于角色... 即时通信数据涉及大量个人隐私和敏感信息。在手机取证过程中,即时通信数据存在易被篡改等诸多安全隐患。对此,提出一种手机取证中即时通信数据区块链存证防篡改技术。采用分片式方法将即时通信数据存储到区块链上,构建改进的基于角色的访问控制(Role-Based Access Control,RBAC)模型,进行区块链上的存证数据访问控制,实现手机取证中的即时通信数据区块链存证防篡改。实验结果表明,所提技术不仅能有效提高手机取证过程中即时通信数据的存储性能,而且可以增强存证数据的防篡改能力和效率。 展开更多
关键词 手机取证 即时通信数据 区块链 存证 防篡改技术
在线阅读 下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部