For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o...Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.展开更多
Improved transportation services are a crucial component of urban growth, particularly in emerging cities like Dhaka. Ensuring an improved public bus service quality is a challenge for the city’s transport planners a...Improved transportation services are a crucial component of urban growth, particularly in emerging cities like Dhaka. Ensuring an improved public bus service quality is a challenge for the city’s transport planners and policy makers. Nevertheless, this challenge can’t be met without the support of the residents of this city. This study intends to evaluate the commuters’ willingness to pay (WTP) for an improved and better public bus service quality in Dhaka city. It also attempts to explore the factors affecting the commuters’ WTP amounts. In order to accomplish the study’s goals, a stated preference survey was designed to enquire into the whys and wherefores of female passengers’ harassment on public buses and also to prefer some influential service quality features. WTP values of respondents were calibrated using binary and ordinal logistic models, and these models were developed using SPSS version 26. The results indicate that the majority of respondents were willing to pay more for better service facilities, and they point to security as the most important factor in determining how much extra fare commuters are willing to pay. The results also demonstrate that commuters’ WTP amounts are highly influenced by the respondents’ monthly income. Results from this study have important policy implications, such as protecting women’s safety on public transportation and taking commuters’ socio-demographic characteristics into account before enacting any legislation or increasing fares.展开更多
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro...At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .展开更多
Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manne...Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI.展开更多
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development...Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.展开更多
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio...The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period.展开更多
From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment ...From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations.展开更多
Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our cou...Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education.展开更多
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu...In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract.展开更多
Taking novels as the breakthrough point,the American thinker,Martha C.Nussbaum,strongly criticizes the materialization of human beings by economic utilitarianism and legal economics,as well as the estrangement and ind...Taking novels as the breakthrough point,the American thinker,Martha C.Nussbaum,strongly criticizes the materialization of human beings by economic utilitarianism and legal economics,as well as the estrangement and indifference between human beings in the book Poetic Justice:The Literary Imagination and Public Life.Through being read,the novels enter into the field of public life,expand the area of human emotion,preach human justice and promote the perfection of human values.展开更多
[目的/意义]La Quadrature du Net and Others案是欧盟法院第一次以判决的形式回应成员国国家安全情报领域算法运用的立法,对其进行研究不仅能够拓展理论研究的视界,也可为我国相关制度的构建提供镜鉴。[方法/过程]采取案例分析法,深入...[目的/意义]La Quadrature du Net and Others案是欧盟法院第一次以判决的形式回应成员国国家安全情报领域算法运用的立法,对其进行研究不仅能够拓展理论研究的视界,也可为我国相关制度的构建提供镜鉴。[方法/过程]采取案例分析法,深入分析欧盟法院国家安全情报领域算法规制的逻辑基点、路径和方法。[结果/结论]该判决对欧洲人权法院及法国均产生重要影响,但无论是传统情报监督路径与方法,还是新兴算法规制路径与方法,均存缺憾。我国在推进国家安全情报领域算法运用的同时,要对其基本权利干预性有充分认识,应通过立法强化国家安全情报领域算法运用的规制。展开更多
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell...In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.展开更多
The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an i...The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance?展开更多
A constant reproduction of environmental injustices and health iniquities has demanded the employment of participatory/dialectic approaches to research and to intervene in the reality making possible the involvement o...A constant reproduction of environmental injustices and health iniquities has demanded the employment of participatory/dialectic approaches to research and to intervene in the reality making possible the involvement of social actors in healthy public policies. On this framework, the aim of this paper is to analyse scientific production with dialectic approaches associated with public policies in the context of social, environmental and health problems, considering territorial scales of intervention and the correspondence with some relevant strategies of health promotion. A systematic bibliographic review was applied on a wide pan-disciplinary scientific data base and 36 papers were analysed and classified by their territorial scales of approach. The amount of papers found and their spread through a variety of journals showed a modest, but increasing production which has been dispersed in terms of knowledge areas. Within the classification of territorial approaches, 14 papers were classified as local, 5 as expanded and 17 as a multi-level. Although the papers classified as local approaches were in a good structure of stakeholders’ participation, they are limited to dealing with the global driving forces that reproduce the environmental injustices. Regarding this limitation, the multilevel approaches were identified as more opportune to jointly deal with social, environmental and health problems by means of allowing interaction through multiple territorial scales, fomenting the strengthening of community action, creating supportive environments, and building healthy public policies.展开更多
Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security p...Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction.展开更多
Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in diffe...Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A.展开更多
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har...All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.展开更多
In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a pro...In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously.展开更多
Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security...Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.展开更多
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.
文摘Improved transportation services are a crucial component of urban growth, particularly in emerging cities like Dhaka. Ensuring an improved public bus service quality is a challenge for the city’s transport planners and policy makers. Nevertheless, this challenge can’t be met without the support of the residents of this city. This study intends to evaluate the commuters’ willingness to pay (WTP) for an improved and better public bus service quality in Dhaka city. It also attempts to explore the factors affecting the commuters’ WTP amounts. In order to accomplish the study’s goals, a stated preference survey was designed to enquire into the whys and wherefores of female passengers’ harassment on public buses and also to prefer some influential service quality features. WTP values of respondents were calibrated using binary and ordinal logistic models, and these models were developed using SPSS version 26. The results indicate that the majority of respondents were willing to pay more for better service facilities, and they point to security as the most important factor in determining how much extra fare commuters are willing to pay. The results also demonstrate that commuters’ WTP amounts are highly influenced by the respondents’ monthly income. Results from this study have important policy implications, such as protecting women’s safety on public transportation and taking commuters’ socio-demographic characteristics into account before enacting any legislation or increasing fares.
文摘At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .
文摘Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI.
文摘Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.
文摘The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period.
文摘From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations.
文摘Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education.
文摘In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract.
文摘Taking novels as the breakthrough point,the American thinker,Martha C.Nussbaum,strongly criticizes the materialization of human beings by economic utilitarianism and legal economics,as well as the estrangement and indifference between human beings in the book Poetic Justice:The Literary Imagination and Public Life.Through being read,the novels enter into the field of public life,expand the area of human emotion,preach human justice and promote the perfection of human values.
文摘[目的/意义]La Quadrature du Net and Others案是欧盟法院第一次以判决的形式回应成员国国家安全情报领域算法运用的立法,对其进行研究不仅能够拓展理论研究的视界,也可为我国相关制度的构建提供镜鉴。[方法/过程]采取案例分析法,深入分析欧盟法院国家安全情报领域算法规制的逻辑基点、路径和方法。[结果/结论]该判决对欧洲人权法院及法国均产生重要影响,但无论是传统情报监督路径与方法,还是新兴算法规制路径与方法,均存缺憾。我国在推进国家安全情报领域算法运用的同时,要对其基本权利干预性有充分认识,应通过立法强化国家安全情报领域算法运用的规制。
文摘In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
文摘The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance?
文摘A constant reproduction of environmental injustices and health iniquities has demanded the employment of participatory/dialectic approaches to research and to intervene in the reality making possible the involvement of social actors in healthy public policies. On this framework, the aim of this paper is to analyse scientific production with dialectic approaches associated with public policies in the context of social, environmental and health problems, considering territorial scales of intervention and the correspondence with some relevant strategies of health promotion. A systematic bibliographic review was applied on a wide pan-disciplinary scientific data base and 36 papers were analysed and classified by their territorial scales of approach. The amount of papers found and their spread through a variety of journals showed a modest, but increasing production which has been dispersed in terms of knowledge areas. Within the classification of territorial approaches, 14 papers were classified as local, 5 as expanded and 17 as a multi-level. Although the papers classified as local approaches were in a good structure of stakeholders’ participation, they are limited to dealing with the global driving forces that reproduce the environmental injustices. Regarding this limitation, the multilevel approaches were identified as more opportune to jointly deal with social, environmental and health problems by means of allowing interaction through multiple territorial scales, fomenting the strengthening of community action, creating supportive environments, and building healthy public policies.
基金Supported by the National Natural Science Foundation of China (60473021)
文摘Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction.
基金Sponsored by Beijing Municipal Education Commission Social Science Project (KM202010009002)。
文摘Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A.
文摘All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.
基金Young and Middle-Aged Social Science Program of China People’s Police University(ZQN202214,ZQN2020025).
文摘In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously.
文摘Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.