Table of Content

    15 December 2017, Volume 3 Issue 12
    VEDA, Establishing the AI Dynamic Defense System for Cyber Security
    2017, 3(12):  1058-1066. 
    Asbtract ( )   PDF (1526KB) ( )  
    Related Articles | Metrics
    Extraterritorial Experience and Lessons Learned from the Construction of the Minors Network Protecting System
    2017, 3(12):  1068-1074. 
    Asbtract ( )   PDF (5982KB) ( )  
    References | Related Articles | Metrics
    Modern social networks have gradually become one of the indispensable tools for people's daily life. Minors who lack awareness and ability to protect themselves are more likely to be affected by the Internet and the content of their communication. Therefore, by establishing relevant laws, minors accessing the Internet Guidance and regulation of behavior and the web content it contacts have become the consensus of all countries in the world. This article first summarizes several key elements of promoting the health of minors, then combs the advanced systems and legal provisions for the protection of minors in the world, and organizes the direct regulation of our country or may affect the health of minors Finally, based on the various influencing factors, the paper puts forward some suggestions on the formulation and implementation of legal policies at the subjectivity of country, society and family.
    International Comparison and China Program for the Right of Forgotten
    2017, 3(12):  1075-1079. 
    Asbtract ( )   PDF (4664KB) ( )  
    References | Related Articles | Metrics
    With the popularization of the Internet and the rapid development of Internet technology, protection of personal information has also been concerned . The right to be forgotten ,as a powerful weapon against cyberattacks, can protect personal information. Through the analysis of the laws and regulations of the EU and the United Stateson the right to be forgotten , and the current legal norms and practical experiences of the right to be forgotten in China, we put forward the construction of the "right to be forgotten " in our legislative level.
    Research on the Ethical and Legal Risk of Artificial Intelligence
    2017, 3(12):  1080-1090. 
    Asbtract ( )   PDF (9629KB) ( )  
    References | Related Articles | Metrics
    The concept of "artificial intelligence" since 1956, puts forward , artificial intelligence technology fast development, the comprehensive promotion, artificial intelligence application in computer network, electronic science and technology, information engineering, and many other fields are widely used, in promoting the network of information technology at the same time, also has a far-reaching influence on all aspects of social life, for medical, communications, transportation, finance, etc many fields provides convenient technical support.In 2016 as the unprecedented development of artificial intelligent technology for a year, was known as the "inflection point" of artificial intelligence, but as a new technology of the Internet era, intelligence of artificial intelligence in the development of network information technology at the same time, it blurred the line between physical reality, numbers, and personal, also spawned many complex legal and ethical issues, we need to deal with in time, make artificial intelligence a greater advantage of its positive value.This paper starting from the concept review and development history of artificial intelligence, based on the present situation of the development of artificial intelligent technology, the problems of legal risk source analysis technology development, proposes the corresponding solution measures.
    Online Rumor Governance in the View of "Cybersecurity Law of the People’s Republic of China"
    2017, 3(12):  1091-1096. 
    Asbtract ( )   PDF (5064KB) ( )  
    References | Related Articles | Metrics
    While changing the way of production and life, the Internet also provides a wider channel for the public to express their opinions. The development of mobile Internet and we media makes everyone can become the producer, publisher and distributor of network information , and the lack of legal and moral awareness caused by the virtual nature of the network makes online rumors harder to govern. As an important part of the governance of the Internet society, the publication and implementation of the "Cybersecurity Law of the People's Republic of China " and the corresponding policies, making the legal governance system of online rumor tends to complete. On the basis of clarifying that all social subjects should actively participate in the governance of the online rumor, this article analyzes the current legal system of online rumors and the real changes brought by the "Cybersecurity Law of the People's Republic of China ", aim to offer advice for the construction of a clean and civilized cyberspace in China.
    Research on the Legal Dilemma and Countermeasures of Personal Information Protection in Big Data Age
    2017, 3(12):  1097-1101. 
    Asbtract ( )   PDF (4468KB) ( )  
    References | Related Articles | Metrics
    Big data has greatly promoted the social and economic development, while creating enormous economic and social benefits. In the meantime, however, big data has also had a significant impact on the safety of personal information. This paper firstly introduces the connotation of personal information under the background of big data and the difference between it and personal privacy. Based on the comprehension of the meaning of personal information, this article briefly introduces the current situation of personal information security in our country and analyzes the problems and the legal difficulties of personal information security in the era of big data. Finally, according to the above problems and legal difficulties, we put forward some corresponding countermeasures and suggestions.
    The Network Information Regulation in the We Media Era
    2017, 3(12):  1102-1107. 
    Asbtract ( )   PDF (5563KB) ( )  
    References | Related Articles | Metrics
    In the rapidly evolving modern society of information technology, everyone has the potential to be the source for the next headline news. Intelligent devices are so popular that everyone is the we media. As the mass information was sent out, quite a few problems appeared. Through the analysis of the existing data and the selection of real cases, the realistic problems in the supervision of network information in China from the media age are put forward. From the these aspects of the massive leakage of state secrets, personal information and business information in the we media, overload of false information on the Internet,the confusion of supervision of network information agencies and their responsibilities, the lack of legal basis for the regulation of network information to analyze the problem. Combined with the existing laws, regulations and national conditions in our country, from the perspectives of the real-name system of the Internet released by the media, the institutions that supervise the issuance of network information and their duties, the obligation of supervising the information of the media network and the awareness of cybersecurity and responsibility of citizens, some thoughts on network information supervision from the we media age were made.
    A Research on U.S. Information System Audit
    2017, 3(12):  1108-1114. 
    Asbtract ( )   PDF (5886KB) ( )  
    References | Related Articles | Metrics
    Cybersecurity law raises requirements on network operators to fulfill the cybersecurity responsibility and carry out cybersecurity protection duties. Information system audit, which is a powerful method to supervise the fulfillment of cybersecurity responsibility, can improve the security, reliability and effectiveness of information systems. Information system audit in our country is still in the early stage and corresponding regulations are under development. Considering the current state of information system audit in our country, learning from the successful experience of other countries could be necessary and helpful. Starting from 60s of last century, U.S. has begun its explorations in information system audit area. After the development of almost fifty years, U.S. have already built a well-established mechanism. Learning from the advanced experience of U.S., including organizations, principles, processes, patterns, contents and results of information system audit, will lead to the promotion of information system audit in our country and improvement in cybersecurity protection.
    Overview on Information Content Security of Cyberspace
    2017, 3(12):  1115-1118. 
    Asbtract ( )   PDF (3370KB) ( )  
    References | Related Articles | Metrics
    With the development of information technology, the security threat of information content in cyberspace is becoming more and more serious, such as reactionary, pornographic, violent and other negative information widely spread; hacking, internet fraud and other illegal activities are rampant; piracy, illegal transshipment and other infringements cannot be stopped. Social stability, economic development and national security are seriously threatened. At present, the security of network information content has become an important part of national information security system.
    Accelerating The Construction Of The National Cloud Security System
    2017, 3(12):  1119-1124. 
    Asbtract ( )   PDF (4617KB) ( )  
    References | Related Articles | Metrics
    This paper firstly analyzes the network security environment and network security requirements facing the country. This paper introduces the national cyber security strategy and national network security laws and regulations. The change of network security situation is further analyzed. It is stated that cloud security can better fit the national cyberspace security requirements. On the construction of cloud security system, this paper expounds the significance of accelerating the construction of cloud security system. Finally, the conclusion is drawn.
    The Application and Analysis of Artificial Intelligence in Bank
    2017, 3(12):  1125-1128. 
    Asbtract ( )   PDF (3369KB) ( )  
    References | Related Articles | Metrics
    The main application areas of artificial intelligence in the banking system are knowledge management, customer service, marketing, identity verification, risk management, etc.. The application of artificial intelligence can help to realize the intelligentization and virtualization of banking, and improve the efficiency of banking operation and enhance the user experience. But at the same time, we can not ignore the hidden dangers of information security brought by the introduction of artificial intelligence technology, and we must pay attention to it and put forward corresponding solutions. By investigating the application status of artificial intelligence technology in the banking system, the security problems in its development are analyzed. Based on this, the future development direction is pointed out, and the countermeasures to deal with the security risks are proposed.
    Sentiment Analysis of Aerospace Microblog Using SVM
    2017, 3(12):  1129-1133. 
    Asbtract ( )   PDF (4335KB) ( )  
    References | Related Articles | Metrics
    Microblog is an important platform, from which people can obtain and transmit information, and also is important data source to analyze and grasp the public opinion. In order to grasp aerospace event's influence on public opinion, this paper carried out a study on aerospace microblog data sentiment analysis, via manual training data construction, feature designing and support vector machine(SVM) model training, we propose a method to judgment the aerospace microblogging is positive or negative. Experiment result show that, the method discussed in this paper get high precision and recall value, which verify the effectiveness of proposed method in aerospace microblogging sentiment analysis judgment.
    Opinions on Critical Information Infrastructure Protection of Power System at Network Age
    2017, 3(12):  1134-1140. 
    Asbtract ( )   PDF (1007KB) ( )  
    References | Related Articles | Metrics
    Defects and Breakthroughs of Current Cyberspace Security Technology System
    2017, 3(12):  1141-1144. 
    Asbtract ( )   PDF (886KB) ( )  
    Related Articles | Metrics