Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique characteristics of child users, the underlying concerns have also attracted widespread attention. Recently, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches” formulated by the China Cybersecurity Industry Alliance have officially come into effect. … Read more

Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique nature of child users, the underlying concerns have also attracted widespread attention. Recently, the alliance technical specification formulated by the China Cybersecurity Industry Alliance, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches,” has … Read more

Current Status of Automotive ECU Technology

Current Status of Automotive ECU Technology

If we compare the engine to the “heart” of a car, then the car’s “brain” should be the ECU. What is an ECU? How does it work? This article provides a detailed analysis.What is an ECU? ECU has two full names: Engine Control Unit and Electronic Control Unit. It is easy to see that the … Read more

Embedded Security: The Political Logic of America’s Energy Transition

Embedded Security: The Political Logic of America's Energy Transition

Click here to view submission system details SUBMISSION Huang Yunyong (School of International Political Economy, Chinese Academy of Social Sciences) Citation Huang Yunyong. “Embedded Security: The Political Logic of America’s Energy Transition” [J]. International Petroleum Economics, 2025, 33(01): 11-28. Abstract The security aspect of America’s energy transition exhibits “embedded” characteristics. Although the process of energy … Read more