期刊文献+
共找到1,202篇文章
< 1 2 61 >
每页显示 20 50 100
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
1
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 Ad Hoc networks self-organize bidirectional trust public key management.
下载PDF
Registered Nurses’ Perceptions of Factors Contributing to Trust-Based Public Management
2
作者 Bibi Estev Ami Hommel 《Open Journal of Nursing》 2020年第11期1126-1141,共16页
<strong>Aim:</strong> The aim of this study was to illuminate registered nurses’ (RNs) perceptions of Trust-Based Public Management (TBPM) in Swedish health care. Design: This study follows a phenomenogra... <strong>Aim:</strong> The aim of this study was to illuminate registered nurses’ (RNs) perceptions of Trust-Based Public Management (TBPM) in Swedish health care. Design: This study follows a phenomenografic approach guided by Ference Marton’s philosophy. <strong>Methods:</strong> Semi-structured interviews were used to identify variations in RNs’ perceptions of TBPM. Between February and April 2019, 24 RNs from five Swedish public healthcare departments participated in the study. <strong>Results: </strong>The results show that none of the participants had previously heard about the work of the Swedish Delegation for TBPM. The study revealed perceptions those politicians and managers were absent from the workplace, that power had been displaced to HR, and that perceptions of trust in the leadership and of working to guidelines varied. Perceptions varied between RNs employed by the municipalities and by the hospitals concerning administration, the time allotted for work, cooperation, and education. 展开更多
关键词 LEADERSHIP New public Management ORGANIZATION Registered nurses trust Based public Management
下载PDF
Analysis on the Cy-Pres Doctrine in the Public Benefit Trust
3
作者 Saisai WANG 《International Journal of Technology Management》 2013年第6期108-110,共3页
Public benefit trust is of great significance to the development of social public welfare, and the cy-pres doctrine as a special principle of public benefit trust, plays an important role in protecting the continuatio... Public benefit trust is of great significance to the development of social public welfare, and the cy-pres doctrine as a special principle of public benefit trust, plays an important role in protecting the continuation of public benefit trust, and the realization and reasonable use of high-efficiency trust properties. In this paper, therefore, the origin, establishment, and development trend of the approximation principle as well as its current legislative situation in China are studied, and also its applicability of the Cy-Pres doctrine in China's public benefit trust is briefly evaluated, so as to further deepen the understanding of the Cy-Pres doctrine and develop the public benefit trust undertakings in China. 展开更多
关键词 public Benefit trust the Cy-Pres Doctrine Current Legislation Situation Evaluation on the Applicability
下载PDF
The Relationship between Public Service Efficiency of Government and Residential Political Trust in Hong Kong
4
作者 Zhengliang Zhang Shijian Wu +1 位作者 Jia Liu Shujian Zhang 《Journal of Economic Science Research》 2021年第1期23-30,共8页
Hong Kong has a long history with its high efficiency and clean and self-disciplined government.Within the past over 20 years,different social development trend has occurred in Hong Kong.The article observed the relat... Hong Kong has a long history with its high efficiency and clean and self-disciplined government.Within the past over 20 years,different social development trend has occurred in Hong Kong.The article observed the relationship between political trust from residence and public service efficiency of government in Hong Kong from 1992 to 2015 and found that the value of public service efficiency has a significant effect on political trust in Hong Kong government,the higher the efficiency of public services,the higher the political trust.The author tried to find the path for the Hong Kong government to improve its public service quality and efficiency after testifying the positive correlation between public service efficiency and residential political trust with empirical analysis. 展开更多
关键词 Hong Kong government public service efficiency Political trust
下载PDF
A Public Blockchain Consensus Mechanism for Fault-Tolerant Distributed Computing in LEO Satellite Communications 被引量:2
5
作者 Zhen Zhang Bing Guo +3 位作者 Lidong Zhu Yan Shen Chaoxia Qin Chengjie Li 《China Communications》 SCIE CSCD 2022年第7期110-123,共14页
In LEO(Low Earth Orbit)satellite communication systems,the satellite network is made up of a large number of satellites,the dynamically changing network environment affects the results of distributed computing.In orde... In LEO(Low Earth Orbit)satellite communication systems,the satellite network is made up of a large number of satellites,the dynamically changing network environment affects the results of distributed computing.In order to improve the fault tolerance rate,a novel public blockchain consensus mechanism that applies a distributed computing architecture in a public network is proposed.Redundant calculation of blockchain ensures the credibility of the results;and the transactions with calculation results of a task are stored distributed in sequence in Directed Acyclic Graphs(DAG).The transactions issued by nodes are connected to form a net.The net can quickly provide node reputation evaluation that does not rely on third parties.Simulations show that our proposed blockchain has the following advantages:1.The task processing speed of the blockchain can be close to that of the fastest node in the entire blockchain;2.When the tasks’arrival time intervals and demanded working nodes(WNs)meet certain conditions,the network can tolerate more than 50%of malicious devices;3.No matter the number of nodes in the blockchain is increased or reduced,the network can keep robustness by adjusting the task’s arrival time interval and demanded WNs. 展开更多
关键词 distributed computing public blockchain network consensus mechanism credibility FAULTTOLERANCE
下载PDF
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:3
6
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm ENCRYPTION efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
Does internet use improve the public evaluation of government environmental governance (GEG) in China? An analysis using the Chinese Social Survey, 2013−2017
7
作者 Jinghuan Chen Jason AJean +1 位作者 Yunliang Zhang Yixi Lu 《Chinese Journal of Population,Resources and Environment》 2022年第4期307-315,共9页
Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evalua... Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately. 展开更多
关键词 Internet use public evaluation Government environmental governance Urban-rural difference Political trust
下载PDF
The Internet,Public Crisis and Social Identity
8
作者 Hu Baijing 《Contemporary Social Sciences》 2016年第2期116-128,共13页
The Internet reconstructs the order of information dissemination and power relations during a public crisis and facilitates the redistribution of discourse power. Therefore, from a micro perspective, it further compli... The Internet reconstructs the order of information dissemination and power relations during a public crisis and facilitates the redistribution of discourse power. Therefore, from a micro perspective, it further complicates a specific crisis;while from a macro perspective, it intensifies the uncertainty of social risks. In the context of a public crisis, through the redistribution of discourse power, the Internet promotes competitions among a diversity of opinions and disintegrates the traditional mechanism of opinion expression, the mechanism of social trust and the legitimate mechanism of decision making and power exercising. In the meantime, the Internet also creates space for social actions. This space, integrating the virtual space with the real world, enables the public to"upgrade"from onlookers and expressers to active movers. Dialogue among plural subjects in the society should be deemed a basic notion and the approach to public crisis management in the era of the Internet should renew the discourse order, reconstruct the mechanisms of trust and legitimacy, and cultivate a sense of identity and community in a pluralist context. 展开更多
关键词 public CRISIS DIALOGUE DISCOURSE power trust LEGITIMACY
下载PDF
Government Data Openness and Coverage. How do They Affect Trust in European Countries? 被引量:3
9
作者 Nicolás Gonzálvez-Gallego Laura Nieto-Torrejón 《Journal of Data and Information Science》 CSCD 2021年第1期139-153,共15页
Purpose: This paper aims to assess if the extent of openness and the coverage of data sets released by European governments have a significant impact on citizen trust in public institutions.Design/methodology/approach... Purpose: This paper aims to assess if the extent of openness and the coverage of data sets released by European governments have a significant impact on citizen trust in public institutions.Design/methodology/approach: Data for openness and coverage have been collected from the Open Data Inventory 2018(ODIN), by Open Data Watch;institutional trust is built up as a formative construct based on the European Social Survey(ESS), Round 9. The relations between the open government data features and trust have been tested on the basis of structural equation modelling(SEM).Findings: The paper reveals that as European governments improve data openness, disaggregation, and time coverage, people tend to trust them more. However, the size of the effect is still small and, comparatively, data coverage effect on citizens' confidence is more than twice than the impact of openness.Research limitations: This paper analyzes the causal effect of Open Government Data(OGD) features captured in a certain moment of time. In upcoming years, as OGD is implemented and a more consistent effect on people is expected, time series analysis will provide with a deeper insight.Practical implications: Public officers should continue working in the development of a technological framework that contributes to make OGD truly open. They should improve the added value of the increasing amount of open data currently available in order to boost internal and external innovations valuable both for public agencies and citizens.Originality/value: In a field of knowledge with little quantitative empirical evidence, this paper provides updated support for the positive effect of OGD strategies and it also points out areas of improvement in terms of the value that citizens can get from OGD coverage and openness. 展开更多
关键词 Open government data Open data trust public policy
下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
10
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography Internet of Things radio frequency identification security system trusting system.
下载PDF
公共数据进入数据要素市场模式研究 被引量:9
11
作者 范佳佳 《信息资源管理学报》 CSSCI 2024年第2期68-81,共14页
公共数据是数据要素市场的重要组成部分,其如何进入数据要素市场以及其参与数据要素市场的模式分为几类,学界对此少有研究。通过梳理和比较,深入挖掘国内外公共数据参与数据要素市场的模式类型,归纳得出公共数据进入数据要素市场有两大... 公共数据是数据要素市场的重要组成部分,其如何进入数据要素市场以及其参与数据要素市场的模式分为几类,学界对此少有研究。通过梳理和比较,深入挖掘国内外公共数据参与数据要素市场的模式类型,归纳得出公共数据进入数据要素市场有两大类、五种模式,包括一级市场(授权运营)+二级市场(场内交易)模式,公共数据开发利用+场外交易模式,依托数据平台构建公共数据流通市场模式,借助数据经纪商、数据中介的交易模式,以及通过(公共)数据信托参与数据市场模式等。在此归纳基础上,演绎出公共数据进入数据要素市场的理想模式,这一理想模式分为数据获取、数据产品生产、数据产品交易三个各有其独特特征的环节,可为我国公共数据进入数据要素市场的策略选择提供参考。 展开更多
关键词 公共数据 数据要素市场 公共数据授权运营 公共数据交易 数据信托模式
下载PDF
农地确权与农户政治信任:基于中央和基层组织的分析 被引量:2
12
作者 陈卓 胡新艳 陈相泼 《华中农业大学学报(社会科学版)》 CSSCI 北大核心 2024年第1期164-177,共14页
农地确权的经济影响效应受到了学界的广泛关注,但鲜有研究关注农地确权政策的政治效应。基于3期农地确权追踪调查数据,利用广义DID模型评估农地确权对农户政治信任水平的影响。结果表明:农地确权使农户的中央级政治信任、村级政治信任... 农地确权的经济影响效应受到了学界的广泛关注,但鲜有研究关注农地确权政策的政治效应。基于3期农地确权追踪调查数据,利用广义DID模型评估农地确权对农户政治信任水平的影响。结果表明:农地确权使农户的中央级政治信任、村级政治信任分别提升0.142个单位和0.215个单位。上述结果在考虑平行趋势、样本随机性、控制潜在遗漏变量、替换被解释变量、更换计量模型后依然稳健。机制分析表明,农地确权通过降低地权权益的保护成本、提升盘活农地产权收益两条途径对农户政治信任产生影响。进一步分析显示:农地确权执行规范程度越高,不影响农户的中央级政治信任,但会显著提升农户的村级政治信任水平。由此认为,农地确权除产生经济影响外,也是政府投资农户政治信任的有效途径。 展开更多
关键词 公共政策 制度绩效 农地确权 产权保障 政治信任
下载PDF
危机沟通策略对地方政府信任的影响研究 被引量:1
13
作者 高学德 王镇江 《公共管理评论》 CSSCI 2024年第3期76-98,共23页
公共危机事件发生后,地方政府采用何种沟通策略以满足公众需求是政府治理实践和学术界关注的重要议题,但不同导向的危机沟通策略如何以及在多大程度上影响公众的政治态度仍是一个悬而未决的问题,本文提出并探讨了“管理型”和“关切型... 公共危机事件发生后,地方政府采用何种沟通策略以满足公众需求是政府治理实践和学术界关注的重要议题,但不同导向的危机沟通策略如何以及在多大程度上影响公众的政治态度仍是一个悬而未决的问题,本文提出并探讨了“管理型”和“关切型”两种不同的政府危机沟通策略对地方政府信任的直接和间接影响,并比较了不同公共危机事件类型下危机沟通策略影响地方政府信任的异质性。研究发现:(1)公共危机事件发生后,相比于“管理型”危机沟通策略,“关切型”危机沟通策略更有助于提高公众对地方政府的信任;(2)公众情绪在政府危机沟通策略影响地方政府信任的过程中起中介作用;(3)危机沟通策略对地方政府信任的影响因不同类型的公共危机事件而表现出较大的差异性,与意外事件和缺陷事件相比,在丑闻事件中运用“关切型”危机沟通策略更能提升公众对地方政府的信任水平。研究结果拓展了已有关于危机沟通策略的概念分类框架,丰富了学术界对政府危机沟通效果及其影响路径的理解,也有助于反思不同沟通策略的应用场景。 展开更多
关键词 公共危机事件 危机沟通策略 地方政府信任 公众情绪
下载PDF
论医疗数据的权属配置 ——基于公共信托理论的视角 被引量:1
14
作者 张步峰 栗博 《重庆邮电大学学报(社会科学版)》 2024年第6期77-88,共12页
医疗数据作为典型的公共数据资源,不愿利用、不敢利用、不知利用的现象成为制约医疗行业数字化和医疗数据科学发展的主要瓶颈,由此引发的“反公地悲剧”危机广泛存在于各地医疗机构以及卫生行政机关之中。当前,医疗数据权属存在的法律... 医疗数据作为典型的公共数据资源,不愿利用、不敢利用、不知利用的现象成为制约医疗行业数字化和医疗数据科学发展的主要瓶颈,由此引发的“反公地悲剧”危机广泛存在于各地医疗机构以及卫生行政机关之中。当前,医疗数据权属存在的法律争议主要集中在两个方面,包括法律规范的不完善和数据权属的不明确。因此,有必要借鉴“公共信托理论”的观点,用以回应医疗数据的权属争议,在以公民和国家为法律主体的公共信托关系中,合理配置双方的权利义务关系,平衡医疗数据之上的个人利益和公共利益,从而解决医疗数据开发利用权属不清的问题。在公共信托理论下,政府在医疗数据收集、保管和开发利用阶段,承担不同的公共服务责任,从而保障公民数据权利的实现。为了有效监督政府信托义务,需要引入外部监督来保护公共信托权益不受侵犯。通过建构个人信息保护的行政公益诉讼制度、适当扩展行政诉讼受案范围、健全行政复议制度和行政内部举报机制等方式,有助于完善公共信托权益的行政救济制度,促进医疗数据资源在法治轨道下被有效开发和利用。 展开更多
关键词 公共数据 医疗数据 反公地悲剧 公共信托理论
下载PDF
旅游者风险感知对目的地信任影响研究——政府信任的中介作用 被引量:1
15
作者 蔡礼彬 程晓盈 《中国石油大学学报(社会科学版)》 2024年第2期110-117,共8页
旅游者风险感知与信任密切相关,各种风险所带来的不确定性会改变社会互动并造成信任危机,而旅游者目的地信任是影响旅游者满意度与忠诚度的重要因素。以安东尼·吉登斯关于风险感知和信任的论述为理论依据建立分析框架,通过网络问卷... 旅游者风险感知与信任密切相关,各种风险所带来的不确定性会改变社会互动并造成信任危机,而旅游者目的地信任是影响旅游者满意度与忠诚度的重要因素。以安东尼·吉登斯关于风险感知和信任的论述为理论依据建立分析框架,通过网络问卷对326名风险经历者进行调查,并以政府信任为中介变量,以风险沟通、应急处置为调节变量,重点探讨了公共卫生事件情境下旅游者风险感知对其目的地信任的作用机制与效应。结果显示:风险感知对旅游者政府信任具有显著负向影响,而风险感知对旅游者目的地信任无显著影响;政府信任对旅游者目的地信任具有显著正向影响;风险沟通在风险感知与政府信任中不存在调节作用,应急处置在风险感知与政府信任中存在调节作用。 展开更多
关键词 旅游者目的地信任 风险感知 政府信任 公共卫生风险
下载PDF
基于感知公平理论的公共危机事件后政府信任修复研究
16
作者 彭小宝 李梦莹 徐彪 《工程管理科技前沿》 CSSCI 北大核心 2024年第3期76-82,共7页
从公平视角探讨政府信任修复的机理,对于危机管理和信任修复领域具有重要的理论和现实意义。本文基于感知公平理论和归因理论构建了政府信任修复模型,分析了公共危机事件后公众感知公平、危机事件归因对政府信任修复的作用机理,并采用... 从公平视角探讨政府信任修复的机理,对于危机管理和信任修复领域具有重要的理论和现实意义。本文基于感知公平理论和归因理论构建了政府信任修复模型,分析了公共危机事件后公众感知公平、危机事件归因对政府信任修复的作用机理,并采用情景实验法进行实证检验,研究发现:(1)结果公平、程序公平、互动公平修复策略能有效地修复政府信任;(2)三种公平修复策略对于政府认知信任维度和情感信任维度的修复效果存在显著差异;(3)政府对危机事件的责任归属、稳定性归因会影响三种公平修复策略的修复效果。公共危机事件后,政府可以根据信任受损的维度及事件归因选择适当的公平修复策略。 展开更多
关键词 公共危机事件 信任修复 感知公平理论 归因理论
下载PDF
宋代地方政府公信力损耗及其治理论析
17
作者 王晓龙 谢向辉 《安徽史学》 CSSCI 北大核心 2024年第5期17-25,共9页
政府公信力是社会公众对政府履职能力的认可和信任度,属于政府的无形资产。宋代地方政府在行政中公信力损耗严重,主要表现在政策执行朝令夕改、失信于民,官员滥用权力残害民众、贪赃腐败、渎职怠政等方面。导致这种情况的原因包括部分... 政府公信力是社会公众对政府履职能力的认可和信任度,属于政府的无形资产。宋代地方政府在行政中公信力损耗严重,主要表现在政策执行朝令夕改、失信于民,官员滥用权力残害民众、贪赃腐败、渎职怠政等方面。导致这种情况的原因包括部分官员素质较差,地方财政窘迫,中央政令和考核指标要求以及监督问责体制难以发挥实效等。为了挽回民众信任,宋朝统治者也提出一系列防治举措,既有制度层面的法令规章,也有执行层面的人事运作,还包括诸如《官箴书》之类的劝诫引导等,并取得一定成效。但由于缺乏严格的惩治措施和长效问责机制,特别是中央决策的可行性和对地方财政的搜刮,导致地方政府违法扰民问题仍屡禁不止,治理效果大打折扣。所以宋代民众以“不清不浊”的浆水色来形容地方政府和官员,其中的经验教训值得认真反思。 展开更多
关键词 宋代 地方政府 公信力 防治举措 反思
下载PDF
突发公共卫生事件中民众对专家系统的信任研究
18
作者 龚捷 舒琴琴 任晓东 《医学与哲学》 北大核心 2024年第2期33-36,共4页
风险社会充满不确定性,社会风险因素不断增加,突发公共卫生事件中民众与专家系统的信任关系存在“有限”信任取代完全依赖、盲从式跟风、信任缺失等问题。从风险传播视角出发,分析民众与专家系统信任关系存在问题的原因主要包括:专家与... 风险社会充满不确定性,社会风险因素不断增加,突发公共卫生事件中民众与专家系统的信任关系存在“有限”信任取代完全依赖、盲从式跟风、信任缺失等问题。从风险传播视角出发,分析民众与专家系统信任关系存在问题的原因主要包括:专家与普通民众之间的认知落差、媒体不当报道消解专家公信力、对话机制缺失影响专家观点传播效果,并在此基础上提出落实公众参与交流机制、规范新闻媒体报道、优化专家风险话语表达等修复和调整民众对专家系统信任关系的有效策略。 展开更多
关键词 突发公共卫生事件 专家系统 信任 风险传播
下载PDF
不确定性情境下的基层社会公共信任塑造——以A镇“党建引领、一网三联”治理模式为例
19
作者 张天舒 崔向洁 《南昌大学学报(人文社会科学版)》 CSSCI 北大核心 2024年第6期129-140,共12页
不确定性对基层治理构成了持续的挑战,如何利用制度优势,破解这一难题已经成为国家治理的重要议题。基于行动情境-行动策略的理论框架,剖析A镇“党建引领、一网三联”治理模式的典型案例,挖掘制度优势在微观层面上的运行机制与逻辑,可... 不确定性对基层治理构成了持续的挑战,如何利用制度优势,破解这一难题已经成为国家治理的重要议题。基于行动情境-行动策略的理论框架,剖析A镇“党建引领、一网三联”治理模式的典型案例,挖掘制度优势在微观层面上的运行机制与逻辑,可以发现,基层社会面临着外部环境和行动主体的双重不确定性情境。基层党组织发挥党政体制的优势,通过塑造公共信任,增加非正式治理资源,运用价值引领-组织重塑-规则强化机制,探索出目标重塑与价值感召、联结吸纳与权责分配、规则激励与规则约束路径,提升了基层政府的服务性和公众的主动性,为推进基层治理提供了理论和经验借鉴。 展开更多
关键词 不确定性 公共信任 党建引领 基层治理 党政体制
下载PDF
数智时代公共图书馆用户数据隐私保护策略——基于信任理论视角
20
作者 苗雯雯 邓敏 《图书馆工作与研究》 CSSCI 北大核心 2024年第S01期3-9,共7页
文章梳理公共图书馆用户数据隐私保护现状,分析数智时代公共图书馆用户数据隐私保护在技术与安全、法律与伦理、用户意识与教育及资源与管理方面面临的挑战。基于信任理论视角,从认知信任、情感信任和制度信任3个维度提出公共图书馆用... 文章梳理公共图书馆用户数据隐私保护现状,分析数智时代公共图书馆用户数据隐私保护在技术与安全、法律与伦理、用户意识与教育及资源与管理方面面临的挑战。基于信任理论视角,从认知信任、情感信任和制度信任3个维度提出公共图书馆用户数据隐私保护策略,即增强用户对公共图书馆用户数据隐私保护能力的信任,增进用户对公共图书馆的情感联结和信任,强化用户对公共图书馆用户数据隐私保护制度的信任。 展开更多
关键词 公共图书馆 用户数据 数据安全 信任理论 隐私保护
下载PDF
上一页 1 2 61 下一页 到第
使用帮助 返回顶部