期刊文献+
共找到887篇文章
< 1 2 45 >
每页显示 20 50 100
Digital Transformation:The Impact of e-CNY on Securities Institutions and Financial Systems in China
1
作者 Xinyue Mei 《Proceedings of Business and Economic Studies》 2024年第2期38-45,共8页
In recent years,the rapid advancement of emerging technologies such as big data,blockchain,and artificial intelligence has accelerated the transformation of currencies,shifting from materialization towards digitizatio... In recent years,the rapid advancement of emerging technologies such as big data,blockchain,and artificial intelligence has accelerated the transformation of currencies,shifting from materialization towards digitization and electronization.The e-CNY stands out as a prime example of China’s pioneering digital financial innovation globally.Governed by the central bank,it embodies the national agenda.As the e-CNY’s application field and reach expand,its relationship with the financial market grows increasingly intimate.As a significant participant in China’s financial landscape and a proactive responder to national policies,the securities industry is profoundly influenced by the e-CNY across various domains.Therefore,this paper undertakes a theoretical analysis of the e-CNY’s implementation within securities institutions,concluding that it will usher in a new paradigm for the entire financial system. 展开更多
关键词 e-CNY securities institutions Digital transformation
下载PDF
Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions
2
作者 Abdullah Saad AL-Malaise AL-Ghamdi Mahmoud Ragab 《Computers, Materials & Continua》 SCIE EI 2022年第8期3131-3144,共14页
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv... Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies. 展开更多
关键词 CYBERsecurity AUTHENTICATION BIOMETRICS security higher education institution deep learning
下载PDF
Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution
3
作者 Abdullah Saad AL-Malaise AL-Ghamdi Mahmoud Ragab +2 位作者 Maha Farouk S.Sabir Ahmed Elhassanein Ashraf A.Gouda 《Computers, Materials & Continua》 SCIE EI 2022年第8期3385-3399,共15页
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa... Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997. 展开更多
关键词 Higher security institutions intrusion detection system artificial intelligence deep neural network hyperparameter tuning deep learning
下载PDF
Effects of the New Two-child Policy On Family Old-age Security
4
作者 Li Cuiping Jiang Fei Yu Chunyan 《International English Education Research》 2015年第9期60-62,共3页
This paper analyzes the current situation of the aging population and low fertility rate.lt is found that the aging process is accelerated, the population growth potential is decreased, and the elderly dependency rati... This paper analyzes the current situation of the aging population and low fertility rate.lt is found that the aging process is accelerated, the population growth potential is decreased, and the elderly dependency ratio is higher.Secondly, this paper mainly analyzes the impact of the new two-child policy on family pension security from three aspects: population policy, family support and social security.There are two aspects of the effects, the positive effects are:improve fertility, reduce elderly dependency ratio, relieve population aging,enhance the family development: the negative effects are: tremendous pressure on public resources, further inequality in birth right, heavy economic pressure on the family.At last. this paper puts forward the constructive countermeasures against the problems of the policy and the was out of the family old-age security. 展开更多
关键词 The New Two-Child Policy Family old-age security Fffect Analysis
下载PDF
Changes and Adjustments:The Rule of Law Response to Medical Institution Data Compliance
5
作者 Long Keyu 《科技与法律(中英文)》 CSSCI 2024年第5期110-122,共13页
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int... Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed. 展开更多
关键词 medical institution data privacy protection data security compliance governance
下载PDF
Introduction to The Information Security Research Institute
6
《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期338-338,共1页
关键词 security Introduction to The Information security Research institute
下载PDF
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
7
作者 Adam Aloyce Semlambo Didas Malekia Mfoi Yona Sangula 《Journal of Computer and Communications》 2022年第11期29-43,共15页
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har... All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy. 展开更多
关键词 Information Systems Information security Public Higher Learning institutions IAA
下载PDF
Security Guarantee of Agriculture Industry Based on the Improvement of Legal System of Peasant Specialized Cooperative 被引量:1
8
作者 DU Wen-jiao,REN Da-peng College of Humanities and Development Studies,China Agricultural University,Beijing 100083,China 《Asian Agricultural Research》 2011年第3期104-108,共5页
Current status of several management models of the agriculture industry is introduced,as well as its impacts on industrial security.The management models are mainly the enterprise-like operation model,"enterprise... Current status of several management models of the agriculture industry is introduced,as well as its impacts on industrial security.The management models are mainly the enterprise-like operation model,"enterprise + peasant household" model,small-scale peasants' operation model,and peasant specialized cooperative model.Functions of peasant specialized cooperative in ensuring the security of agricultural industry are introduced,which are enhancing the industrial security by organization degree,promoting the industrial security by scale economy formed by cooperative organizations,fully utilizing the resources by the factor allocation capability,and ensuring the industrial security by industrial chain improvement.Development predicaments of the peasant specialized cooperative at present are analyzed,such as small scale,poor economic benefits,and non-standard operation.Analysis shows that institutional absence is the main reason causing these predicaments.And suggestions on improving the cooperatives system in the Law of the People's Republic of China on Peasants Specialized Cooperatives are put forward,in order to better ensure the security of agriculture 展开更多
关键词 COOPERATIVE Management model of the AGRICULTURE in
下载PDF
Analysis on the Current Situation of Social Security for Landless Farmers Under the Background of Urbanization
9
作者 Taipeng Wang 《Proceedings of Business and Economic Studies》 2021年第4期31-35,共5页
With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to r... With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to realize the rapid development of regional economy and form a relatively stable social order,there is a need to improve the social security system of farmers so as to ensure that more people acquire basic social security rights.On this basis,based on the background of urbanization,this article studies the social security status of landless farmers in R city,and analyzes the old-age security as well as the medical insurance of landless farmers in R city. 展开更多
关键词 Landless farmers old-age security Medical insurance
下载PDF
Institutional Arrangement to Improve Farmers' Enthusiasm
10
作者 YANG Li-yun Sichuan University of Arts & Science,Dazhou 635000,China 《Asian Agricultural Research》 2011年第8期54-57,64,共5页
On the basis of summarizing theories related to public goods,with the aid of trend curve of China's annual grain yield from 1978 to 2010,in combination with grain policies at that time,empirical analysis is carrie... On the basis of summarizing theories related to public goods,with the aid of trend curve of China's annual grain yield from 1978 to 2010,in combination with grain policies at that time,empirical analysis is carried out on institution as key factor influencing the farmers' enthusiasm,showing that there is highly positive correlation between institutional change and grain production.In order to raise farmers' production enthusiasm and ensure the national grain security,this paper puts forward appropriate countermeasure systems from the point of view of innovating grain production policies.The countermeasure systems include:firstly,innovate agricultural operation institution;secondly,improve agricultural personnel cultivation mechanism;thirdly,complete financial investment system;fourthly,set up grain security protection system;and finally,build risk support system. 展开更多
关键词 Farmers’ ENTHUSIASM institutionAL arrangement Grai
下载PDF
The development and prospects of China's old-age security system 被引量:1
11
作者 华迎放 《Social Sciences in China》 2009年第1期185-196,共12页
On the basis of a description of the framework of China's urban and rural old-age security system and major security policies, this study examines the operation of the old-age security system currently in effect. Fro... On the basis of a description of the framework of China's urban and rural old-age security system and major security policies, this study examines the operation of the old-age security system currently in effect. From the point of view of setting up a system that would cover both urban and rural areas, we can see problems with the current system, including a development imbalance between urban and rural social security, wide gaps between different groups, the absence, fragmentation and artificial segmentation of the social security system, blurred government responsibility, etc. The paper goes on to propose establishing an old-age subsidy for urban and rural residents without income security, improving basic old-age insurance for enterprise employees in urban areas, reforming the superannuation schemes of government organizations and public institutions, and setting up rural oldage insurance. 展开更多
关键词 old-age security system basic old-age insurance system for urban enterprise employees superannuation scheme rural old-age insurance old-age subsidy
原文传递
Review of Techniques for Integrating Security in Software Development Lifecycle
12
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
下载PDF
New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions
13
作者 WANG Mingzheng WANG Yigjie +2 位作者 WAVG Tianyu HOU Linzao LI Mian 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第6期689-699,共11页
Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in ... Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management. 展开更多
关键词 information security management information technology(IT)systems analytic hierarchy process(AHP) educational institution
原文传递
国家安全战略视域下的美国对华制度制衡及影响 被引量:3
14
作者 夏立平 《亚太安全与海洋研究》 CSSCI 北大核心 2024年第2期36-52,I0002,I0003,共19页
形成于21世纪初的制度制衡理论,实际上已成为后冷战时期美国外交政策特别是对华政策的主导理论之一。从美国国家安全战略的角度,可以发现自2001年以来美国历届政府制约中国的因素不断上升,其对华实施的制度制衡方略经历了从包容性向排... 形成于21世纪初的制度制衡理论,实际上已成为后冷战时期美国外交政策特别是对华政策的主导理论之一。从美国国家安全战略的角度,可以发现自2001年以来美国历届政府制约中国的因素不断上升,其对华实施的制度制衡方略经历了从包容性向排他性的转变。小布什政府采用试图将中国纳入美国主导的国际体系的包容性制度制衡方略,奥巴马政府则采用两面下注的混合型对华包容性制度制衡方略。特朗普政府主要利用美国国内法律和制度对华进行排他性制度制衡,而拜登政府采用“小圈子”对华进行排他性制度制衡。拜登政府在高科技领域对华实行制度制衡,企图在某种程度上迟滞中国高科技发展,客观上却促使中国自立自强形成尽可能完整的高科技生产链,对美国自身高科技产业和国内经济也产生“反噬”效应,无法从根本上改变经济全球化大趋势。 展开更多
关键词 美国 国家安全战略 制度制衡 拜登政府 对华政策
下载PDF
国际安全制度与总体国家安全:一种理论分析 被引量:1
15
作者 宋伟 《国际安全研究》 CSSCI 北大核心 2024年第3期36-54,158,共20页
一国的总体国家安全虽然涉及方方面面,但国内政治和国际政治是贯穿这些领域的两条主线。国际安全制度构成了维护各领域国家安全的重要依托:国际安全制度能够塑造各国国家安全的外部环境,影响不同领域的国家安全利益,促进不同领域的国际... 一国的总体国家安全虽然涉及方方面面,但国内政治和国际政治是贯穿这些领域的两条主线。国际安全制度构成了维护各领域国家安全的重要依托:国际安全制度能够塑造各国国家安全的外部环境,影响不同领域的国家安全利益,促进不同领域的国际安全合作,从而有利于实现各国的总体国家安全。二战结束以来,主权平等、不干涉内政和不使用武力解决国际争端等基本原则已经大大改善了全球安全环境,构成中小国家主权独立和国家安全的重要保障。同时,普遍性的国际安全原则和规范也可以应用到各个具体领域的安全规则的构建,从而直接影响各国维护相关领域国家安全的能力与利益。多边安全联盟会带来高水平的国际安全合作,促进联盟成员的总体国家安全,但也可能减损其他国家的安全水平,从而导致冲突。纯粹的区域性集体安全制度在提升各成员国家安全水平的同时,也具有合作安全和共同安全的优点。各国应该积极参与国际安全制度的构建,并有效运用国际安全制度提升本国的国家安全水平。 展开更多
关键词 国际安全制度 总体国家安全 国家安全能力 国际安全合作
下载PDF
基于医保视角的公立医疗机构医用耗材准入策略研究 被引量:1
16
作者 严毅 郭武栋 +3 位作者 周蒙 张弛 徐文科 王柱军 《中国医学装备》 2024年第5期118-122,共5页
目的:基于医保管理角度,探讨公立医疗机构医用耗材准入机制,完善医用耗材准入顶层设计。方法:从医保监管、医保贯彻执行编码标准(简称贯标)、医保集采、医疗服务项目及价格和医保评审技术5个维度,设计医用耗材准入流程并提出针对性策略... 目的:基于医保管理角度,探讨公立医疗机构医用耗材准入机制,完善医用耗材准入顶层设计。方法:从医保监管、医保贯彻执行编码标准(简称贯标)、医保集采、医疗服务项目及价格和医保评审技术5个维度,设计医用耗材准入流程并提出针对性策略。结果:从加强医用耗材医保监管、落实医用耗材医保贯标、推进医用耗材医保集采落地、推动医保医疗服务项目和医疗服务价格项目发展以及积极开展卫生技术评估5个维度设计医用耗材准入流程,提出加强医保业务学习和培训、打造院内医用耗材准入多学科协作管理体系、探索建立适合我国医疗机构的卫生技术评估方法,推进医用耗材准入信息一体化建设的医用耗材准入针对性策略。结论:基于医保管理角度从理论上着重强调医保在公立医疗机构医用耗材准入中的核心位置,为医用耗材准入研究提供新思路,丰富医用耗材准入管理维度。 展开更多
关键词 公立医疗机构 医疗保障 医用耗材 医用耗材准入
下载PDF
粮食安全视角下农田灌溉系统的功能演进、现实困境与治理对策 被引量:1
17
作者 穆月英 王镜淳 《中州学刊》 CSSCI 北大核心 2024年第5期32-40,共9页
粮食安全是建设农业强国的必然要求,农田灌溉系统是保障粮食安全的基础,二者在乡村社会的交织,体现为农田灌溉系统的多重属性。以“物质-技术-制度”的多重属性为理论基础,探究农田灌溉系统的对粮食安全的作用机制,明确农田灌溉系统的... 粮食安全是建设农业强国的必然要求,农田灌溉系统是保障粮食安全的基础,二者在乡村社会的交织,体现为农田灌溉系统的多重属性。以“物质-技术-制度”的多重属性为理论基础,探究农田灌溉系统的对粮食安全的作用机制,明确农田灌溉系统的功能演进和现实困境的本质,对于实现农业可持续发展和乡村治理有效具有重要意义。我国农田灌溉系统的功能演进体现在“数量-质量-生态”物质属性功能的渐进发展、“水-能-粮耦合”技术属性功能的体系建构、“多元参与”制度属性功能的建设格局,现实困境表现为气候变化引致的设施脆弱性困境、“大国小农”引致的技术推广困境、主体缺位和机制失灵引发的管护困境。为此,全方位夯实粮食安全根基,必须以综合可持续为目标建设农田灌溉设施,以产权和价格机制为杠杆提升农田灌溉系统市场化供给水平,以协同治理为抓手加强农田灌溉系统管护,从而促进农田灌溉系统的效能发挥。 展开更多
关键词 粮食安全 农田灌溉系统 “物质-技术-制度”属性 治理对策
下载PDF
农地确权与农户政治信任:基于中央和基层组织的分析 被引量:1
18
作者 陈卓 胡新艳 陈相泼 《华中农业大学学报(社会科学版)》 CSSCI 北大核心 2024年第1期164-177,共14页
农地确权的经济影响效应受到了学界的广泛关注,但鲜有研究关注农地确权政策的政治效应。基于3期农地确权追踪调查数据,利用广义DID模型评估农地确权对农户政治信任水平的影响。结果表明:农地确权使农户的中央级政治信任、村级政治信任... 农地确权的经济影响效应受到了学界的广泛关注,但鲜有研究关注农地确权政策的政治效应。基于3期农地确权追踪调查数据,利用广义DID模型评估农地确权对农户政治信任水平的影响。结果表明:农地确权使农户的中央级政治信任、村级政治信任分别提升0.142个单位和0.215个单位。上述结果在考虑平行趋势、样本随机性、控制潜在遗漏变量、替换被解释变量、更换计量模型后依然稳健。机制分析表明,农地确权通过降低地权权益的保护成本、提升盘活农地产权收益两条途径对农户政治信任产生影响。进一步分析显示:农地确权执行规范程度越高,不影响农户的中央级政治信任,但会显著提升农户的村级政治信任水平。由此认为,农地确权除产生经济影响外,也是政府投资农户政治信任的有效途径。 展开更多
关键词 公共政策 制度绩效 农地确权 产权保障 政治信任
下载PDF
中国能源应急管理体系演进、问题及政策建议
19
作者 郭海涛 周玲 +3 位作者 周淑慧 宿洁 王军 梁严 《国际石油经济》 2024年第7期27-39,共13页
能源应急管理体系的构成与演变决定了一个国家应对能源突发事件的能力和效率。新中国成立后,中国能源应急管理体系经历了单灾种专项应急管理体系(1949—2003年)、以“一案三制”为核心的应急管理体系(2003—2012年)、以总体国家安全观... 能源应急管理体系的构成与演变决定了一个国家应对能源突发事件的能力和效率。新中国成立后,中国能源应急管理体系经历了单灾种专项应急管理体系(1949—2003年)、以“一案三制”为核心的应急管理体系(2003—2012年)、以总体国家安全观为统领的应急管理体系(2012年至今)3个发展阶段。总体来看,中国现阶段能源应急管理体系建设还存在大安全大应急理念有待加强、能源综合应急管理体制需要模式重构、应急法制体系亟待完善、全流程应急管理机制和应急保障能力急需提高等一系列问题。建议推进能源战略安全理念,贯彻大安全大应急新思想;完善集中统一、高效权威的能源综合应急管理体制;加强能源应急管理机制建设;健全能源应急管理法制与标准体系;强化能源应急保障体系。 展开更多
关键词 能源安全 应急管理体系 国家安全 体制 机制 法制
下载PDF
高职院校校园安全突发事件应急管理对策研究
20
作者 金秋平 《天津职业院校联合学报》 2024年第7期81-87,共7页
加强高职院校突发事件应急管理能力,维护校园安全稳定,是办好人民满意的教育的大前提。本文旨在对天津市高职院校校园安全突发事件应急管理的现状进行系统性研究,找出问题,进而有针对性地提出应对策略,推动我市高职院校校园安全突发事... 加强高职院校突发事件应急管理能力,维护校园安全稳定,是办好人民满意的教育的大前提。本文旨在对天津市高职院校校园安全突发事件应急管理的现状进行系统性研究,找出问题,进而有针对性地提出应对策略,推动我市高职院校校园安全突发事件应急管理体系规范化。 展开更多
关键词 高职院校 校园安全 突发事件 应急管理
下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部