期刊文献+

美国情报融合中心建设及对我国警务情报工作的启示 被引量:1

Research on the Construction of the USA Fusion Centers and its Inspiration for the Chinese Policing Intelligence
下载PDF
导出
摘要 吸取911事件中情报信息缺少共享的教训,美国政府以反恐为中心目标,由国土安全部和司法部在全国组建了72家情报信息融合中心,建立了由联络官制度和标准规范为主体的运行机制以及加强个人隐私保护以及信任合作的组织文化环境,对中国警务情报部门的组织架构和情报文化建设提供了有益借鉴。 Based on the lessons of the information sharing in the 911,the USA government, mainly the Department of National Homeland Security the Department of the Justice, were authorized to construct 72 fusion centers around the whole country for the aim to counter terrorism, meanwhile also the mechanisms of liaison officer, standard specifications, privacy protecting and cooperation, which can benefit the Chinese policing intelligence performance a lot.
作者 杨赛赛
出处 《电脑知识与技术(过刊)》 2016年第7X期65-66,71,共3页 Computer Knowledge and Technology
关键词 融合中心 警务情报 信息共享 fusion center policing intelligence information sharing
  • 相关文献

参考文献8

  • 1United States Department of Justice.Fusion Center Guide-lines—Developing and Sharing Information in a New Era. . 2006
  • 2Kevin Saupp.Fusion Liaison Officer Programs:Effective Shar-ing of Information to Prevent Crime and Terrorism. The po-lice chief . 2010
  • 3Jim Weiss,Mickey Davis.Information Sharing:The NortheastOhio Regional Fusion Center. Journal of Counterterrorism&Homeland Security International . 2011
  • 4Rebecca Kanable.Fusion centers grow up. Law enforcementtechnology . 2011
  • 5许发见.从“维基解密”事件看公安网络安全管理重要性[J].信息网络安全,2011(2):2-4. 被引量:4
  • 6(英) 莱特克里菲 (Ratcliffe,J.),著.情报主导警务(M)中国人民公安大学出版社, 2010
  • 7Lambert,David.??Intelligence-Led Policing in a Fusion Center(J)FBI Law Enforcement Bulletin . 2010 (12)
  • 8Sen Tom Coburn.Fusion Center follies. C4ISR:The journalof net-centric warfare . 2012

二级参考文献3

  • 1Jaeger,T.On the increasing importance of constraints[C].In Proceedings of 4th ACM Workshop on Role-Based Access Control,1999.33-42.
  • 2Bertino E,Bettini C,Ferrari E,Samarati P.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Trans.on Database Systems (TODS),1998,23(3):231,285.
  • 3王卓,冯珊.基于角色访问控制模型约束的OCL描述[J].计算机工程与应用,2003,39(21):100-102. 被引量:7

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部