keywords Years Adv Search
Special Report
2017 Vol. 3, No. 12
Published: 2017-12-15

1058 VEDA, Establishing the AI Dynamic Defense System for Cyber Security
2017 Vol. 3 (12): 1058-1066 [Abstract] ( 34 ) HTML (1 KB)  PDF  (1526 KB)  ( 27 )
1068 Extraterritorial Experience and Lessons Learned from the Construction of the Minors Network Protecting System
Modern social networks have gradually become one of the indispensable tools for people's daily life. Minors who lack awareness and ability to protect themselves are more likely to be affected by the Internet and the content of their communication. Therefore, by establishing relevant laws, minors accessing the Internet Guidance and regulation of behavior and the web content it contacts have become the consensus of all countries in the world. This article first summarizes several key elements of promoting the health of minors, then combs the advanced systems and legal provisions for the protection of minors in the world, and organizes the direct regulation of our country or may affect the health of minors Finally, based on the various influencing factors, the paper puts forward some suggestions on the formulation and implementation of legal policies at the subjectivity of country, society and family.
2017 Vol. 3 (12): 1068-1074 [Abstract] ( 68 ) HTML (1 KB)  PDF  (5982 KB)  ( 15 )
1075 International Comparison and China Program for the Right of Forgotten
With the popularization of the Internet and the rapid development of Internet technology, protection of personal information has also been concerned . The right to be forgotten ,as a powerful weapon against cyberattacks, can protect personal information. Through the analysis of the laws and regulations of the EU and the United Stateson the right to be forgotten , and the current legal norms and practical experiences of the right to be forgotten in China, we put forward the construction of the "right to be forgotten " in our legislative level.
2017 Vol. 3 (12): 1075-1079 [Abstract] ( 26 ) HTML (1 KB)  PDF  (4664 KB)  ( 25 )
1080 Research on the Ethical and Legal Risk of Artificial Intelligence
The concept of "artificial intelligence" since 1956, puts forward , artificial intelligence technology fast development, the comprehensive promotion, artificial intelligence application in computer network, electronic science and technology, information engineering, and many other fields are widely used, in promoting the network of information technology at the same time, also has a far-reaching influence on all aspects of social life, for medical, communications, transportation, finance, etc many fields provides convenient technical support.In 2016 as the unprecedented development of artificial intelligent technology for a year, was known as the "inflection point" of artificial intelligence, but as a new technology of the Internet era, intelligence of artificial intelligence in the development of network information technology at the same time, it blurred the line between physical reality, numbers, and personal, also spawned many complex legal and ethical issues, we need to deal with in time, make artificial intelligence a greater advantage of its positive value.This paper starting from the concept review and development history of artificial intelligence, based on the present situation of the development of artificial intelligent technology, the problems of legal risk source analysis technology development, proposes the corresponding solution measures.
2017 Vol. 3 (12): 1080-1090 [Abstract] ( 26 ) HTML (1 KB)  PDF  (9629 KB)  ( 17 )
1091 Online Rumor Governance in the View of "Cybersecurity Law of the People’s Republic of China"
While changing the way of production and life, the Internet also provides a wider channel for the public to express their opinions. The development of mobile Internet and we media makes everyone can become the producer, publisher and distributor of network information , and the lack of legal and moral awareness caused by the virtual nature of the network makes online rumors harder to govern. As an important part of the governance of the Internet society, the publication and implementation of the "Cybersecurity Law of the People's Republic of China " and the corresponding policies, making the legal governance system of online rumor tends to complete. On the basis of clarifying that all social subjects should actively participate in the governance of the online rumor, this article analyzes the current legal system of online rumors and the real changes brought by the "Cybersecurity Law of the People's Republic of China ", aim to offer advice for the construction of a clean and civilized cyberspace in China.
2017 Vol. 3 (12): 1091-1096 [Abstract] ( 28 ) HTML (1 KB)  PDF  (5064 KB)  ( 17 )
1097 Research on the Legal Dilemma and Countermeasures of Personal Information Protection in Big Data Age
Big data has greatly promoted the social and economic development, while creating enormous economic and social benefits. In the meantime, however, big data has also had a significant impact on the safety of personal information. This paper firstly introduces the connotation of personal information under the background of big data and the difference between it and personal privacy. Based on the comprehension of the meaning of personal information, this article briefly introduces the current situation of personal information security in our country and analyzes the problems and the legal difficulties of personal information security in the era of big data. Finally, according to the above problems and legal difficulties, we put forward some corresponding countermeasures and suggestions.
2017 Vol. 3 (12): 1097-1101 [Abstract] ( 27 ) HTML (1 KB)  PDF  (4468 KB)  ( 20 )
1102 The Network Information Regulation in the We Media Era
In the rapidly evolving modern society of information technology, everyone has the potential to be the source for the next headline news. Intelligent devices are so popular that everyone is the we media. As the mass information was sent out, quite a few problems appeared. Through the analysis of the existing data and the selection of real cases, the realistic problems in the supervision of network information in China from the media age are put forward. From the these aspects of the massive leakage of state secrets, personal information and business information in the we media, overload of false information on the Internet,the confusion of supervision of network information agencies and their responsibilities, the lack of legal basis for the regulation of network information to analyze the problem. Combined with the existing laws, regulations and national conditions in our country, from the perspectives of the real-name system of the Internet released by the media, the institutions that supervise the issuance of network information and their duties, the obligation of supervising the information of the media network and the awareness of cybersecurity and responsibility of citizens, some thoughts on network information supervision from the we media age were made.
2017 Vol. 3 (12): 1102-1107 [Abstract] ( 24 ) HTML (1 KB)  PDF  (5563 KB)  ( 21 )
1108 A Research on U.S. Information System Audit
Cybersecurity law raises requirements on network operators to fulfill the cybersecurity responsibility and carry out cybersecurity protection duties. Information system audit, which is a powerful method to supervise the fulfillment of cybersecurity responsibility, can improve the security, reliability and effectiveness of information systems. Information system audit in our country is still in the early stage and corresponding regulations are under development. Considering the current state of information system audit in our country, learning from the successful experience of other countries could be necessary and helpful. Starting from 60s of last century, U.S. has begun its explorations in information system audit area. After the development of almost fifty years, U.S. have already built a well-established mechanism. Learning from the advanced experience of U.S., including organizations, principles, processes, patterns, contents and results of information system audit, will lead to the promotion of information system audit in our country and improvement in cybersecurity protection.
2017 Vol. 3 (12): 1108-1114 [Abstract] ( 27 ) HTML (1 KB)  PDF  (5886 KB)  ( 12 )
1115 Overview on Information Content Security of Cyberspace
With the development of information technology, the security threat of information content in cyberspace is becoming more and more serious, such as reactionary, pornographic, violent and other negative information widely spread; hacking, internet fraud and other illegal activities are rampant; piracy, illegal transshipment and other infringements cannot be stopped. Social stability, economic development and national security are seriously threatened. At present, the security of network information content has become an important part of national information security system.
2017 Vol. 3 (12): 1115-1118 [Abstract] ( 42 ) HTML (1 KB)  PDF  (3370 KB)  ( 34 )
1119 Accelerating The Construction Of The National Cloud Security System
This paper firstly analyzes the network security environment and network security requirements facing the country. This paper introduces the national cyber security strategy and national network security laws and regulations. The change of network security situation is further analyzed. It is stated that cloud security can better fit the national cyberspace security requirements. On the construction of cloud security system, this paper expounds the significance of accelerating the construction of cloud security system. Finally, the conclusion is drawn.
2017 Vol. 3 (12): 1119-1124 [Abstract] ( 23 ) HTML (1 KB)  PDF  (4617 KB)  ( 18 )
1125 The Application and Analysis of Artificial Intelligence in Bank
The main application areas of artificial intelligence in the banking system are knowledge management, customer service, marketing, identity verification, risk management, etc.. The application of artificial intelligence can help to realize the intelligentization and virtualization of banking, and improve the efficiency of banking operation and enhance the user experience. But at the same time, we can not ignore the hidden dangers of information security brought by the introduction of artificial intelligence technology, and we must pay attention to it and put forward corresponding solutions. By investigating the application status of artificial intelligence technology in the banking system, the security problems in its development are analyzed. Based on this, the future development direction is pointed out, and the countermeasures to deal with the security risks are proposed.
2017 Vol. 3 (12): 1125-1128 [Abstract] ( 30 ) HTML (1 KB)  PDF  (3369 KB)  ( 18 )
1129 Sentiment Analysis of Aerospace Microblog Using SVM
Microblog is an important platform, from which people can obtain and transmit information, and also is important data source to analyze and grasp the public opinion. In order to grasp aerospace event's influence on public opinion, this paper carried out a study on aerospace microblog data sentiment analysis, via manual training data construction, feature designing and support vector machine(SVM) model training, we propose a method to judgment the aerospace microblogging is positive or negative. Experiment result show that, the method discussed in this paper get high precision and recall value, which verify the effectiveness of proposed method in aerospace microblogging sentiment analysis judgment.
2017 Vol. 3 (12): 1129-1133 [Abstract] ( 27 ) HTML (1 KB)  PDF  (4335 KB)  ( 15 )
1134 Opinions on Critical Information Infrastructure Protection of Power System at Network Age
2017 Vol. 3 (12): 1134-1140 [Abstract] ( 29 ) HTML (1 KB)  PDF  (1007 KB)  ( 14 )
1141 Defects and Breakthroughs of Current Cyberspace Security Technology System
2017 Vol. 3 (12): 1141-1144 [Abstract] ( 22 ) HTML (1 KB)  PDF  (886 KB)  ( 14 )
Copyright © Editorial Board of Journal of Information Security Research