{"title":"在 \"互联网+\"中加强对儿童权利的法律保护","authors":"Binjing Li, Wendong Yu","doi":"10.4018/ijisp.349898","DOIUrl":null,"url":null,"abstract":"In the contemporary era of the internet, safeguarding children's rights emerges as a critical concern necessitating immediate attention. Given children's heightened vulnerability within society, the legal framework must prioritize their protection, reinforcing their agency and safeguarding their rights through legislative measures. This study proposes an innovative differential clustering algorithm specifically designed to uphold children's rights. Through rigorous experimentation, the algorithm achieves an Adjusted Rand Index (ARI) approaching 2, showcasing its effectiveness in offering targeted differential protection for children's rights while maintaining high clustering precision. The paper emphasizes the importance of noise reduction through iterative central point optimization to stabilize cluster configurations, with the fusion of multiple clusters serving to mitigate noise impacts on data points and yield robust clustering outcomes. Consequently, this research delivers reliable clustering results while preserving the confidentiality of children's rights information.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing Legal Protection of Children's Rights in the “Internet Plus”\",\"authors\":\"Binjing Li, Wendong Yu\",\"doi\":\"10.4018/ijisp.349898\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the contemporary era of the internet, safeguarding children's rights emerges as a critical concern necessitating immediate attention. Given children's heightened vulnerability within society, the legal framework must prioritize their protection, reinforcing their agency and safeguarding their rights through legislative measures. This study proposes an innovative differential clustering algorithm specifically designed to uphold children's rights. Through rigorous experimentation, the algorithm achieves an Adjusted Rand Index (ARI) approaching 2, showcasing its effectiveness in offering targeted differential protection for children's rights while maintaining high clustering precision. The paper emphasizes the importance of noise reduction through iterative central point optimization to stabilize cluster configurations, with the fusion of multiple clusters serving to mitigate noise impacts on data points and yield robust clustering outcomes. Consequently, this research delivers reliable clustering results while preserving the confidentiality of children's rights information.\",\"PeriodicalId\":44332,\"journal\":{\"name\":\"International Journal of Information Security and Privacy\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2024-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijisp.349898\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijisp.349898","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Enhancing Legal Protection of Children's Rights in the “Internet Plus”
In the contemporary era of the internet, safeguarding children's rights emerges as a critical concern necessitating immediate attention. Given children's heightened vulnerability within society, the legal framework must prioritize their protection, reinforcing their agency and safeguarding their rights through legislative measures. This study proposes an innovative differential clustering algorithm specifically designed to uphold children's rights. Through rigorous experimentation, the algorithm achieves an Adjusted Rand Index (ARI) approaching 2, showcasing its effectiveness in offering targeted differential protection for children's rights while maintaining high clustering precision. The paper emphasizes the importance of noise reduction through iterative central point optimization to stabilize cluster configurations, with the fusion of multiple clusters serving to mitigate noise impacts on data points and yield robust clustering outcomes. Consequently, this research delivers reliable clustering results while preserving the confidentiality of children's rights information.
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.