The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi...The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald展开更多
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ...Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.展开更多
In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively re...In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements.展开更多
In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that secu...In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries.展开更多
The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in ...The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa.展开更多
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First...To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet.展开更多
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi...With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks.展开更多
Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countri...Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countries have close security interactions,high-level security consultations,numerous mechanisms on security cooperation,frequent defense cooperation and exchanges between forces,and cooperation geared at a response to the Korean nuclear issue.In particular,Japan and the UK regard Indo-Pacific security as the strategic focus of their cooperation,and this underscores the rules-based international order.There are multiple motivations for Japan and the UK to strengthen their security cooperation,and the deepening of their security cooperation in the Indo-Pacific region is to a great extent due to strategic factors,including responding to the US strategic adjustment,Japan and Britain’s respective proactive strategic demands,the improving strategic positions of the Indopacific region,their seeking to shape the regional order in the Indo-Pacific,and so on.Despite facing challenges,Japan-UK security cooperation is continuously strengthening against a background of deepening strategic convergence between the two countries and great power competition.展开更多
The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstu...The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability.展开更多
In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security se...In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large.展开更多
Climate change studies are diverse with no single study giving a comprehensive review of climate change impacts,adaptation strategies,and policy development in West Africa.The unavailability of an all-inclusive study ...Climate change studies are diverse with no single study giving a comprehensive review of climate change impacts,adaptation strategies,and policy development in West Africa.The unavailability of an all-inclusive study to serve as a guide for practitioners affects the effectiveness of climate change adaptation strategies proposed and adopted in the West African sub-region.The purpose of this study was to review the impacts of climate change risks on the crop,fishery,and livestock sectors,as well as the climate change adaptation strategies and climate-related policies aimed at helping to build resilient agricultural production systems in West Africa.The review process followed a series of rigorous stages until the final selection of 56 articles published from 2009 to 2023.Generally,the results highlighted the adverse effects of climate change risks on food security.We found a continuous decline in food crop production.Additionally,the livestock sector experienced morbidity and mortality,as well as reduction in meat and milk production.The fishery sector recorded loss of fingerlings,reduction in fish stocks,and destruction of mariculture and aquaculture.In West Africa,climate-smart agriculture technologies,physical protection of fishing,and inclusion of gender perspectives in programs appear to be the major adaptation strategies.The study therefore recommends the inclusion of ecosystem and biodiversity restoration,weather insurance,replacement of unsafe vessels,and strengthening gender equality in all climate change mitigation programs,as these will help to secure enough food for present and future generations.展开更多
Grain security is the foundation of national security,and guaranteeing the grain security by every possible means is a development priority for the whole country.Rapid development of the fruit industry satisfies incre...Grain security is the foundation of national security,and guaranteeing the grain security by every possible means is a development priority for the whole country.Rapid development of the fruit industry satisfies increasing demands of people for fruits,but also presents certain competition for grain production.From the perspective of limited resources and comparative income,this paper analyzed potential threats of fruit production distribution to grain production in farmland and labor resources,and came up with pertinent adjustment strategies.展开更多
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje...A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components.展开更多
With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur...With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy.展开更多
India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of ...India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy.展开更多
General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,whi...General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds.展开更多
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network...In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security.展开更多
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis...The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.展开更多
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ...Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year,展开更多
文摘The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald
文摘Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.
文摘In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements.
文摘In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries.
文摘The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa.
基金supported by the Provincial Universities Basic Business Expense Scientific Research Projects of Heilongjiang Province(No.2021-KYYWF-0179)the Science and Technology Project of Henan Province(No.212102310991)+2 种基金the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security(No.AGK2015003)the Key Scientific Research Project of Henan Province(No.21A413001)the Postgraduate Innovation Project of Harbin Normal University(No.HSDSSCX2021-121).
文摘To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet.
基金supported in part by the National Natural Science Foundation of China under grant No.62072412,No.61902359,No.61702148No.61672468 part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under grant AGK2018001.
文摘With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks.
基金This article is a phased outcome of the National Social Sciences Foundation project:“Japan’s Adjustment of China Strategy in the Context of Belt and Road Initiative and China’s Response”(Project Number:18BGJ056).
文摘Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countries have close security interactions,high-level security consultations,numerous mechanisms on security cooperation,frequent defense cooperation and exchanges between forces,and cooperation geared at a response to the Korean nuclear issue.In particular,Japan and the UK regard Indo-Pacific security as the strategic focus of their cooperation,and this underscores the rules-based international order.There are multiple motivations for Japan and the UK to strengthen their security cooperation,and the deepening of their security cooperation in the Indo-Pacific region is to a great extent due to strategic factors,including responding to the US strategic adjustment,Japan and Britain’s respective proactive strategic demands,the improving strategic positions of the Indopacific region,their seeking to shape the regional order in the Indo-Pacific,and so on.Despite facing challenges,Japan-UK security cooperation is continuously strengthening against a background of deepening strategic convergence between the two countries and great power competition.
文摘The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability.
基金The National Natural Science Foundation of China(No.71371050)
文摘In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large.
文摘Climate change studies are diverse with no single study giving a comprehensive review of climate change impacts,adaptation strategies,and policy development in West Africa.The unavailability of an all-inclusive study to serve as a guide for practitioners affects the effectiveness of climate change adaptation strategies proposed and adopted in the West African sub-region.The purpose of this study was to review the impacts of climate change risks on the crop,fishery,and livestock sectors,as well as the climate change adaptation strategies and climate-related policies aimed at helping to build resilient agricultural production systems in West Africa.The review process followed a series of rigorous stages until the final selection of 56 articles published from 2009 to 2023.Generally,the results highlighted the adverse effects of climate change risks on food security.We found a continuous decline in food crop production.Additionally,the livestock sector experienced morbidity and mortality,as well as reduction in meat and milk production.The fishery sector recorded loss of fingerlings,reduction in fish stocks,and destruction of mariculture and aquaculture.In West Africa,climate-smart agriculture technologies,physical protection of fishing,and inclusion of gender perspectives in programs appear to be the major adaptation strategies.The study therefore recommends the inclusion of ecosystem and biodiversity restoration,weather insurance,replacement of unsafe vessels,and strengthening gender equality in all climate change mitigation programs,as these will help to secure enough food for present and future generations.
文摘Grain security is the foundation of national security,and guaranteeing the grain security by every possible means is a development priority for the whole country.Rapid development of the fruit industry satisfies increasing demands of people for fruits,but also presents certain competition for grain production.From the perspective of limited resources and comparative income,this paper analyzed potential threats of fruit production distribution to grain production in farmland and labor resources,and came up with pertinent adjustment strategies.
基金Project(513150601)supported by the National Pre-Research Project Foundation of China
文摘A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components.
文摘With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy.
文摘India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy.
文摘General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds.
文摘In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security.
文摘The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.
文摘Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year,