[1] |
ZHANG Bin, WEN Nuan, QIU Qin, ZHOU Ying, LI Wenqi.
Research and practice of data security management in information and communication enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(8): 19-23.
|
[2] |
LIU Xin, CAO Jing, SHAO Zhijie, ZHOU Yuefeng.
Anti-ransomware research based on data storage technologies
[J]. Information and Communications Technology and Policy, 2022, 48(8): 36-42.
|
[3] |
WANG Wei, CAO Jing, CHENG Geng, LI Xueying.
Research on reducing the impact of automated decision on personal information security
[J]. Information and Communications Technology and Policy, 2022, 48(8): 52-58.
|
[4] |
WEI Kai, YAN Shu, LYU Ailin.
An overview on the market-based allocation of data factor
[J]. Information and Communications Technology and Policy, 2022, 48(8): 59-64.
|
[5] |
ZHOU Bohui, YU Le, MA Yusheng, PAN Jiali.
Patent situation analysis of data security technology
[J]. Information and Communications Technology and Policy, 2022, 48(7): 87-91.
|
[6] |
SU Zhifu.
The path selection and rule construction of commercial data protection in the era of data elements
[J]. Information and Communications Technology and Policy, 2022, 48(6): 14-26.
|
[7] |
YAO Huanqing, ZHOU Xun.
From regulatory data acquisition to regulatory data use
[J]. Information and Communications Technology and Policy, 2022, 48(6): 2-7.
|
[8] |
QIN Le, LI Hongyang.
Research on key trends of intellectual property governance of the digital economy in US and EU
[J]. Information and Communications Technology and Policy, 2022, 48(6): 36-40.
|
[9] |
GUO Zhen, LI Shuaizheng.
Thinking on the path of accelerating the development of digital economy based on artificial intelligence
[J]. Information and Communications Technology and Policy, 2022, 48(6): 69-74.
|
[10] |
WANG Shanshan, YAN Wenjun, XIAO Youdan.
Research on the rules of utilization of enterprise data
[J]. Information and Communications Technology and Policy, 2022, 48(6): 8-13.
|
[11] |
LYU Ailin, YAN Shu.
Some thoughts on cross-platform interconnection of privacy preserving computing
[J]. Information and Communications Technology and Policy, 2022, 48(5): 2-6.
|
[12] |
ZHOU Jianping, ZHENG Peitian, WANG Yunhe, JIN Chen, SHI Dai.
A brief analysis of the impact of privacy preserving computation on data capitalization flow patterns
[J]. Information and Communications Technology and Policy, 2022, 48(5): 25-33.
|
[13] |
WANG Xue, LI Wulu, LI Yuan, HE Linfang, LIU Chunwei, LI Sisi.
Analysis of privacy preserving computing in inclusive finance
[J]. Information and Communications Technology and Policy, 2022, 48(5): 53-59.
|
[14] |
ZHANG Xiye.
The research on financial data compliance management
[J]. Information and Communications Technology and Policy, 2022, 48(4): 25-30.
|
[15] |
WU Meixi, YANG Xiaotong.
Five forces of computational power: a comprehensive method to measure computational power
[J]. Information and Communications Technology and Policy, 2022, 48(3): 13-21.
|