[1] JINHONG Y, CHUL-SOO K I M, ONIK M M H. Aggregated risk modelling of personal data privacy in internet of Things[C]//21st international conference on advanced communication technology. PyeongChang: IEEE, 2019: 425-430. [2] VERIZON. 2021 data breach investigations report[R/OL]. [2022-06-02]. https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdf. [3] YI H. On the importance of protecting personal information privacy: a lightweight and portable implementation of cryptographic systems[C]//2nd IEEE international conference on integrated circuits and microsystems. Nanjing: IEEE, 2017: 246-250. [4] ZINKE C, ANKE J, MEYER K, et al. Modeling, analysis and control of personal data to ensure data privacy - a use case driven approach[C]//International conference on applied human factors and ergonomics. Cham: Springer, 2017: 87-96. [5] ROHUNEN A, MARKKULA J. On the road-listening to data subjects’ personal mobility data privacy concerns[J]. Behaviour & information technology, 2019, 38(5): 486-502. [6] MEHARANJUNISA S. Global perspective: cyberlaw, regulations and compliance[J]. International journal of trend in scientific research and development, 2020, 4(5): 4-7. [7] ANDREOTTA R J. The national information infrastructure: its implications, opportunities, and challenges[J]. Wake forest law review, 1995, 30(1): 221-231. [8] BRAMAN S. Defining information policy[J]. Journal of information policy, 2011, 1: 1-5. [9] TODESCHINI R, BACCINI A. Handbook of bibliometric indicators: quantitative tools for studying and evaluating research[M]. Weinheim: Wiley-VCH, 2016. [10] CHEN C. CiteSpace: visualizing patterns and trends in scientific literature[EB/OL]. [2022-03-18]. http://cluster.cis.drexel.edu/~cchen/citespace/. [11] LECHMANN H. Guiding principles for national documentation - information policy in the field of science and technology[J]. Nachrichten fur documentation, 1967, 18(1): 16. [12] ROSENBERG V. Information policies of developing countries: the case of Brazil[J]. Journal of the American Society for Information Science, 1982, 33(4): 203-207. [13] HWANG H Y R. Science and technology information policy in Korea[J]. Government information quarterly, 1990, 7(1): 9-24. [14] KLUGE E H. Health information, privacy, confidentiality and ethics[J]. International journal of bio-medical computing, 1994, 35(S1): 23-27. [15] ROBINSON D M. Health information privacy: without confidentiality[J]. International journal of bio-medical computing, 1994, 35(S1): 97-104. [16] MOEN W E. Information technology standards in the federal government: components of federal information policy[C]//Proceedings of the ASIS annual meeting. Columbus: Learned Information, 1993: 25-31. [17] HÄYRY M, TAKALA T. Genetic information, rights, and autonomy[J]. Theoretical medicine and bioethics, 2001, 22(5): 403-414. [18] RUGHINIS C, RUGHINIS R. Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union[J]. Computers & security, 2014, 43: 111-125. [19] 曹文振, 周庆山, 邝伟文. 国际核心期刊情报学论文前沿研究领域分析(2016-2018年)——基于一种改进的样本遴选方法[J]. 现代情报, 2019, 39(5): 3-16. [20] SOURBATI M. Disabling communications? a capabilities perspective on media access, social inclusion and communication policy[J]. Media, culture & society, 2012, 34(5): 571-587. [21] BUITEN M C. Towards intelligent regulation of artificial intelligence[J]. European journal of risk regulation, 2019, 10(1): 41-59. [22] KOOHANG A, NORD J H, SANDOVAL Z V, et al. Reliability, validity, and strength of a unified model for information security policy compliance[J]. Journal of computer information systems, 2021, 61(2): 99-107. [23] VERMA R, GOVINDARAJ J, GUPTA G. Data privacy perceptions about digital forensic investigations in india[C]//IFIP international conference on digital forensics. Cham: Springer, 2016: 25-45. [24] HENDRICKS-STURRUP R M, LU C Y. Direct-to-consumer genetic testing data privacy: key concerns and recommendations based on consumer perspectives[J]. Journal of personalized medicine, 2019, 9(2): 25. [25] ELMAHJUB E. Situating intellectual property policy into a human development paradigm[J]. The journal of world intellectual property, 2015, 18(5): 245-269. [26] 章琪. 摩尔定律的失效将催生更多创新[J]. 世界科学, 2015(6): 30-34. [27] ONIK M M H, CHUL-SOO K I M, JINHONG Y. Personal data privacy challenges of the fourth industrial revolution[C]//21st International conference on advanced communication technology. PyeongChang: IEEE, 2019: 635-638. [28] 国家互联网信息办公室. 国家互联网信息办公室有关负责人就对滴滴全球股份有限公司依法作出网络安全审查相关行政处罚的决定答记者问[EB/OL]. [2022-09-13]. http://www.cac.gov.cn/2022-07/21/c_1660021534364976.htm. [29] 国家计算机病毒应急处理中心. 西北工业大学遭美国NSA网络攻击事件调查报告(之一)[R/OL]. [2022-09-13]. https://www.cverc.org.cn/head/zhaiyao/news20220905-NPU.htm. |