Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 74-77.doi: 10.3969/j.issn.1671-1122.2015.09.018
• Orginal Article • Previous Articles Next Articles
Received:
2015-07-15
Online:
2015-09-01
Published:
2015-11-13
CLC Number:
Xiu-chun WU, Yong QING. The Criminal Law Regulation of the Rubbish Electronic Information[J]. Netinfo Security, 2015, 15(9): 74-77.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.09.018
[1] | 王红梅,张金良,王先良,等.中国电子垃圾现状及环境管理对策分析[J].环境科学与管理,2008,(5):1-3. |
[2] | Kaspersky Lab. Spam in December[EB/OL].http: / /www. securelist. com/en /analysis /204792323 /Spamin December _2013,2014-01-28. |
[3] | 许长帅.关于治理垃圾电子信息的若干思考[EB/OL]. |
[4] | 付景广. 《互联网电子邮件服务管理办法》浅析[J].信息网络安全,2006,(4):13-15. |
[5] | 丁宇. 网络信息用户需求的特点与利用特征及规律浅析[J].情报理论与实践,2003,(5);412-414. |
[6] | 王运福. 电子边圾邮件的立法规制与政策考量[J].法治研究,2007,(4):60. |
[7] | 顾廷斌. 垃圾电子邮件的获益者[J].信息网络安全,2004,(9):22-24. |
[8] | 郭懿美,蔡庆辉.电子商务法经典案例研究[M].北京:中信出版社,2006. |
[9] | 丁震. 关注中国政府首次治理垃圾电子邮件行动[J].信息网络安全,2004,(5):6-7. |
[10] | 李红. 疏堵结合破立并举深入推动垃圾电子信息治理[J].世界电信,2009,(3):56-57. |
[11] | 史彤彪.法律向垃圾邮件宣战[N].人民法院报,2003-1-11. |
[12] | 郑淑荣. 斩断垃圾短信黑手——国外整治垃圾短信启示录[J].中国电信业,2006,(7):61-63. |
[13] | 陶立峰. 香港反滥发电子信息规制及其启示[J].江苏商论,2008,(6):50-52. |
[14] | 司伟,沈恒亮.网络聊天室、电子公告板中的信息安全与监管[J].信息网络安全,2002,(3):29-31. |
[15] | 钱叶六,钱格祥.情节加重犯基本问题探究[J].宁夏大学学报,2005,(6):47-51. |
[16] | 易阳峰. 垃圾短信监控的原理与实现[J].中兴通讯技术,2005,(6):49-54. |
[17] | 何培舟,温向明,郑伟.垃圾短信的防治方法研究[J].通信技术,2008,(12):340-342. |
[18] | 顾健,李毅,邱梓华.我国反垃圾电子邮件产品概况[J].信息网络安全,2007,(9):5-7. |
[19] | 屠建路.反垃圾邮件立法迫在眉睫[N].北京现代商报,2004-2-25. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||