首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
法律   2篇
中国政治   1篇
政治理论   1篇
综合类   1篇
  2013年   1篇
  2012年   2篇
  2006年   1篇
  2004年   1篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
Abstract

The U.S. Congress, after a relatively slow start in the 1990s, is now making some progress in meeting the demands of online communications. Fueled by the growing use of e-mail by constituents and the development of online grassroots efforts, Congress has been inundated with e-mail. By using filtering systems, better software and hardware, and, most of all, better management techniques, many offices are now equipped to handle the great increase in electronic mail. While several steps behind the private sector, through fits and starts, Congress is attempting to catch up and meet the rising demand and volume of electronic communication. In some offices, there has been considerable progress in developing effective, interactive Web sites. These exceptional Web sites should serve as models of dynamic online communications, but for most congressional Web sites, there is a long way to go. Much depends on the attitudes and priorities set by lawmakers and their senior Staff.  相似文献   
2.
庄乾龙 《时代法学》2012,10(2):37-43
司法实践中电子邮件加密方法主要有对称密钥加密与非对称密钥加密两类,结合数字认证、数字签名等辅助加密技术,可以相应提高加密级别,增加电子邮件安全性。一般而言,加密电子邮件可靠性要高于非加密电子邮件,加密电子邮件证据能力受解密程序影响。电子邮件证据证明力受加密方法、行为人对电子邮件控制程度等因素影响。电子邮件证据证明力随加密级别的提高而提高。  相似文献   
3.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself.  相似文献   
4.
随着钓鱼网站的活动日渐猖獗,钓鱼网站的数量逐渐激增,严重地影响我国电子商务、网上银行的发展,影响人们对互联网应用的信心,危害广大网络用户利益。钓鱼网站的影响和危害程度已经远远超过木马和病毒,成为我国互联网最大的安全威胁。因此,弄清钓鱼网站本质特征和主要类型、了解钓鱼网站的传播途径和危害方法,掌握钓鱼网站的鉴别方法和防范策略,以及遭遇钓鱼网站后的补救措施,显得非常必要。  相似文献   
5.
电子邮件传输中的安全性问题十分重要,一种在电子邮件终端实现的安全电子邮件系统可充分保障电子邮件传输中的机密性、完整性和可鉴别性。同时,该系统不需要对通用邮件服务器进行改动,因而部署简便、经济,实用性好。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号