期刊文献+
共找到3,758篇文章
< 1 2 188 >
每页显示 20 50 100
GDI and GSI: China’s New Propositions for Global Governance
1
作者 Ouyang Xiangying 《China Economist》 2024年第5期107-116,共10页
In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to sub... In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance. 展开更多
关键词 Global Development Initiative(GDI) Global security Initiative(GSI) China’s approach to global governance Ukraine crisis China-Russia relationship
下载PDF
Open Source Initiatives for Big Data Governance and Security:A Survey
2
作者 hu baiqing wang wenjie chi harold liu 《ZTE Communications》 2018年第2期55-66,共12页
With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy... With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security, In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications. 展开更多
关键词 big data security governance open source initiatives
下载PDF
The Governance of the Chaotic International Security
3
作者 Lin Limin Yuan Kao 《Contemporary International Relations》 2017年第3期60-74,共15页
After the Cold War ended, former traditional security threats withered while non-traditional ones sprouted. More recently as both traditional and non-traditional security threats bloom, concern spreads over whether in... After the Cold War ended, former traditional security threats withered while non-traditional ones sprouted. More recently as both traditional and non-traditional security threats bloom, concern spreads over whether international security governance can be effective. Worse still, major Western countries' zeal for global governance has cooled,while they turn from being advocates of global governance to obstacles,making the future dimmer. 展开更多
关键词 global security governance global governance global security threats
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
4
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 US in IS on WILL that RECENT DEVELOPMENTS OF US asia-pacific security STRATEGY AND CHINA’S COUNTERMEASURES ROK of
下载PDF
The COVID-19 and the“European Solution”of Data-based Approach to Governance:Public Security or Data Protection?
5
作者 刘洋 李益斌 NIU Huizi(Translated) 《The Journal of Human Rights》 2022年第3期483-503,共21页
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio... To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection. 展开更多
关键词 European solution data-based approach to governance data protection public security
下载PDF
A Role-Based PMI Security Model for E-Government 被引量:2
6
作者 WULi-jun SUKai-le YANGZhi-hua 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期329-332,共4页
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In... We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system. 展开更多
关键词 E-govemment public key certificate role-specification AC role-assignmentAC ihe security model for E- government
下载PDF
A review of science–policy interface for water governance in the Caspian Sea
7
作者 Apoorva BAMAL Sogol MORADIAN +1 位作者 Ali TORABI-HAGHIGHI Agnieszka INDIANA-OLBERT 《Journal of Arid Land》 SCIE CSCD 2023年第10期1143-1159,共17页
Science and policy have been interlinked for decades and perform essential nexus conditions in the governing aspects of environmental scenarios.This review paper examines the present challenges in the science–policy ... Science and policy have been interlinked for decades and perform essential nexus conditions in the governing aspects of environmental scenarios.This review paper examines the present challenges in the science–policy interface in terms of water governance in the Caspian Sea and identifies effective conditions that may be used in the current context to enhance the mechanism.The evaluation of the science–policy link in the water policy of the Caspian Sea reveals a gap between knowledge producer and governance system,impeding the translation of scientific information into action.Complicated and context-dependent solutions make it challenging to establish effective science–policy processes in the Caspian Sea water governance settings.Establishing a common governing authority,implementing water and resource management regulations,and protecting the natural environment through legal frameworks are crucial steps to address these concerns and ensure sustainable development.Collaboration among coastal states is essential in environmental,economic,and social aspects of regional development.However,the lack of a comprehensive approach,coherent activities,and effective utilization of national and regional power has hindered efforts to halt the environmental degradation of the Caspian Sea.Local governments need to recognize their responsibility to protect and utilize the Caspian Sea for present and future generations,considering both environmental and human security.The interlinkage of the Caspian Sea water governance with the Organization for Economic Co-operation and Development(OECD)water governance principles offers a framework for policymakers to assess gaps and make necessary amendments to existing mechanisms.Effective science–policy interaction,engagement of diverse stakeholders,institutionalizing agreements,and addressing collective action issues are critical for successful water governance. 展开更多
关键词 resource management Organization for Economic Co-operation and Development water security water governance principle Caspian Sea
下载PDF
Research on Real Estate Economic Security and Government Control
8
作者 Yi Xiong 《Proceedings of Business and Economic Studies》 2020年第5期28-31,共4页
With the development of economy and the progress of society,people’s living standards are gradually improving,and the requirements for housing are also gradually improving.The development of the real estate industry ... With the development of economy and the progress of society,people’s living standards are gradually improving,and the requirements for housing are also gradually improving.The development of the real estate industry provides conditions for people’s modern life,and its development meets the needs of China’s socialist development.In such a social background,the future planning of the real estate industry is gradually clear,promoting the steady rise of the real estate economy,which is an important development prospect of the current real estate industry.In this paper,through the analysis of real estate economic security and government control,aiming at the existing problems,put forward some effective measures to promote the advantages of real estate development and the combination of government macro-control to stabilize the healthy development of the real estate industry. 展开更多
关键词 Real estate Economic security government control
下载PDF
Land tenure security,place satisfaction and loyalty in the peri-urban area of Ibadan City,Nigeria
9
作者 Taiwo Oladapo BABALOLA 《Regional Sustainability》 2022年第4期346-355,共10页
Land tenure security is pertinent to achieving the sustainable development agenda in cities where land is needed and useful for development purposes.Sufficient empirical research has been done to prove the importance ... Land tenure security is pertinent to achieving the sustainable development agenda in cities where land is needed and useful for development purposes.Sufficient empirical research has been done to prove the importance of tenure security for investment,resilience,conservation,food security,as well as health and well-being,but it has not been clarified if and how land tenure security could adequately influence place loyalty and satisfaction with the residential environment,as it is clear that place loyalty and satisfaction are pertinent to inclusive development.Using the case of Ibadan City,the study examined how different dimensions of tenure security could determine residents’place loyalty and satisfaction.The study employed a survey cross-sectional research design to distribute 514 structured questionnaires to household heads across 4 sampled peri-urban local government areas while 452 were retrieved for analysis.Hierarchical regression analysis model was employed to understand the association between tenure security dimensions and satisfaction(as model I)and loyalty(as model II).For model I,F=8.640,P=0.000,R=0.555,and R^(2)=0.308 were obtained;while for model II,F=9.157,P=0.001,R=0.415,and R^(2)=0.173 were acquired.This thus means that residents’place loyalty and satisfaction can partly be explained by tenure security.In particular,respondents with no eviction experience,recognized property rights,and invulnerable to eviction have higher odds of being satisfied and loyal.Therefore,we recommend protection,improvement,and upgrading of land tenure security as one of the means to promote place loyalty and satisfaction,which is essential to achieving inclusive and sustainable development. 展开更多
关键词 Land tenure security Place satisfaction Place loyalty Urban governance Peri-urban area Sustainability African city
下载PDF
New Trend of Japan's Economic Security Strategy
10
作者 Yan Zeyang 《Contemporary International Relations》 2022年第4期81-99,共19页
Japan's economic security strategy has a long history.However,Japan has significantly accelerated its economic security strategy in recent years,especially since the Kishida government came into power.At present,J... Japan's economic security strategy has a long history.However,Japan has significantly accelerated its economic security strategy in recent years,especially since the Kishida government came into power.At present,Japan is gradually forming a comprehensive economic security strategy that has clear strategic objectives,sound institutional settings,enhanced economic control,and closer external cooperation.The Japanese government is accelerating its economic and security strategy because of the changing international environment and Japan's own strategic considerations.Japan hopes to achievemany strategic goals such as improved economy and security through its economic and security strategy,but its strategic effect needs to be verified due to the constraints of many factors. 展开更多
关键词 JAPAN economic security Kishida government
下载PDF
Corporate Governance Intelligence: Minority Shareholder's Aspects (Evidence From Ukraine)
11
作者 Tetiana Momot Oleksandr Vashchenko Nina Avanesova Anna Chudopal 《Chinese Business Review》 2015年第4期210-218,共9页
The paper is devoted to the corporate governance intelligence system investigation as the part of the complex stakeholder-related approach to the corporate strategic intelligence system (CSIS). The special attention... The paper is devoted to the corporate governance intelligence system investigation as the part of the complex stakeholder-related approach to the corporate strategic intelligence system (CSIS). The special attention is given to the minority shareholders activism in the system of corporate governance. Some existing methods of abusing minority shareholders rights, made by joint-stock companies executives, are generalized. The recommendations for minority shareholder's rights protection are given. The necessity for the implementation of the stakeholders-oriented approach for the CSIS creation on the base of companies' security principles is substantiated. 展开更多
关键词 corporate governance intelligence minority shareholders rights corporate governance financial and economic security system corporate strategic intelligence
下载PDF
Impact of the Russia–Ukraine Crisis on Global Food Security
12
作者 Si Wen Zheng Yi Liang Jianwu 《Contemporary International Relations》 2022年第5期54-77,共24页
The Russia–Ukraine crisis has hit hard the grain production and exports of both countries,weakening their positions on global food markets.Moreover,the crisis has resulted in a shortage of fertilizer supply and a sha... The Russia–Ukraine crisis has hit hard the grain production and exports of both countries,weakening their positions on global food markets.Moreover,the crisis has resulted in a shortage of fertilizer supply and a sharp increase in fertilizer prices.Consequently,global food production is declining,prices are hitting record highs,and market structures are shifting.Overall,global food insecurity is worsening,which,on top of several other factors,could become permanent as an aftermath of the Russia–Ukraine crisis.Therefore,food insecurity has become a topical issue in global governance.Spiking food prices and the ensuing political turbulence in vulnerable countries have altered the balance of strength between developed and developing countries,aggravating the existing imbalance between them.Furthermore,major food-producing countries are using food as a weapon to increase their influence in a fresh round of strategic competition,adding more uncertainties to the once-in-a-century changes shaping the world today. 展开更多
关键词 Russia–Ukraine crisis food security global governance
下载PDF
Optimum Spending on Cybersecurity Measures: Part II
13
作者 Sherita Tara Kissoon 《Journal of Information Security》 2021年第1期137-161,共25页
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i... The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures. 展开更多
关键词 Information security Risk Management Strategy governance Organizational Decision Making
下载PDF
Diversification of Security and Possibilities for“Cultural Security”:Focusing on the Cases of the EU and France
14
作者 Kazunari Sakai Olivier Chopin 《International Relations and Diplomacy》 2021年第8期321-334,共14页
Security in international relations has been at a crossroads,especially after the end of the Cold War.National security has not been the only framework of security;human security has also occupied an important positio... Security in international relations has been at a crossroads,especially after the end of the Cold War.National security has not been the only framework of security;human security has also occupied an important position.This“paradigm shift”of security occurred due to changes in the global security environment,such as the emergence of insecurity caused by poverty and ethnic conflict.It is obvious that national security based on a sovereign state and military forces are not enough to prevent war-fighting or to resolve its basic causes,so human security has attracted considerable attention,which complements national security.Human security needs the protection of communities in which people can find their identities and lead a peaceful life.For example,in Europe,a French riot by immigrant young people in 2005 indicated a lack of human security,where the shortage of protection of communities of immigrants under politics by the French government made the situation very serious.We present a new framework,“cultural security”,which complements human security in that the former protects communities based on each culture.It is ideal that all three dimensions of security work well as,if national security lacks,it may cause civil war or a failed state;if human security(in the narrow sense,focused on only individuals)lacks,it may lead to reinforced authoritarianism or a despotic regime;and if cultural security lacks,a civic nation would be developed but social life may be instable. 展开更多
关键词 security community governance culture MIGRATION
下载PDF
生物安全情报治理碎片化困境及破解路径:整体性治理理论视角 被引量:3
15
作者 汤辉 马海群 《情报理论与实践》 CSSCI 北大核心 2024年第2期77-83,共7页
[目的/意义]生物安全为国家安全治理带来新挑战。情报作为维护国家安全的耳目、尖兵,发挥着战略性作用。全面贯彻落实总体国家安全观,维护国家生物安全,需要发挥情报的支撑作用,必须尽快完善生物安全情报治理体系。生物安全情报治理作... [目的/意义]生物安全为国家安全治理带来新挑战。情报作为维护国家安全的耳目、尖兵,发挥着战略性作用。全面贯彻落实总体国家安全观,维护国家生物安全,需要发挥情报的支撑作用,必须尽快完善生物安全情报治理体系。生物安全情报治理作为国家治理的一部分,同样面临碎片化困境。整体性治理理论是有效应对国家治理碎片化的利器,也有助于解决生物安全情报治理中存在的碎片化问题,从而在实践层面上有效提升生物安全情报治理效能。[方法/过程]通过剖析生物安全情报治理在治理主体碎片化、治理价值碎片化、治理信息碎片化上的困境,文章构建了整体性治理视角下生物安全情报治理的理论模型,探索破解生物安全情报治理碎片化困境的路径。[结果/结论]在生物安全情报治理中运用整体性治理理论,不仅有助于推进生物安全情报治理功能整合与治理效能提升,也有助于提高国家生物安全防御能力。 展开更多
关键词 国家安全 生物安全 情报治理 情报体系 碎片化 整体性治理
下载PDF
数字时代的认知域安全:理论解构、风险生成及治理路径 被引量:5
16
作者 韩娜 董小宇 《国际安全研究》 CSSCI 北大核心 2024年第3期55-75,158,159,共23页
“认知域”是大国博弈的关键领域,在数字时代认知域安全已成为影响全球安全的重要议题。认知域安全研究经历了科学化、军事化、战略化再到国家安全化的四重演进,其理念被逐渐重塑。国家安全视角下的认知域安全,是指国家内部和外部的意... “认知域”是大国博弈的关键领域,在数字时代认知域安全已成为影响全球安全的重要议题。认知域安全研究经历了科学化、军事化、战略化再到国家安全化的四重演进,其理念被逐渐重塑。国家安全视角下的认知域安全,是指国家内部和外部的意识形态、思想文化、战略决策、价值观念、思维方式等不被内外势力操纵和改造,从而使认知的过程及其结果保持稳定有序的状态,并持续保障这种安全状态的能力。在要素特征方面,数字时代认知域安全呈现出主体多元、对象精准、智能驱动、战略隐蔽和全局领域的特点;在风险生成方面,内外势力往往通过观察-导向-决策-行动(OODA)循环模型进行精准操控,涵盖观察阶段的精准识别、导向阶段的信息加工、决策阶段的信息集成、行动阶段的主体协同以及评估阶段的信息反馈,形成了一个完整的操控链条,对认知域安全构成了严重威胁。中国必须双管齐下,积极有效应对认知域的安全风险。在顶层战略层面,国家需要制定全面而前瞻的战略政策框架;在务实策略层面,需在风险识别、风险评估、风险防控、风险应对等方面开展协同创新治理,进一步有效降低认知域操纵带来的安全风险。 展开更多
关键词 国家安全 认知域安全 认知域操纵 国家安全治理
下载PDF
数据交易安全刑事合规的“软法”治理及清单模式 被引量:3
17
作者 张勇 王杰 《河南社会科学》 CSSCI 北大核心 2024年第3期10-19,共10页
数据交易安全合规指参与数据交易活动的企业内外部各方主体进行的维护数据安全合规的治理活动。刑事治理是由各方主体参与的惩治和预防犯罪的过程,具有过程性。数据交易安全刑事合规是刑事治理的重要方面,可分为事前合规和事后合规两个... 数据交易安全合规指参与数据交易活动的企业内外部各方主体进行的维护数据安全合规的治理活动。刑事治理是由各方主体参与的惩治和预防犯罪的过程,具有过程性。数据交易安全刑事合规是刑事治理的重要方面,可分为事前合规和事后合规两个阶段。《信息安全技术数据交易服务安全要求(征求意见稿)》和《上海数据交易所数据交易安全合规指引》及配套清单采取正面清单和负面清单的管理模式,列举了数据交易主体、数据安全管理体系、数据来源、数据产品可交易性等方面的合规要求。数据交易安全合规清单具有“软法”性质,“软法”与“硬法”相结合,形成企业刑事合规的规范体系。刑法根据数据交易主体及行为场景的差异,以不同的罪刑规范保护数据交易行为所涉及的多元法益。数据犯罪的空白罪状具有定罪指引作用,也为企业合规的开展留下了空间。在实践中应注重数据安全关联罪名适用与刑行衔接,将企业刑事合规融入刑事司法过程并与行政监管相协调。同时,积极发挥企业合规清单的刑事治理机能,构建和完善激励机制、滤罪机制、评估机制,实现合规清单治理的出罪机能与治本效果。 展开更多
关键词 数据交易安全 刑事合规 “软法”治理 清单模式
下载PDF
耕地保护考核和粮食安全考核“合二为一”的基础与推进路径 被引量:1
18
作者 刘慧 钟钰 《中州学刊》 CSSCI 北大核心 2024年第9期47-54,共8页
为让耕地保护目标更好地服务于保障国家粮食安全总目标,我国开始推动耕地保护考核和粮食安全考核“合二为一”。从制度基础看,修订后的《省级政府耕地保护责任目标考核办法》和《粮食安全省长责任制考核办法》都经过多年应用实践,在奖... 为让耕地保护目标更好地服务于保障国家粮食安全总目标,我国开始推动耕地保护考核和粮食安全考核“合二为一”。从制度基础看,修订后的《省级政府耕地保护责任目标考核办法》和《粮食安全省长责任制考核办法》都经过多年应用实践,在奖惩措施、结果运用等方面都具有较高的借鉴价值;从实践基础看,地方探索取得初步成效,典型省份的耕地面积、粮食播种面积都稳中有增。然而考核只是手段,耕地保护党政同责和粮食安全党政同责都实行不久。更好发挥这两项考核“合二为一”对确保各项政策措施落实见效的作用,还需要从根本上理顺关系、构建机制,为此,应着力从以下两方面推进:其一,推动形成党政齐抓共管的工作格局,重点是从讲政治的高度看待耕地保护和粮食安全问题,厘清党政权责界限,统筹协调各部门形成合力,充分发挥考核“指挥棒”作用和督察“利剑”作用;其二,构建以主产区为主、主销区和产销平衡区共同支撑的国家粮食安全保障格局,重点是主产区优先享有政策扶持和利益补偿,主销区对主产区承担横向利益补偿义务,加快产销平衡区经济发展。 展开更多
关键词 党政同责 考核 耕地保护 粮食安全
下载PDF
碳达峰碳中和视域下我国生态安全的现状、难点及进路 被引量:3
19
作者 于文轩 冯瀚元 《新疆师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第4期70-79,共10页
实现碳达峰碳中和、保障生态安全是生态文明建设的重要内容。目前,我国适应碳达峰碳中和的生态安全保障体系已基本形成,但在理念融合、治理体系、发展模式、法治保障等方面仍存在难点。为此,应以整体主义为基本立场,以协同治理为进路,... 实现碳达峰碳中和、保障生态安全是生态文明建设的重要内容。目前,我国适应碳达峰碳中和的生态安全保障体系已基本形成,但在理念融合、治理体系、发展模式、法治保障等方面仍存在难点。为此,应以整体主义为基本立场,以协同治理为进路,完善生态安全保障体系。在理念层面,生态安全观与低碳发展理念的融合基础在于主体的生态理性实践。在治理层面,政府、企业和公众在现代环境治理体系中承担不同的角色和功能,应结合碳达峰碳中和的特点,注重实现主体之间的协同。在发展方式层面,应将生态安全作为发展与转型的底线,实现减污降碳协同增效。在法治层面,应从立法、执法、司法三个方面完善以碳达峰碳中和为导向的生态安全法治保障体系,实现碳达峰碳中和与生态安全的协同共进。 展开更多
关键词 碳达峰碳中和 生态安全 整体主义 协同治理
下载PDF
我国地方数据政策体系的构建进展与展望 被引量:1
20
作者 周文泓 代林序 +1 位作者 吴一凡 吴琼 《情报理论与实践》 CSSCI 北大核心 2024年第8期201-210,共10页
[目的/意义]研究我国地方数据政策体系的构建情况,旨在明确各地数据政策制定的进展与提点,进而推动政策体系的优化建设。[方法/过程]对31个省级政府的数据政策进行统计,并采用文本分析法梳理政策的总体内容框架,基于此,对比与解析政策... [目的/意义]研究我国地方数据政策体系的构建情况,旨在明确各地数据政策制定的进展与提点,进而推动政策体系的优化建设。[方法/过程]对31个省级政府的数据政策进行统计,并采用文本分析法梳理政策的总体内容框架,基于此,对比与解析政策内容的地区差异。[结果/结论]我国地方数据政策的发布可划分为国家信息化发展时期、大数据发展时期以及数据要素市场化时期三个阶段;政策总体内容框架包含数据基本内涵、数据资源建设、数据共享、数据开放、数据资产化、数据安全6大要点;不同地区涵盖上述政策要点的程度不同,也显示了我国数据政策在地方层面的特点。由此,我国地方数据政策需进一步面向多元数据对象、多层数据行动、多元责任主体,实现内容的体系化建设,并为国家数据政策体系的优化发展提供参考。 展开更多
关键词 地方政府 数据政策 数据共享 数据开放 数据要素 数据安全
下载PDF
上一页 1 2 188 下一页 到第
使用帮助 返回顶部