:::

詳目顯示

回上一頁
題名:美國在資訊時代中對關鍵基礎設施保護架構與資訊分享議題初探及我國的借鏡
書刊名:前瞻科技與管理
作者:程法彰 引用關係洪嫈媛
作者(外文):Cheng, Fa-changHung, Ying-yuan
出版日期:2013
卷期:3:2
頁次:頁119-137
主題關鍵詞:關鍵基礎設施關鍵基礎設施資訊資訊分享國土安全法愛國者法Critical infrastructureCritical infrastructure informationInformation sharingHomeland Security ActUniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:0
  • 點閱點閱:37
資訊時代下的資訊快速流動與國家安全的交集-關鍵基礎設施的保護,是資訊時代下的共通議題。這樣的議題在美國歷經九一一事件後更突顯其重要性。在保護關鍵設基礎施政策制定與實踐的過程中,除了定義關鍵基礎設施外,政府與民間的資訊共享對於保護關鍵設基礎施的成效往往有舉足輕重的地位,而美國在此議題可能產生的執行上爭議與解釋亦有相當豐富的經驗與討論,相關聯邦法律(國土安全法、愛國者法以及資訊自由法及其例外規定)必須加以討論來說明美國在此議題上的態度與作法。尤其重點在資訊共享關於個人資訊隱私的互動與相關最新發展,藉此說明美國關於資訊分享與個人資訊隱私的互動。其後對於我國的目前現況加以介紹,並在最後提出本文的觀察與建議。
The common topic under the Information Age between the fast flow of information and the national security is the protection of critical infrastructure. The topic of protecting critical infrastructure is more prominent after the occurrence of 911 Events in the United States. And in the process of making and enforcing the policy for the protection of critical infrastructure, the concept of information sharing between the governmental agency and the private entity is crucial to the success of protection. Since the United States has accumulated sufficient practical experience and discussion to illuminate the practical dispute or/and interpretation for prosecuting information sharing, several federal legislations discussed in this article will clearly indicate the current policy approach in encouraging information sharing and be worth of noticing. Especially, the central of discussion converges on the interaction between the information sharing and the information privacy protection, including the recent development. The article is going to conclude with observation and suggestion to the status quo of protecting critical infrastructure in Taiwan subject to learning experience from the United States in striving for protecting critical infrastructure.
期刊論文
1.吳志堅、李勝義(20131100)。具備修改區域偵測及所有權宣告雙重功能之遙測影像網頁浮水印加密機制。中正嶺學報,42(2),109-123。  延伸查詢new window
2.Bay, H.、Tuytelaars, T.、Van Gool L.(2008)。SURF: Speeded Up Robust Features。Computer Vision and Image Understanding,110(3),346-359。  new window
3.Brown, M.、Lowe, D. G.(2006)。Automatic Panoramic Image Stitching Using Invariant Features。International Journal of Computer Vision,74(1),59-73。  new window
4.Huang, P.S.、Chiang, C.S.、Chang, C.P.、Tu, T.M.(2005)。Robust Spatial Watermarking Technique for Colour Images Via Direct Saturation Adjustment。Vision, Image and Signal Processing, IEE Proceedings,152,561-574。  new window
5.Juan, L.、Gwun, O.(2009)。A Comparison of SIFT, PCA-SIFT and SURF。International Journal of Image Processing,3(4),143-152。  new window
6.Kim, H.S.、Lee, H.K.(2003)。Invariant Image Watermarking Using Zernike Moments。IEEE Transactions on Circuits and Systems for Video Technology,13,766-775。  new window
7.Lee, H. Y.、Kim, H.、Lee, H. K.(2006)。Robust Image Watermarking Using Local Invariant Features。Optical Engineering,45(3),1-11。  new window
8.Lin, C.Y.、Wu, M.、Bloom, J.A.、Cox, I.J.(2001)。Rotation, Scale, and Translation Resilient Watermarking for Images。IEEE Transactions on Image Processing,10,767-782。  new window
9.Luo, H.、Sun, X.、Yang, H.、Xia, Z.(2011)。A Robust Image Watermarking Based on Image Restoration Using SIFT。Radio Engineering,20,525-532。  new window
10.Nasir, I.、Khelifi, F.、Jiang, J.、Ipson, S.(2012)。Robust Image Watermarking Via Geometrically Invariant Feature Points and Image Normalization。IET Image Processing,6,354-363。  new window
11.Xiang, S.、Kim, H.J.、Huang, J.(2008)。Invariant Image Watermarking Based on Statistical Features in Low-Frequency Domain。IEEE Transactions on Circuits and Systems for Video Technology,18,777-789。  new window
12.Petitcolas, F.(2000)。Watermarking Schemes Evaluation。IEEE Signal Processing,17(5),58-64。  new window
會議論文
1.蕭人豪、林欣慧、林金龍、林麗虹(2004)。數位浮水印技術發展現況:以數位典藏計畫為例。第三屆數位典藏技術研討會。台北:中央研究院資訊科學研究所。  延伸查詢new window
2.Helmer, S.、Lowe, D.G.(2004)。Object Recognition with Many Local Features。Workshop on Generative Model Based Vision。Washington, DC, US。  new window
3.Ledley, R.S.、Buas, M.、Golab, T.J.(1990)。Fundamentals of True-Color Image Processing。10th International Conference on Pattern Recognition。Atlantic City, NJ, US.。  new window
4.Scovanner, P.、Ali, S.、Shah, M.(2007)。A 3-Dimensional SIFT Descriptor and Its Application to Action Recognition。New York, US:ACM。357-360。  new window
5.Shen, Z.W.、Wu, J.T.(2011)。Geometrically Invariant Watermarking Based on Nonlinear Anisotropic Diffusion。The International Conference on Wave let Analysis and Pattern Recognition。Guilin, China。  new window
6.Song, C.、Sudirman, S.、Merabti, M.(2010)。A Spatial and Frequency Domain Analysis of the Effect of Removal Attacks on Digital Image Watermarks。The 11th PGNet。Liverpool, UK。  new window
7.Su, P.C.、Chang, Y.C.(2012)。A Geometrically Resilient Digital Image Watermarking Scheme Based on SIFT and Extended Template Embedding。The 4th International Conference on Evolving Internet。Venice, Italy: IARIA:IARIA。102-107。  new window
8.Sun, J.G.、He, W.(2009)。RST Invariant Watermarking Scheme Based on SIFT Feature and Pseudo-Zernike Moment。The 2nd International Symposium on Computational Intelligence and Design。Changsha, China。  new window
9.Wagner, D.、Schmalstieg, D.、Bischof, H.(2009)。Multiple Target Detection and Tracking with Guaranteed Framerates on Mobile Phones。The 8th IEEE International Symposium on Mixed and Augmented Reality。Washington, DC, US:IEEE Computer Society Press。57-64。  new window
10.Lowe, D. G.(1999)。Object Recognition From Local Scale-Invariant Features。The International Conference on Computer Vision。IEEE Computer Society Press。1150-1157。  new window
學位論文
1.蔡坤龍(2005)。基於碎形正交基底之資訊隱藏技術(碩士論文)。國立中山大學。  延伸查詢new window
圖書
1.Cox, I. J.、Miller, M. L.、Bloom, J. A.、Fridrich, J.、Kalker, T.(2008)。Digital Watermarking and Steganography。Morgan Kaufmann。  new window
2.Gonzalez, Rafael C.、Woods, Richard E.(2002)。Digital Image Processing。New Jersey:Pearson Education Inc, Prentice Hall。  new window
其他
1.(2013)。Google地圖街景服務,http://maps.google.com.tw/intl/zh-TW/help/maps/streetview/, 2013/02/27。  new window
2.中央銀行。流通鈔券真偽之辨識,http://www.currency.cbc.gov.tw/tb6.htm, 2013/02/27。  延伸查詢new window
3.張真誠(2002)。淺談數位浮水印,http://msn.iecs.fcu.edu.tw/~ccc/article/20_watermark.pdf, 2013/01/16。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE