期刊文献+

美国信息安全法律体系综述及其对我国信息安全立法的借鉴意义 被引量:8

On US Cyber Security Law System and the Reference to China's Cyber Security Laws
下载PDF
导出
摘要 作为新的国家安全观重要构成要素之一的信息安全问题,已日益引起世界各国的关注。近几年来,美国采取了强有力的立法措施以解决其网络及计算机系统的脆弱性问题。美国为保障信息安全所做出的立法努力对我国的信息安全立法有极大的借鉴意义。在我国的信息安全立法过程中,应该特别注意对公民基本权利的维护和国际合作问题,同时,应该通过立法保障对信息安全研究的财政支持力度。 As one of the most important components of the new national security concept, cyber security has drawn more and more attention from all over the world. In recent years, the United States has taken powerful legislative measures in order to solve the problem or fragility in its internet and computer system. The legislative efforts of the United States to enhance its cyber security give us a good deal of enlightenment. When making China's cyber security laws, we should pay special attention to protecting the citizens' basic rights and international cooperation. At the same time, legislation should also enhance the financial support to the cyber security research.
作者 于鹏 解志勇
出处 《甘肃行政学院学报》 2009年第1期112-118,共7页 Journal of Gansu Administration Institute
基金 国家242信息安全计划课题《信息安全立法与短信息立法比较研究》的阶段性成果
关键词 信息安全 法律体系 立法 比较研究 Cyber Security Law System Legislation Comparative Study
  • 相关文献

参考文献8

  • 1Stohs,Brett.Protecting The Homeland By Exemp-tion:Why The Critical Infrastructure Information Act of2002 Will Degrade The Freedom of Information Act[].Duke Law and Technology Review.2002 被引量:1
  • 2Burnham,William.Introduction to the Law and Legal System of the United States[]..2002 被引量:1
  • 3Statement of Attorney General Alberto RGonzales on the Passage of the Cybercrime Convention. http://www.usdoj.gov/opa/pr/2006/August/06_ag_499.html . 2006 被引量:1
  • 4Patterson,Benjamin J.Spyware:Covertly Infringing On Your Internet Privacy While Circumventing The Feral Legislation Radar[].Drake Law Review.2005 被引量:1
  • 5Raghavan,Tara Mythri.In Fear of Cyberterrorism:An Analysis of The Congressional Response[].University of Illinois Journal of LawTechnology and Policy.2003 被引量:1
  • 6Krim,Jonathan.States Scramble to Protect Data:Dozens of Privacy Bills Introduced After Spate of Security Breaches[].The Washington Post.2005 被引量:1
  • 7Nykodym,Nick,R.Taylor.Control of Cyber Crime:The World’s Current Legislative Efforts Against Cyber Crime[].Computer Law&Security Report.2004 被引量:1
  • 8Welcome to IC3. http://www.ic3.gov/ . 2006 被引量:1

同被引文献151

引证文献8

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部