[1] |
GUO Zhen, LI Shuaizheng.
Thinking on the path of accelerating the development of digital economy based on artificial intelligence
[J]. Information and Communications Technology and Policy, 2022, 48(6): 69-74.
|
[2] |
MA Yuan, TU Xiaojie.
Global integrated circuit industry: evolution, migration and reconstruction
[J]. Information and Communications Technology and Policy, 2022, 48(5): 68-77.
|
[3] |
ZHANG Xiye.
The research on financial data compliance management
[J]. Information and Communications Technology and Policy, 2022, 48(4): 25-30.
|
[4] |
LI Xueni, QIN Shukai.
Research on the construction of data security governance capability evaluation framework
[J]. Information and Communications Technology and Policy, 2022, 48(2): 37-41.
|
[5] |
GONG Shiran, LIU Xuehua.
Research and analysis of data security governance
[J]. Information and Communications Technology and Policy, 2022, 48(2): 42-46.
|
[6] |
ZHANG Yuming, ZHANG Qiwei.
Research on data integration of large group enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(2): 61-66.
|
[7] |
Zelin LU, Yan CHEN.
The theoretical connotation, realistic challenges, and practical path on marketization for data
[J]. Information and Communications Technology and Policy, 2022, 48(1): 11-18.
|
[8] |
Yuxia SHI.
Data element market situation, problems and suggestions
[J]. Information and Communications Technology and Policy, 2022, 48(1): 19-23.
|
[9] |
Dan SU, Kun YAN, Wenyu LI.
Patent analysis of intelligent transportation
[J]. Information and Communications Technology and Policy, 2022, 48(1): 84-88.
|
[10] |
WEI Liang, TIAN Huirong, .
Development status and trend of network security.
[J]. Information and Communications Technology and Policy, 2021, 47(8): 17-23.
|
[11] |
ZHANG Feng, YU Le, MA Yusheng, ZHANG Hongyang, JIANG Weiqiang, .
Research and practice of data security classification and grading
[J]. Information and Communications Technology and Policy, 2021, 47(8): 45-50.
|
[12] |
LI Xiaowei, WU Ying, ZOU Yu, BAI Yunfei, .
Research on data security governance architecture and technology
[J]. Information and Communications Technology and Policy, 2021, 47(8): 51-55.
|
[13] |
NING Tingyong, XIONG Jie, HU Yongbo, .
Research on security threats of AI application landing
[J]. Information and Communications Technology and Policy, 2021, 47(8): 64-68.
|
[14] |
ZHAO Jingwu, ZHOU Ruijue .
Privacy preserving computing: the construction of synchronization rules for data flow and data security
[J]. Information and Communications Technology and Policy, 2021, 47(7): 53-.
|
[15] |
YAN Shu, LYU Ailin.
Overview of the development of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2021, 47(6): 1-11.
|