Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely relate...Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely related to national security, and become the core resource arena that countries along the river basin compete for. This study argues that under the combined effect of the natural factors of water shortage, the geographical factors of uneven distribution of rivers across boundaries, and the subjective factors of water politics (the unfair setting of rules for water allocation), water disputes in the Middle East have become obstacles to regional peace, and the serious uneven distribution of water is the root cause of regional water disputes. Neither the historical water conflicts nor the existing water cooperation framework has solved the problem of balanced water distribution, which makes the people in basin countries directly face the crisis of survival rights and national security, and lays the fuse for the outbreak of regional water disputes and even future water wars. This study proposes the concept and analytical framework of “water securitization” based on securitization theory, and applies it to the Jordan River Basin, to analyze the reasons for the uneven distribution of water resources in the Middle East. The power-dominant state with asymmetric power in the river basin obtains the status of water hegemony by securitizing water, realizing the self-interested distribution of water resources, whichleads to the uneven distribution of water resources, and ultimately leads to the outbreak of conflicts and disputes. Specifically, it mainly adopts three mechanisms of discursive securitization, operational securitization, and institutional securitization. Looking to the future, it is difficult to successfully resolve water disputes in the Middle East in the short term, and a “de-securitization” approach is particularly important in resolving water disputes and easing regional security tension. Only by adopting a multi-field joint strategy can it provide the possibility to effectively resolve water disputes in the Jordan River Basin.展开更多
On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factor...On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factors with the aid of Logistic model and Multinomial Logit model.The study indicates that factors influencing willingness of rural land circulation and securitization mainly include land contract method,land circulation information and approaches,rights and interests of farmers infringed or not,policies of benefiting farmers,and non-agricultural skills. Finally,it came up with following pertinent policy recommendations:( 1) reforming and improving land contract methods;( 2)strengthening disclosure of land circulation information;( 3) reforming and improving land circulation approaches;( 4) strengthening protection of farmers' rights and interests in the process of land circulation;( 5) reinforcing and implementing policies benefiting farmers;( 6) cultivating and developing farmers' non-agricultural skills.展开更多
In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which can...In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.展开更多
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog...A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data.展开更多
Indonesian Chinese culture is a part of Indonesian multiculturalism.However,it is challenged by“securitization”.Taking two cases as examples to explain the“securitization”of Indonesian Chinese culture.Several secu...Indonesian Chinese culture is a part of Indonesian multiculturalism.However,it is challenged by“securitization”.Taking two cases as examples to explain the“securitization”of Indonesian Chinese culture.Several securitizing actors claimed that Guan Yu statue and lanterns are symbols of Chinese culture,and they claimed that they threaten the national security of Indonesia.The securitizing carriers attempt to influence the judgment of the audiences through agenda-setting and framing effects.Nevertheless,the audiences have not fully accepted the securitizing move because the Indonesians regarded the anti-Jokowi forces’tactics and“China Threat Theories”have not yet reached a consensus.The reason for the failure of this securitization process is about aspects,including the on-ground views on the cultural expressions and practices of Chineseness,the public identified the usual tricks of the anti-Jokowi forces,and there is no consensus on the so-called“China Threat Theories”in Indonesia.To preserve and promote Chineseness under the multicultural agenda,several measures have been implemented by the Indonesian government to promote the harmonious development of ethnic groups and multicultural integration in Indonesia to a certain extent.展开更多
This article investigates the dynamics of rivalry and state sponsorship of non-state actors by explaining the Saudi-Iranian rivalry through the lens of securitization theory.The study elucidates that despite the endur...This article investigates the dynamics of rivalry and state sponsorship of non-state actors by explaining the Saudi-Iranian rivalry through the lens of securitization theory.The study elucidates that despite the enduring nature of their rivalry,both Iran and Saudi Arabia have exhibited a degree of restraint in escalating their conflicting dyadic relationship.It further notes that this behavior has forced them to securitize various issues in the region,framing them as potential threats to national and regime security,that has allowed them to build alliance and provide critical support to nonstate actors across the region.By so doing,Tehran and Riyadh seek to expand their influence and hunt their strategic and tactical objectives within the Middle East.This policy is primarily driven by geopolitical concerns rather than ideological or ethnic entitlements.展开更多
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s...Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.展开更多
Telecom enterprises are in urgent need of a large amount of funds forupdating networks and expanding market shares, while asset-backed Securitization is the most rapidlyand vigorously growing product of financial inno...Telecom enterprises are in urgent need of a large amount of funds forupdating networks and expanding market shares, while asset-backed Securitization is the most rapidlyand vigorously growing product of financial innovation in the international capital market. Sincetelecom asset is characterized by long recovery period, poor liquidity, high quality and stable cashflow, which are the basic conditions for using asset-backed Securitization to finance, asset-backedSecuritization can be a new financing way for telecom enterprises.展开更多
The article focuses on the nature of the relations between Turkey and Syria during the Syrian crisis.Although the relationship between Turkey and Syria had undergone some ups and downs in the last several years,both c...The article focuses on the nature of the relations between Turkey and Syria during the Syrian crisis.Although the relationship between Turkey and Syria had undergone some ups and downs in the last several years,both countries tried their best to improve their economic,political,cultural,and diplomatic relations.Indeed,Turkey introduced its model,“Moderate Islamic ideologies”,through Syria in the Middle East and North Africa(MENA).The“Arab Spring”of 2011 was a very good opportunity for Turkey to introduce its democratic Islamic dogmas which were welcomed by the Muslim Brotherhood leaders in some Arab Countries.But,the President of Syria,Bashar Al Assad,and his allies were very critical of Turkey’s policy.Thus,the article mainly explores the role of Turkey in Syria’s internal affairs,in particular,Erdogan’s policy towards Syrian crises.Besides,it examines Turkey’s domestic challenges and how Turkey has presented itself as a big supporter of the Arab Spring in the MENA.However,the article has found out that the current policies of Turkey towards the Syrian crisis are critical within the Middle East region.In other words,the conflicts and the wars against the Islamic State(ISIS)and the Kurdistan Workers’Party(PKK)weakened the bilateral relations.The Syrian refugees and the PKK are posing overwhelming challenges to Turkey’s economy and internal security.展开更多
Intellectual property rights securitization(IPRS) is a fundamental approach to monetizing intellectual property rights to resolve financing difficulties for scientific and technological enterprises. It is also a neces...Intellectual property rights securitization(IPRS) is a fundamental approach to monetizing intellectual property rights to resolve financing difficulties for scientific and technological enterprises. It is also a necessary way to realize the value of intellectual property rights. Existing researches in China only introduce foreign IPRS models but rarely discusses reasons behind the IPRS successes and lessons drawn from its failures. There are also rare IPRS policy researches and recommendations for IPRS development in China. This article cards the IPRS policies in China first, and then conducts a comparison research of intellectual property rights owners, obligees, originators, credit rating agencies, issuing scale, and so on as main information and data from the IPRS cases at home and abroad. Furthermore, this article constructs a three-dimensional policy model of “subject-element-process” and identifies the main problems from the laws and policies, operational models, valuation methods, investment objectives, tax and service rates,etc. of the IPRS. The results indicate that the model we construct is suitable for the Chinese market in that it describes the objectives and processes of IPRS as well as specific activities and capital flows. In the end, this article puts forward five policy recommendations for China’s IPRS development. The first is to add the intellectual property rights future implementation cash flow as the IPRS object. The second is to improve the existing evaluation methods. The third is to combine SPT and SPE models, establish in-house intellectual property rights service teams of security companies, set up government risk fund pools to lead IPRS, and reduce the investment threshold. The fourth is to explore the equity-debt convertible IPRS products and the intellectual property rights auction mechanism to make up for the losses of IPRS failure.The fifth is to formulate IPRS tax preferential policies, and lower the local government subsidy proportion for loan interests, service fee and loss compensation for IPRS.展开更多
New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and ...New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats.展开更多
Financial reform has been a core dimension of the initial global policy response to the financial turmoil of 2007-08. At the first G-20 summit of heads of state and government in November
As emerging non-traditional security issues in global politics such as environmental crises offer new avenues of research on the state-society behaviour in non-western political orders,this study applies an integrated...As emerging non-traditional security issues in global politics such as environmental crises offer new avenues of research on the state-society behaviour in non-western political orders,this study applies an integrated conceptual framework of Copenhagen School’s securitization,constructivism and green theory in international relations theory(IRT).One of the key objectives of the study includes to provide a theoretical explanation on the role of non-state agencies in ameliorating the environmental condition.With the support of an illustrative case study,the researcher argues in line with the finding of Acharya and Buzan(2007)that there is no need to replace Western IRTs,but they should be enriched with more voices from non-western political orders.In other words,the emerging non-traditional issues in global politics are not“noises”to weaken existing IRTs but“voices”to strengthen their theoretical foundation.展开更多
This study proposes climate security:a research agenda proposal with certain research significance.It acknowledges the United Nations Framework Convention on Climate Change(UNFCCC),the European Union(EU)and the United...This study proposes climate security:a research agenda proposal with certain research significance.It acknowledges the United Nations Framework Convention on Climate Change(UNFCCC),the European Union(EU)and the United Nations Security Council(UNSC)as current institutional case studies(and key actors)for international climate politics.It answers the question of the extent to which climate security scholars have mapped the field with respect to these three institutions.To do this,it reviews relevant literature of climate security and concisely summarizes the literature views.Although climate security scholars have studied how these specialist institutions have understood global climate governance,a comparative coverage of how the institutions have conceptualized climate security is missing in existing literature.The key finding shows the concepts of epistemic communities,climate securitization and climate-riskifications as appropriate analytical themes for interpreting the emerging norm of climate security.Arguing that conceptual development persists even though the institutions original mandates did not require such conceptualization,the study uses discourse analysis of relevant literature on climate security to orient future research on climate change and climate security given the knowledge that speech-acts on climate security(henceforth speech-acts)now seem like potential policy consideration in the foreseeable future.展开更多
Since the 1970s,the global resurgence of religion,the politicization and internationalization of religion,as well as the raging violent religious extremism,have posed a severe challenge to national sovereignty and int...Since the 1970s,the global resurgence of religion,the politicization and internationalization of religion,as well as the raging violent religious extremism,have posed a severe challenge to national sovereignty and international order.The impact of religion on national security has become an inevitable problem facing the world.For more than 60 years since the founding of the PRC,religion has always been an important issue in its national security considerations,while“anti-foreign religious infiltration”and“combating the three forces of terrorism,national separatism and religious extremism”have become the official guidelines of discussions concerning religion and national security.In the context of the global resurgence of religion,changes in China’s religious security situation and the development of non-traditional security studies,research on religion and China’s national security has begun to break through the conventional pattern of“anti-filtration study”and started to become more academic and empirical.This paper has outlined the history and current situation of studies about religion and China’s national security and discussed some basic issues of this research area.展开更多
This paper presents a study on how to accommodate wind power into multiple regions,while simultaneously implementing economic and reliable dispatch for multi-area power system operation.The focus is on quantifying the...This paper presents a study on how to accommodate wind power into multiple regions,while simultaneously implementing economic and reliable dispatch for multi-area power system operation.The focus is on quantifying the operational risk brought by wind power uncertainty and at the same time accommodating wind power by coordinating multi-area generation and reserve resources.The reserve requirement of each area is calculated based on two indexes,namely,loss of load probability and wind spillage probability.Then,a generation-reserve cooptimization dispatch model that factors cross-regional wind power accommodation is proposed.The transmission margin and network security constraints of tie-lines are considered to systematically allocate reserve resources for all areas.Finally,optimality condition decomposition is used to decompose the dispatching model to achieve relatively independent regional scheduling,and to get the global optimization result.The reasonableness and effectiveness of the proposed approach is validated by a 6-bus 2-area test system and a 236-bus interconnected system.展开更多
This paper examines the level of cooperation which China and the EU undertake on global issues,especially with regard to the future roles of international organizations such as the UN,the IMF,the World Bank,the G20,th...This paper examines the level of cooperation which China and the EU undertake on global issues,especially with regard to the future roles of international organizations such as the UN,the IMF,the World Bank,the G20,the form and practice of multilateralism,the prospects and direction of a multipolar/core world,and whether the two tend to be partners rather than competitors on issues of climate change and energy policy.It applies the approach of international security cooperation and relies primarily on documentary evidence(e.g.,communiqués on global or regional governance aspects,issued at EU-China summits or separately by each).This paper argues that the"misunderstanding"on principles between the EU and China is at odds with the growing economic interdependencies between the two sides.The EU and China,two of the pillars in the emerging multipolar order,have fundamentally opposed attitudes to key aspects of global politics,such as sovereignty and multilateralism,and these differences are bound to create further tensions in the development of global governance regimes in the future.The originality of this paper lies in that it moves beyond the traditional form of investigating on how each China and the EU perceive each other in cooperation terms by focusing instead on the level of cooperation both partners pursue with regard to multilateralism and within the activities of international organizations.展开更多
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti...This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.展开更多
文摘Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely related to national security, and become the core resource arena that countries along the river basin compete for. This study argues that under the combined effect of the natural factors of water shortage, the geographical factors of uneven distribution of rivers across boundaries, and the subjective factors of water politics (the unfair setting of rules for water allocation), water disputes in the Middle East have become obstacles to regional peace, and the serious uneven distribution of water is the root cause of regional water disputes. Neither the historical water conflicts nor the existing water cooperation framework has solved the problem of balanced water distribution, which makes the people in basin countries directly face the crisis of survival rights and national security, and lays the fuse for the outbreak of regional water disputes and even future water wars. This study proposes the concept and analytical framework of “water securitization” based on securitization theory, and applies it to the Jordan River Basin, to analyze the reasons for the uneven distribution of water resources in the Middle East. The power-dominant state with asymmetric power in the river basin obtains the status of water hegemony by securitizing water, realizing the self-interested distribution of water resources, whichleads to the uneven distribution of water resources, and ultimately leads to the outbreak of conflicts and disputes. Specifically, it mainly adopts three mechanisms of discursive securitization, operational securitization, and institutional securitization. Looking to the future, it is difficult to successfully resolve water disputes in the Middle East in the short term, and a “de-securitization” approach is particularly important in resolving water disputes and easing regional security tension. Only by adopting a multi-field joint strategy can it provide the possibility to effectively resolve water disputes in the Jordan River Basin.
基金Supported by Development Report Project for Philosophy and Social Science of the Ministry of Education(11JBG006)Project of National Social Science Foundation(11CJY034)+1 种基金Project of Hubei Financial Research Center of Key Research Base of Humanities and Social Science of Colleges and Universities of Hubei Province(2011B003)Fundamental Research Funds for the Central Universities in 2013(20132013)
文摘On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factors with the aid of Logistic model and Multinomial Logit model.The study indicates that factors influencing willingness of rural land circulation and securitization mainly include land contract method,land circulation information and approaches,rights and interests of farmers infringed or not,policies of benefiting farmers,and non-agricultural skills. Finally,it came up with following pertinent policy recommendations:( 1) reforming and improving land contract methods;( 2)strengthening disclosure of land circulation information;( 3) reforming and improving land circulation approaches;( 4) strengthening protection of farmers' rights and interests in the process of land circulation;( 5) reinforcing and implementing policies benefiting farmers;( 6) cultivating and developing farmers' non-agricultural skills.
文摘In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.
基金We received funding solely from our institution to perform this research.
文摘A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data.
文摘Indonesian Chinese culture is a part of Indonesian multiculturalism.However,it is challenged by“securitization”.Taking two cases as examples to explain the“securitization”of Indonesian Chinese culture.Several securitizing actors claimed that Guan Yu statue and lanterns are symbols of Chinese culture,and they claimed that they threaten the national security of Indonesia.The securitizing carriers attempt to influence the judgment of the audiences through agenda-setting and framing effects.Nevertheless,the audiences have not fully accepted the securitizing move because the Indonesians regarded the anti-Jokowi forces’tactics and“China Threat Theories”have not yet reached a consensus.The reason for the failure of this securitization process is about aspects,including the on-ground views on the cultural expressions and practices of Chineseness,the public identified the usual tricks of the anti-Jokowi forces,and there is no consensus on the so-called“China Threat Theories”in Indonesia.To preserve and promote Chineseness under the multicultural agenda,several measures have been implemented by the Indonesian government to promote the harmonious development of ethnic groups and multicultural integration in Indonesia to a certain extent.
文摘This article investigates the dynamics of rivalry and state sponsorship of non-state actors by explaining the Saudi-Iranian rivalry through the lens of securitization theory.The study elucidates that despite the enduring nature of their rivalry,both Iran and Saudi Arabia have exhibited a degree of restraint in escalating their conflicting dyadic relationship.It further notes that this behavior has forced them to securitize various issues in the region,framing them as potential threats to national and regime security,that has allowed them to build alliance and provide critical support to nonstate actors across the region.By so doing,Tehran and Riyadh seek to expand their influence and hunt their strategic and tactical objectives within the Middle East.This policy is primarily driven by geopolitical concerns rather than ideological or ethnic entitlements.
文摘Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.
文摘Telecom enterprises are in urgent need of a large amount of funds forupdating networks and expanding market shares, while asset-backed Securitization is the most rapidlyand vigorously growing product of financial innovation in the international capital market. Sincetelecom asset is characterized by long recovery period, poor liquidity, high quality and stable cashflow, which are the basic conditions for using asset-backed Securitization to finance, asset-backedSecuritization can be a new financing way for telecom enterprises.
文摘The article focuses on the nature of the relations between Turkey and Syria during the Syrian crisis.Although the relationship between Turkey and Syria had undergone some ups and downs in the last several years,both countries tried their best to improve their economic,political,cultural,and diplomatic relations.Indeed,Turkey introduced its model,“Moderate Islamic ideologies”,through Syria in the Middle East and North Africa(MENA).The“Arab Spring”of 2011 was a very good opportunity for Turkey to introduce its democratic Islamic dogmas which were welcomed by the Muslim Brotherhood leaders in some Arab Countries.But,the President of Syria,Bashar Al Assad,and his allies were very critical of Turkey’s policy.Thus,the article mainly explores the role of Turkey in Syria’s internal affairs,in particular,Erdogan’s policy towards Syrian crises.Besides,it examines Turkey’s domestic challenges and how Turkey has presented itself as a big supporter of the Arab Spring in the MENA.However,the article has found out that the current policies of Turkey towards the Syrian crisis are critical within the Middle East region.In other words,the conflicts and the wars against the Islamic State(ISIS)and the Kurdistan Workers’Party(PKK)weakened the bilateral relations.The Syrian refugees and the PKK are posing overwhelming challenges to Turkey’s economy and internal security.
基金supported by the STS Project of“Chinese Academy of Sciences Intellectual Property Research and Training”
文摘Intellectual property rights securitization(IPRS) is a fundamental approach to monetizing intellectual property rights to resolve financing difficulties for scientific and technological enterprises. It is also a necessary way to realize the value of intellectual property rights. Existing researches in China only introduce foreign IPRS models but rarely discusses reasons behind the IPRS successes and lessons drawn from its failures. There are also rare IPRS policy researches and recommendations for IPRS development in China. This article cards the IPRS policies in China first, and then conducts a comparison research of intellectual property rights owners, obligees, originators, credit rating agencies, issuing scale, and so on as main information and data from the IPRS cases at home and abroad. Furthermore, this article constructs a three-dimensional policy model of “subject-element-process” and identifies the main problems from the laws and policies, operational models, valuation methods, investment objectives, tax and service rates,etc. of the IPRS. The results indicate that the model we construct is suitable for the Chinese market in that it describes the objectives and processes of IPRS as well as specific activities and capital flows. In the end, this article puts forward five policy recommendations for China’s IPRS development. The first is to add the intellectual property rights future implementation cash flow as the IPRS object. The second is to improve the existing evaluation methods. The third is to combine SPT and SPE models, establish in-house intellectual property rights service teams of security companies, set up government risk fund pools to lead IPRS, and reduce the investment threshold. The fourth is to explore the equity-debt convertible IPRS products and the intellectual property rights auction mechanism to make up for the losses of IPRS failure.The fifth is to formulate IPRS tax preferential policies, and lower the local government subsidy proportion for loan interests, service fee and loss compensation for IPRS.
文摘New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats.
文摘Financial reform has been a core dimension of the initial global policy response to the financial turmoil of 2007-08. At the first G-20 summit of heads of state and government in November
基金The fieldwork was carried out during the exchange scholarship(September 2016–December 2016)and during the‘general scholar visiting programme’awarded by the ministry of human resources govt.of India and the Ministry of Education,PRC from September 2017 to July 2018.
文摘As emerging non-traditional security issues in global politics such as environmental crises offer new avenues of research on the state-society behaviour in non-western political orders,this study applies an integrated conceptual framework of Copenhagen School’s securitization,constructivism and green theory in international relations theory(IRT).One of the key objectives of the study includes to provide a theoretical explanation on the role of non-state agencies in ameliorating the environmental condition.With the support of an illustrative case study,the researcher argues in line with the finding of Acharya and Buzan(2007)that there is no need to replace Western IRTs,but they should be enriched with more voices from non-western political orders.In other words,the emerging non-traditional issues in global politics are not“noises”to weaken existing IRTs but“voices”to strengthen their theoretical foundation.
基金supported by the Australian Government Research Training Program Scholarship.
文摘This study proposes climate security:a research agenda proposal with certain research significance.It acknowledges the United Nations Framework Convention on Climate Change(UNFCCC),the European Union(EU)and the United Nations Security Council(UNSC)as current institutional case studies(and key actors)for international climate politics.It answers the question of the extent to which climate security scholars have mapped the field with respect to these three institutions.To do this,it reviews relevant literature of climate security and concisely summarizes the literature views.Although climate security scholars have studied how these specialist institutions have understood global climate governance,a comparative coverage of how the institutions have conceptualized climate security is missing in existing literature.The key finding shows the concepts of epistemic communities,climate securitization and climate-riskifications as appropriate analytical themes for interpreting the emerging norm of climate security.Arguing that conceptual development persists even though the institutions original mandates did not require such conceptualization,the study uses discourse analysis of relevant literature on climate security to orient future research on climate change and climate security given the knowledge that speech-acts on climate security(henceforth speech-acts)now seem like potential policy consideration in the foreseeable future.
基金This research is supported by Fudan University’s Center for the Study of Religion and China’s National Security,and“Religion&China’s National Construction in the Globalization Era Research Program”of Fudan University’s Phase III of 985 Project on Social Sciences Studies.
文摘Since the 1970s,the global resurgence of religion,the politicization and internationalization of religion,as well as the raging violent religious extremism,have posed a severe challenge to national sovereignty and international order.The impact of religion on national security has become an inevitable problem facing the world.For more than 60 years since the founding of the PRC,religion has always been an important issue in its national security considerations,while“anti-foreign religious infiltration”and“combating the three forces of terrorism,national separatism and religious extremism”have become the official guidelines of discussions concerning religion and national security.In the context of the global resurgence of religion,changes in China’s religious security situation and the development of non-traditional security studies,research on religion and China’s national security has begun to break through the conventional pattern of“anti-filtration study”and started to become more academic and empirical.This paper has outlined the history and current situation of studies about religion and China’s national security and discussed some basic issues of this research area.
基金supported in part by the National Key Research and Development Program(2016YFB0900105)the National Natural Science Foundation of China(51577061)the Management&Consultation Project of SGCC.
文摘This paper presents a study on how to accommodate wind power into multiple regions,while simultaneously implementing economic and reliable dispatch for multi-area power system operation.The focus is on quantifying the operational risk brought by wind power uncertainty and at the same time accommodating wind power by coordinating multi-area generation and reserve resources.The reserve requirement of each area is calculated based on two indexes,namely,loss of load probability and wind spillage probability.Then,a generation-reserve cooptimization dispatch model that factors cross-regional wind power accommodation is proposed.The transmission margin and network security constraints of tie-lines are considered to systematically allocate reserve resources for all areas.Finally,optimality condition decomposition is used to decompose the dispatching model to achieve relatively independent regional scheduling,and to get the global optimization result.The reasonableness and effectiveness of the proposed approach is validated by a 6-bus 2-area test system and a 236-bus interconnected system.
文摘This paper examines the level of cooperation which China and the EU undertake on global issues,especially with regard to the future roles of international organizations such as the UN,the IMF,the World Bank,the G20,the form and practice of multilateralism,the prospects and direction of a multipolar/core world,and whether the two tend to be partners rather than competitors on issues of climate change and energy policy.It applies the approach of international security cooperation and relies primarily on documentary evidence(e.g.,communiqués on global or regional governance aspects,issued at EU-China summits or separately by each).This paper argues that the"misunderstanding"on principles between the EU and China is at odds with the growing economic interdependencies between the two sides.The EU and China,two of the pillars in the emerging multipolar order,have fundamentally opposed attitudes to key aspects of global politics,such as sovereignty and multilateralism,and these differences are bound to create further tensions in the development of global governance regimes in the future.The originality of this paper lies in that it moves beyond the traditional form of investigating on how each China and the EU perceive each other in cooperation terms by focusing instead on the level of cooperation both partners pursue with regard to multilateralism and within the activities of international organizations.
基金Supported by the National Basic Research Program of China (973 Program) (2007CB311201)the National High-Technology Research and Development Program of China (863 Program) (2006AA01Z427)the National Natural Science Foundation of China (60673073)
文摘This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.