Page 94 - 201902
P. 94
( 4):608 - 618.
〔 2〕Cramer,J. F., Streck, D. A. Protection of sensitive information in a law enforcement computer networks
〔 R〕 . Carnahan conference on electronic crime countermeasures, 1973.
〔 3〕Kashmeri,S. A. . Security and design considerations in a distributed criminal justice computer network -
the state of missouri's approach 〔 R〕 . Bureau of Justice Statistics,1975.
〔 4〕Chambers J A,Poore R V. Computer networks in higher education:socio - economic - political factors
〔 C〕 . ACM, 1975.
〔 5〕Berg S V. Planning for computer networks:The trade analogy 〔 J〕 . Management Science,1975,21
( 12):1458 - 1465.
〔 6〕Office U S G A. Challenges of Protecting Personal Information in an Expanding Federal Computer Network
Environment 〔 R〕 . 1978,https:/ / www. gao. gov / products/ LCD - 76 - 102.
〔 7〕〔美〕丹尼尔·贝尔. 后工业社会的来临 〔 M〕 . 新华出版社,1997. 30 - 36
〔 8〕Shabazz,D. Internet politics and the creation of a virtual world 〔 J〕 . International Journal on World
Peace,1999,16 ( 3): 27 - 39.
〔 9〕Dolfsma,W. Review:internet:an economist's utopia?〔 J〕 . Review of International Political Economy,
1998,5 ( 4): 712 - 720.
〔 10〕 Krishnan,O. Beyond national boundaries:towards an internet society 〔 J〕 . Sociological Bulletin,
1999,48 ( 1 / 2): 275 - 283.
〔 11〕 Baber,Z. . Engendering or endangering democracy?the internet,civil society and the public sphere
〔 J〕 . Asian Journal of Social Science,2002,30 ( 2): 287 - 303.
〔 12〕Hick S, Halpin E. Children's Rights and the Internet 〔 J〕 . Annals of the American Academy of Political
& Social Science, 2001, 575 ( 1):56 - 70.
〔 13〕Ono H,Zavodny M. Gender and the Internet 〔 J〕 . Social Science Quarterly,2003,84 ( 1):111 -
121.
〔 14〕阿尔温·托夫勒. 权力的转移 〔 M〕 . 中共中央党校出版社,1991. 1 - 18.
〔 15〕〔美〕尼葛洛庞帝. 数字化生存 〔 M〕 . 海南出版社,1997. 21 - 31.
〔 16〕〔美〕曼纽尔·卡斯特尔. 网络社会的崛起 〔 M〕 . 社会科学文献出版社,2001. 578.
〔 17〕2025 年,通用人工智能达到人脑智力水平 〔 EB / OL〕 . 搜狐科技,2016 - 11 - 7.
〔 18〕约翰·P. 巴洛,李旭,李小武 (译) . 网络空间独立宣言 〔 J〕 . 清华法治论衡,2004.
【责任编辑:朱凤霞】
4 · ·
9