期刊文献+

“瓦济里斯坦——费尔干纳”区域恐怖主义对我国跨境反恐情报保障机制的挑战及其应对策略 被引量:1

下载PDF
导出
摘要 恐怖主义已是世界性安全问题。跨境反恐是由被动反恐向积极反恐的重大转变,也是适应反恐新形势的需要。跨境反恐高度的政治敏感性、复杂的任务环境等因素使得相应的情报保障机制尤为复杂。以"瓦济里斯坦—费尔干纳"区域为切入点,综合分析了该区域国际恐怖主义的活动方式,及我国跨境反恐情报保障机制存在的主要问题。我国要在总体国家安全观的指导下,谋划境外反恐情报保障的总体布局;以"一带一路"战略为牵引,打造反恐情报保障的命运共同体;立足于现有区域性国际反恐公约,进一步完善区域范围内反恐情报保障机制;以地区社会文化交流合作为支撑,助推反恐情报体系全域覆盖;迈出网络反恐的实质性步伐,破解制约反恐情报保障的体制性障碍。
出处 《北京警察学院学报》 2018年第1期35-40,共6页 Journal of Beijing Police College
基金 国家社科基金资助项目"反恐维稳背景下边疆地区维稳战略研究"(项目编号:14BZZ028)的成果之一
  • 相关文献

二级参考文献91

  • 1Yochai Benkler, "From Consumers to Users: Shifting the Deeper Structures of Regulation towards Sustain- able Commons and User Access," Fed. Comm. LJ, Vol. 52, No. 3, 1999, p. 561.
  • 2Michael Marten, "New Communications Technology-A Survey of Impacts and Issues," Telecommunications Policy, Vol. 20, No. 5, 1996, pp. 375-387.
  • 3Zachary Peterson, Mark Gondree and Robert Beverly, "A Position Paper on Data Sovereignty: The Impor- tance of Geolocating Data in the Cloud," Proceedings of the 8th USENIX conference on networked systems design and implementation, 2011.
  • 4Primavera De Filippi and Smari McCarthy, "Cloud Computing: Centralization and Data Sovereignty," Eu- ropean Journal of Law and Technology, Vol. 3, No. 2, 2012, http://ejh, org/article/view/101/234.
  • 5Marc Mosch, et al. , Automated Federation of Distributed Resources into User-Controlled Cloud Environ- merits, 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, 2012, pp, 321-326.
  • 6Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty, " International Journal of Cyber Warfare and Terrorism, Vol. 2, No. 3, 2013, pp.26-30.
  • 7Patrice Lyons, "Cyberspace and the Law: Your Rights and Duties in the On-Line World: Edward A. Ca- vazos and Cavino Morin. The MIT Press, Cambridge, Mass. 1994," Information Processing & Management, Vol. 31, No.6, 1995, p. 910.
  • 8Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville, "Establishing Cyberspace Sovereignty," pp. 321-326.
  • 9Brad Brown, Michael Chui and James Manyika, "Are You Ready for the Era of 'Big Data'," McKinsey Quarterly, Vol. 4, 2011, pp. 24-35.
  • 10Johan Eriksson and Giampiero Giacomello, "Who Controls the Internet? Beyond the Obstinacy or Obsoles- cence of the State," International Studies Review, Vol. 11, No. 1, 2009, pp. 205-230.

共引文献49

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部