期刊文献+
共找到546篇文章
< 1 2 28 >
每页显示 20 50 100
A Comparative Study on Factors Influencing Food Security in China and India
1
作者 Shaowen YANG Meixue QIU 《Asian Agricultural Research》 2024年第2期12-15,共4页
This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income leve... This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income level,and income distribution.Using the prevalence of undernourishment as an indicator of food security,the paper empirically tests the degree of impact of various factors on food security in both countries using Tobit regression and Newey regression methods.The study finds that improving the level of economic development can significantly enhance food security in both countriesꎻreducing the Gini coefficient has a significant impact on India,but not on Chinaꎻincreasing the agricultural production per capita has a much greater effect on China than on India.Therefore,both countries should take measures that are both similar and different according to their national conditions to improve their food security level. 展开更多
关键词 Food security Influencing factors Comparative study Econometric model
下载PDF
The Essence of Non-Traditional Security Issues and Their Solutions 被引量:1
2
作者 Huang Zhaoyu Su Qin 《Contemporary International Relations》 2009年第6期28-45,共18页
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio... Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences. 展开更多
关键词 The Essence of non-traditional security Issues and Their Solutions security
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
3
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Cost analysis of radical resection of malignant breast tumors under the China Healthcare Security Diagnosis Related Groups payment system
4
作者 Yun-He Hu Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第20期4174-4179,共6页
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp... BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety. 展开更多
关键词 China Healthcare security Diagnosis Related Groups Real-world study Radical resection of malignant breast tumors Hospitalization costs Cost structure Average length of stay
下载PDF
Surgical treatment of liver cancer and pancreatic cancer under the China Healthcare Security Diagnosis Related Groups payment system
5
作者 Yun-He Hu Fan Yu +1 位作者 Yu-Zhuo Zhou Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第21期4673-4679,共7页
BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers account... BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability. 展开更多
关键词 China health care security diagnosis-related groups Real-world study Liver cancer surgical treatment Pancreatic cancer surgical treatment Hospitalization costs Cost structure Average length of stay
下载PDF
Two Issues in Studying Security Environment
6
作者 Yin Gang Yin Gang is an Associate Research Professor at the Institute for West Asian and Southeast Asian Studies, the Chinese Academy of Social Sciences. 《Contemporary International Relations》 2003年第1期12-16,共5页
To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take ti... To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is 展开更多
关键词 in security Two Issues in studying security Environment of ROK that HAVE
下载PDF
Study on Security Technologies for Wireles Network Integration
7
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 security USA WLAN NODE IEEE IPSEC study on security Technologies for Wireles Network Integration
下载PDF
Women as a Key to Agriculture and Food Security in Sudan: The Case Study of Northern Kordofan State
8
《Journal of Agricultural Science and Technology(B)》 2012年第5期614-620,共7页
In the rural areas where most of the world's hungry people live, women produce most of the locally consumed food. Their contribution could be much greater if they had equal access to essential resources and services,... In the rural areas where most of the world's hungry people live, women produce most of the locally consumed food. Their contribution could be much greater if they had equal access to essential resources and services, such as land, credit, and training. In Sudan, women have always been active in agriculture and food security, constituting 17% to agricultural labor force. However, culture coupled with imperfections of official data underestimates their contribution. Accordingly, this study was carried out in the western part of Sudan, namely, North Kordofan State in order to identify and assess the role of women in agriculture and food security and identify the main factors and constraints affecting their contribution to agricultural production in the state. The findings confirm that women contribute 74% to the monthly agricultural income, 65% to total income, 62% to the labor work, and 65% to the household activities. Their average daily working hours are 14, while, those of men are only 8. The study suggests that the removal of the obstacles those women face could increase their contribution to and enhances the livelihood of the people in the state. Hence, a review to the relevant government policies is needed, so that women are empowered by improving their access to resources and credit. 展开更多
关键词 WOMEN food security SUDAN Kordofan case study.
下载PDF
Study on Security of NGN Service Platform
9
作者 Huang Mingshi (Network Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第4期17-20,共4页
This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service ... This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service access gateway and service management platform. The service access gateway provides security features to the open service interface concerning ID authentication, authorization, audit, encryption and integrity protection. For service deployment, its security can be solved by issuing related user digital certificates, deploying a firewall or an intrusion detection system, implementing load control, managing users' home location and displaying users' real-time IP addresses. 展开更多
关键词 NGN study on security of NGN Service Platform security
下载PDF
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security
10
作者 Ding Daoqi State Grid Information & Telecommunication Co.,Ltd.Zhao Fang 《Electricity》 2009年第2期45-51,共7页
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The... In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS. 展开更多
关键词 EMS 2003 WAMS An In-Depth study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid security
下载PDF
Preliminary Study on Early-warning System of Ecological Security in Water-Level-Fluctuating Zone (WLFZ) of Three Gorges Reservoir 被引量:2
11
作者 郑磊 左太安 李月臣 《Agricultural Science & Technology》 CAS 2010年第5期159-164,共6页
The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological securit... The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored. 展开更多
关键词 Ecological security Early warning system Fuzzy mathematics Three Gorges Reservoir Water-Level-Fluctuating Zone (WLFZ)
下载PDF
China' s Security Measures for 2010 Shanghai World Expo: A Retrospect
12
作者 Degang SUN 《International Relations and Diplomacy》 2015年第7期470-479,共10页
The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as seriou... The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic. 展开更多
关键词 Shanghai World Expo ANTI-TERRORISM China's national security non-traditional threat internationalanti-terror cooperation
下载PDF
“Intelligence Studies”视域下的中国公安情报学若干基本问题研究 被引量:36
13
作者 马德辉 苏英杰 《情报理论与实践》 CSSCI 北大核心 2013年第5期50-57,49,共9页
文章将"Intelligence Studies"定位于源于军事战争、基于国家情报体系、面向社会情报活动的情报学,其和公安情报学是一般和特殊、上位类与下位类、属概念和种概念的关系。公安情报学的学科属性界定于社会科学、思维科学、管... 文章将"Intelligence Studies"定位于源于军事战争、基于国家情报体系、面向社会情报活动的情报学,其和公安情报学是一般和特殊、上位类与下位类、属概念和种概念的关系。公安情报学的学科属性界定于社会科学、思维科学、管理科学以及应用科学;研究对象是公安情报、公安情报机构以及公安情报活动;方法论是哲学方法、一般科学方法和专业特色方法;理论基础在于警务哲学和情报理论;产生和发展的驱动力是非传统安全挑战、公安情报部门的需求以及公安情报技术变革等因素。从公安情报理论、方法、技术、管理、应用5个层面构筑以公安情报活动为导向的公安情报学学科体系。 展开更多
关键词 情报学 国家情报体系 公安情报学 学科建设
下载PDF
基于CNKI E-Study的国内护理实验室安全的文献计量学分析 被引量:6
14
作者 马彦秋子 王艳玲 +1 位作者 肖倩 王秀红 《实验室研究与探索》 CAS 北大核心 2017年第4期284-287,共4页
分析CNKI自收录起至2015年底的护理实验室安全论文的研究现状、存在的问题,为今后深入护理实验室安全建设提供可参考的计量学分析资料。以CNKI E-Study为研究工具,检索、查重后进行人工阅读,根据纳入、排除标准进行筛选,对符合要求的文... 分析CNKI自收录起至2015年底的护理实验室安全论文的研究现状、存在的问题,为今后深入护理实验室安全建设提供可参考的计量学分析资料。以CNKI E-Study为研究工具,检索、查重后进行人工阅读,根据纳入、排除标准进行筛选,对符合要求的文献的内、外部特征进行描述。获得符合要求的全文346篇;2009年起相关文献开始稳步增长;资金资助占文献总量的4.91%;收录期刊共42种;文献合作度为2.90,合作率为33.24%,均低于中国科技期刊引证报告统计的指标;发文数和被引量远低于高产作者要求;研究类型相对丰富,但研究内容过于集中,以职业暴露及职业安全防护为主。国内护理实验室安全研究正在逐步深入,但该领域研究核心群尚未形成、研究内容局限。因此,今后应继续关注护理实验室安全研究,研究方向应该从研究方法和内容上入手,从深度和广度上促进研究发展。 展开更多
关键词 文献计量学 护理实验室安全 中国知网(CNKI)E-study
下载PDF
多学科交叉融合背景下中国式国家安全概念的反思与重构
15
作者 张新平 白朴 文浠浠 《情报杂志》 北大核心 2025年第2期57-65,100,共10页
[研究目的]多学科交叉融合是现代学术发展的显著特征和必然趋势。国家安全概念作为国家安全格局、观念和态势的凝练表达,既是国家安全知识体系的基础和载体,也是国家安全学和情报学等相关学科交叉融合和学术对话的基点,有必要对中国式... [研究目的]多学科交叉融合是现代学术发展的显著特征和必然趋势。国家安全概念作为国家安全格局、观念和态势的凝练表达,既是国家安全知识体系的基础和载体,也是国家安全学和情报学等相关学科交叉融合和学术对话的基点,有必要对中国式国家安全概念进行学术分析和逻辑抽离。[研究方法]借鉴援引政治学“最小-最大”概念分析方法,对我国国家安全概念的典型使用场景进行概括,并抽离典型使用场景中的概念属性予以类型化、形成单一属性表,进而对国家安全概念进行模型构建。[研究结果/结论]中国式国家安全具有突出的人民性和文明性之“中国特色”,中国式国家安全概念特指中国人民所塑造的文明秩序能够持续完整发展且不被破坏的一种稳定状态,其与目标、理论、政治、法益、体系和道德六个维度的具体展开共同构成一个二元嵌套的概念模型。 展开更多
关键词 国家安全学 情报学 中国式国家安全 “最小—最大”概念分析法 多学科交叉融合
下载PDF
美联邦网络空间安全研发战略计划比较研究
16
作者 胡春卉 卿昱 《信息安全与通信保密》 2025年第1期34-45,共12页
美联邦政府出台的《联邦网络空间安全研发战略计划》紧密围绕不断演变的网络空间安全挑战,在体现了对网络安全技术研发重视的同时,凸显了对国家科技构想的战略思维和体系设计。该计划自2016年首次发布以来,每4年更新一次,对安全威胁、... 美联邦政府出台的《联邦网络空间安全研发战略计划》紧密围绕不断演变的网络空间安全挑战,在体现了对网络安全技术研发重视的同时,凸显了对国家科技构想的战略思维和体系设计。该计划自2016年首次发布以来,每4年更新一次,对安全威胁、防御要素、优先领域和关键支撑等内容进行扩展和深化。对美系列研发战略计划主要内容进行了回顾和总结。从顶层设计、安全形势和技术布局3个角度对研发战略计划开展了比较研究,基于国内外情况对比思考,在顶层设计、技术创新、体系研究和成果转化方面阐述了相关启示建议。 展开更多
关键词 网络空间安全 科技创新 研发战略 比较研究
下载PDF
轨道交通云联锁信号系统的发展浅析
17
作者 葛亮 《微型计算机》 2025年第2期91-93,共3页
文章主要探讨了轨道交通云联锁信号系统,这是一种基于云计算技术的信号系统,旨在提高轨道交通的安全性和效率。首先介绍了轨道交通云联锁信号系统的定义、组成以及技术发展历程,为读者提供了系统的基本认识。接着,深入分析了该系统的关... 文章主要探讨了轨道交通云联锁信号系统,这是一种基于云计算技术的信号系统,旨在提高轨道交通的安全性和效率。首先介绍了轨道交通云联锁信号系统的定义、组成以及技术发展历程,为读者提供了系统的基本认识。接着,深入分析了该系统的关键技术,包括云计算技术在信号系统中的应用以及信号系统的数据安全与可靠性问题。文中还通过具体的应用案例,展示了云联锁信号系统在轨道交通中的应用,并对其经济效益与社会效益进行了评估。最后,文章总结了云联锁信号系统的优势和潜在的发展前景,为轨道交通行业的技术进步和安全管理提供了参考。 展开更多
关键词 轨道交通 云联锁信号系统 云计算 数据安全 可靠性 应用案例 效益评估
下载PDF
Defining Non-Traditional Security and Its Implications for China 被引量:1
18
作者 Yizhou Wang 《China & World Economy》 SCIE 2004年第5期59-66,共8页
Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs ... Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues. 展开更多
关键词 security Defining non-traditional security and Its Implications for China
原文传递
中国国家安全学:生成逻辑、体系创新与未来展望 被引量:6
19
作者 肖晞 刘治辰 《国际安全研究》 CSSCI 北大核心 2024年第2期71-95,164,165,共27页
国家安全学的设立既是呼应新时代发展课题的必然要求,也是国家安全总体战略布局中的重要一环。时代赋予国家安全学现实土壤,战略赋予学科建设内在动力,交叉是学科产生的关键内核,作为战略性新兴学科的国家安全学在时代与战略的共鸣下应... 国家安全学的设立既是呼应新时代发展课题的必然要求,也是国家安全总体战略布局中的重要一环。时代赋予国家安全学现实土壤,战略赋予学科建设内在动力,交叉是学科产生的关键内核,作为战略性新兴学科的国家安全学在时代与战略的共鸣下应运而生。国家安全学在总体思维和交叉思维的指导下,在学科体系建设上提高站位、科学错位;在学术体系建设上立足国情、注重内涵;在话语体系建设上言之有理、言之有道,不断探索国家安全学的体系创新,逐渐发展出一条中国国家安全学建设的独特路径。面向未来,需要牢牢把握总体国家安全观,以探索学科基础研究范式为主线,立足学科自身的交叉属性、战略属性和政治属性,推动国家安全学自主知识体系建设与学术共同体建设,促进学科进一步高质量发展。 展开更多
关键词 国家安全学 学科建设 总体国家安全观 三大体系
下载PDF
总体国家安全观视域下的国家安全学理论研究十年回眸 被引量:4
20
作者 李文良 《国际安全研究》 CSSCI 北大核心 2024年第2期51-70,164,共21页
中国学界对国家安全学理论的研究可以追溯到20世纪90年代。2014年总体国家安全观提出以后,国家安全学理论研究有了根本遵循,标志着国家安全学理论研究进入新时代。2024年,在总体国家安全观提出十周年之际,中国学界对国家安全学理论的研... 中国学界对国家安全学理论的研究可以追溯到20世纪90年代。2014年总体国家安全观提出以后,国家安全学理论研究有了根本遵循,标志着国家安全学理论研究进入新时代。2024年,在总体国家安全观提出十周年之际,中国学界对国家安全学理论的研究,形成了以总体国家安全观研究为先导、加快国家安全学及其学科理论研究和推进中国本土化国家安全学自主理论体系探究的新格局。总体国家安全观内涵不断丰富和深化,国家安全学研究对象和学科定位日益清晰明确,国家安全学理论本土化进一步彰显,国家安全学理论构建日趋完善,国家安全学一级学科建设稳步推进。虽然国家安全学一级学科建设起步较晚,国家安全学理论研究存在一些短板,但当今世界之变、时代之变和历史之变的步伐逐渐加快,中国面临的安全挑战前所未有,需要国家安全学理论研究有所作为,作出应有的历史贡献。为此,中国学界需要做“深”国家安全学基础理论研究,拓展国家安全学理论研究的厚度和深度;做“专”领域国家安全学理论研究,强化国家安全学理论研究的广度;做“强”工具国家安全学理论研究,凸显国家安全学理论研究的实效性。 展开更多
关键词 总体国家安全观 国家安全学 中国特色安全理论 回顾与展望
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部