Affiliation:
1. Office of Research on Law and Policy, Hangzhou People’s Procuratorate , Hangzhou 310000 , Zhejiang , China
2. Criminal Prosecution Department, Hangzhou People’s Procuratorate , Hangzhou 310000 , Zhejiang , China
Abstract
Abstract
With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.
Reference20 articles.
1. G. Spruiell, Psychoanalysis, identity, and the internet: Explorations into cyberspace, A. Marzi, Ed., vol. 268, London, Karnac Books, 2018, pp. 392–397.
2. V. A. Almeida, D. Doneda, and J. de Souza Abreu, “Cyberwarfare and digital governance,” IEEE Internet Comput, vol. 21, no. 2, pp. 68–71, 2017.
3. E. Y. Huan, G. H. Wen, S. J. Zhang, D. Y. Li, Y. Hu, T. Y. Chang, et al., “Deep convolutional neural networks for classifying body constitution based on face image,” Comput. Math. Methods Med., vol. 2, pp. 1–9, 2017.
4. T. Stevens, “Cyberweapons: Power and the governance of the invisible,” Int. Politics, vol. 55, pp. 482–502, 2018.
5. J. Yang, “Guiding global governance in new frontiers guided with idea of community of shared destiny for mankind,” Contemp. World, vol. 3, pp. 47–50, 2017.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献