期刊文献+
共找到950篇文章
< 1 2 48 >
每页显示 20 50 100
Personality Traits and Cognitive Determinants——An Empirical Investigation of the Use of Smartphone Security Measures 被引量:6
1
作者 Jorg Uffen Nico Kaemmerer Michael H.Breitner 《Journal of Information Security》 2013年第4期203-212,共10页
In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and... In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed. 展开更多
关键词 security Measures personalITY TRAITS BEHAVIORAL Models Mobile security Smartphones
下载PDF
Personalities and health in older cat and dog owners: A HUNT-study
2
作者 Ingela Enmarker Ove Hellzen +1 位作者 Knut Ekker Anne-Grethe TBerg 《Health》 2013年第9期1449-1454,共6页
The aim of this population study was to identify personality traits among older (>65 years) male and female owners of cats and dogs and to compare their general health status in relation to their personality. Furth... The aim of this population study was to identify personality traits among older (>65 years) male and female owners of cats and dogs and to compare their general health status in relation to their personality. Further, the aim was to examine whether current cat and dog ownership could be predicted by the owners’ personality and health. Data were collected from the North-Tr&#248ndelag Health Study (HUNT) in Norway. Included were a total of 1897 cat or dog owners between the ages of 65 years and 101 years. The results showed that there were a higher proportion of introverted male cat owners than extraverted ones. Moreover, a majority of women with cats reported that their health was not good. Furthermore, female cat owners who displayed higher scores on neurotic traits experienced significantly poorer health compared to those female cat owners that experienced good health. The same was true for female cat owners who considered themselves to be introverted. Neither personality nor health could predict pet-ownership, but it was more likely for older individuals (80-101 years) to own a cat than a dog. This study has shown that human personality is associated with cat and dog ownership, but there are other factors connected with pet ownership as well. 展开更多
关键词 Pet Ownership Cats and dogs HEALTH personalITY Old Age Population Study
下载PDF
On the Role of Security in the System of Personal Values:Are Conservatives Prioritizing Security?
3
作者 Ingwer Borg 《Macro Management & Public Policies》 2023年第2期1-13,共13页
Security is a value contained in most theories of personal values.Yet,while the relations among the most basic values are clear and reliable,the role of security in the system of values remains ambiguous.People strivi... Security is a value contained in most theories of personal values.Yet,while the relations among the most basic values are clear and reliable,the role of security in the system of values remains ambiguous.People striving for security are often also striving for tradition and conformity but sometimes they are focusing more on other values(such as health values,for example).Based on eight representative surveys(N=24,000)in several German cities between 1998 and 2022,the author shows that when measuring security without suggesting a particular meaning of this notion,security takes a relatively central position within the system of values and their components(shown by multidimensional scaling,MDS).People striving for security also emphasize the importance of law and order,working hard,and having a good family life as guiding principles in their lives.Conformity is not that important for them,and having an exciting life is even negatively correlated.Age has little impact on the MDS structure of values and their components,even though people exhibit substantial changes in the relative weights they assign to many values as they get older. 展开更多
关键词 personal values security Value circle Age GENDER Multidimensional scaling
下载PDF
Transborder Personal Security of Chinese Nationals and Its Legal Safeguard
4
作者 GUO NI is a lecturer at the Taiyuan Police Academy 《The Journal of Human Rights》 2012年第2期10-12,共3页
Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try... Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country. 展开更多
关键词 Transborder personal security of Chinese Nationals and Its Legal Safeguard security
下载PDF
基于Java安全类库Spring Security的信息系统安全功能实现
5
作者 孙全玲 洪赐福 严辉 《工业控制计算机》 2024年第5期104-105,108,共3页
信息系统的安全是个不容忽视的问题,在基于Spring Boot框架技术开发个人博客系统的基本功能的基础上,使用Spring Security框架技术实现加密、认证与权限控制三类系统安全功能。
关键词 个人博客系统 Spring Boot Spring security
下载PDF
Achieve Personalized Anonymity Through Query Blocks Exchanging 被引量:13
6
作者 Chunguang Ma Lei Zhang +2 位作者 Songtao Yang Xiaodong Zheng Pinhui Ke 《China Communications》 SCIE CSCD 2016年第11期106-118,共13页
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency. 展开更多
关键词 cyberspace security location-based services collaborative users personalized anonymity query and location privacy
下载PDF
Effects of Social Security Spending on Income Distribution and Poverty Reduction in China 被引量:22
7
作者 Yue Ximing Zhong Cong 《China Economist》 2020年第4期100-131,共32页
Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reducti... Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents. 展开更多
关键词 income distribution market income personal income tax social security spending poverty reduction through social protection
下载PDF
Security Analysis of Smart Speaker: Security Attacks and Mitigation
8
作者 Youngseok Park Hyunsang Choi +1 位作者 Sanghyun Cho Young-Gab Kim 《Computers, Materials & Continua》 SCIE EI 2019年第9期1075-1090,共16页
The speech recognition technology has been increasingly common in our lives.Recently,a number of commercial smart speakers containing the personal assistant system using speech recognition came out.While the smart spe... The speech recognition technology has been increasingly common in our lives.Recently,a number of commercial smart speakers containing the personal assistant system using speech recognition came out.While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants,but there have been little mentions of the smart speakers in security aspects.As the smart speakers are becoming the hub for home automation,its security vulnerabilities can cause critical problems.In this paper,we categorize attack vectors and classify them into hardware-based,network-based,and software-based.With the attack vectors,we describe the detail attack scenarios and show the result of tests on several commercial smart speakers.In addition,we suggest guidelines to mitigate various attacks against smart speaker ecosystem. 展开更多
关键词 Smart speaker personal assistant system IoT security
下载PDF
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
9
作者 Bogdan Denny Czejdo Erik M. Ferragut +1 位作者 John R. Goodall Jason Laska 《International Journal of Communications, Network and System Sciences》 2012年第9期593-602,共10页
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, b... The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our proposed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data. 展开更多
关键词 CYBER security Network INTRUSION ANOMALY Detection Data Warehouses Aggregation personalIZATION Situational Understanding
下载PDF
Fog-Based Secure Framework for Personal Health Records Systems
10
作者 Lewis Nkenyereye S.M.Riazul Islam +2 位作者 Mahmud Hossain MAbdullah-Al-Wadud Atif Alamri 《Computers, Materials & Continua》 SCIE EI 2021年第2期1937-1948,共12页
The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patie... The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’repositories located in the cloud.The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency,scalability and bandwidth.Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers.Assuming a massive demand of PHR data within a ubiquitous smart city,we propose a secure and fog assisted framework for PHR systems to address security,access control and privacy concerns.Built under a fog-based architecture,the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption(CP-ABE)to guarantee confidentiality and fine-grained access control within the system respectively.We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy.We provide the analysis of the proposed framework in terms of security and performance. 展开更多
关键词 Fog computing personal health records ciphertext attribute based encryption secure communications
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
11
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 Information security data privacy epidemic prevention and control personal privacy protection
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
12
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 personal Information Protection Law Privacy security Privacy protection will
下载PDF
生成式人工智能个人信息安全挑战及敏捷治理 被引量:9
13
作者 邹开亮 刘祖兵 《征信》 北大核心 2024年第1期41-50,57,共11页
生成式人工智能秘密收集个人敏感数据,冲破“知情同意”原则和“最小必要”原则的限制,或将使信息关联违法高发。生成式人工智能信息收集行为主动、收集内容全面、泛化能力强劲,对“知情同意”原则和“最小必要”原则带来严重挑战。宏... 生成式人工智能秘密收集个人敏感数据,冲破“知情同意”原则和“最小必要”原则的限制,或将使信息关联违法高发。生成式人工智能信息收集行为主动、收集内容全面、泛化能力强劲,对“知情同意”原则和“最小必要”原则带来严重挑战。宏观层面,我国现有民事法律无力于数据安全治理,刑事法律缺乏明确的违法计量标准,由行政法规挑起数据法治大梁。微观层面,我国现有法律规范体系对被侵权人加以不合理的举证义务,司法救济路径单一,不利于权利救济。选择风险控制路径,从算法协议透明化、治理场景化和多方位协同化应对信息关联违法等方面展开制度构建,引入个人敏感数据单独监管制度和预防性公益诉讼制度破解该困局。 展开更多
关键词 生成式人工智能 个人信息安全 敏捷治理 预防性公益诉讼
下载PDF
我国残疾人社会保障与关爱服务的系统性优化研究——以需要为本的社会政策为视角 被引量:3
14
作者 林闽钢 《残疾人研究》 CSSCI 2024年第1期5-10,共6页
我国残疾人社会政策进入优化发展新阶段,将系统思维贯彻至残疾人社会政策优化是现实所需。文章提出残疾人社会政策以需要为本的目标导向,聚焦社会保障制度和关爱服务体系的目标集成、政策集成,推动残疾人兜底型和发展型社会政策的效果集... 我国残疾人社会政策进入优化发展新阶段,将系统思维贯彻至残疾人社会政策优化是现实所需。文章提出残疾人社会政策以需要为本的目标导向,聚焦社会保障制度和关爱服务体系的目标集成、政策集成,推动残疾人兜底型和发展型社会政策的效果集成,进一步提出建立健全残疾人家庭需求的多维识别和综合研判机制、持续追踪和动态预警机制,并围绕残疾人家庭的能力提升、残疾人关爱共同体建设这两个重点,来促进残疾人社会政策的协同。 展开更多
关键词 需要为本 残疾人社会政策 社会保障 关爱服务 系统性优化
下载PDF
个人信息的内生安全机制及其实现 被引量:3
15
作者 崔聪聪 《东方法学》 CSSCI 北大核心 2024年第1期96-107,共12页
个人信息处理的技术性、隐蔽性,使自上而下的“命令式”监管范式失效。数字时代,个人信息治理的重点是防止个人信息处理者滥用数据权力威胁国家安全、盘剥和操控个体。为有效控制数据权力这一风险源,国家应当督促个人信息处理者建立健... 个人信息处理的技术性、隐蔽性,使自上而下的“命令式”监管范式失效。数字时代,个人信息治理的重点是防止个人信息处理者滥用数据权力威胁国家安全、盘剥和操控个体。为有效控制数据权力这一风险源,国家应当督促个人信息处理者建立健全涵盖制度保障、组织程序保障的个人信息内生安全机制。通过监管激活个人信息处理者内部的自我规制机制,增强其内部的组织控制和行为规范化程度,消减个人信息处理的负外部性,实现个人信息处理的正和博弈。通过监管督促个人信息处理者强化内部治理机制,严格落实个人信息保护影响评估制度,遵从“三同步”要求将个人信息保护法规定的各项义务嵌入产品“代码”中,防控个人信息处理过程中妨害个人自主性、减损人格尊严的风险。 展开更多
关键词 个人信息处理 内生安全 负外部性 正和博弈 自我规制 数据权力
下载PDF
欧盟《数据法案》的规范要旨与制度启示:以个人信息保护为视角 被引量:1
16
作者 吴沈括 柯晓薇 《信息通信技术与政策》 2024年第1期2-6,共5页
欧洲议会于2023年11月9日表决通过《数据法案》。该法案明确符合欧盟价值观的数据流转利用和数据治理规则,保障欧洲单一数据市场中数据要素的安全高效流动,进一步平衡个人数据保护和数据自由流通之间的关系。在数字时代下,我国可以在个... 欧洲议会于2023年11月9日表决通过《数据法案》。该法案明确符合欧盟价值观的数据流转利用和数据治理规则,保障欧洲单一数据市场中数据要素的安全高效流动,进一步平衡个人数据保护和数据自由流通之间的关系。在数字时代下,我国可以在个人信息权益保护、统一协调的数据治理机制建立、技术互联与标准建设强化、数据安全保护监管优化等方面吸收借鉴其经验,在充分释放数据要素价值的同时,进一步完善数字时代数据安全与个人信息保护标准,规范数据的共享流通,保障数字经济安全有序发展。 展开更多
关键词 数据法案 个人数据保护 数据流动 数据安全
下载PDF
个人-组织匹配对员工信息安全违规行为的影响研究
17
作者 甄杰 陈琳 +1 位作者 董坤祥 谢宗晓 《管理案例研究与评论》 CSSCI 北大核心 2024年第2期320-332,共13页
频发的企业内部员工信息安全违规行为已成为组织管理中备受关注的问题。基于个人-组织匹配理论和社会交换理论,通过多案例研究方法,探究个人-组织匹配对员工信息安全违规行为的影响机理。研究发现:(1)在企业信息安全管理情境下,个人-组... 频发的企业内部员工信息安全违规行为已成为组织管理中备受关注的问题。基于个人-组织匹配理论和社会交换理论,通过多案例研究方法,探究个人-组织匹配对员工信息安全违规行为的影响机理。研究发现:(1)在企业信息安全管理情境下,个人-组织匹配的类型以一致性匹配为主、互补性匹配为辅;(2)个人-组织匹配的内容包括能力匹配、道德匹配、关系匹配和情绪匹配四个维度;(3)个人-组织匹配负向影响员工的信息安全违规行为,工作投入和组织承诺在两者关系中具有部分中介作用。上述研究结论可为企业完善信息安全管理策略、减少员工信息安全违规行为提供理论参考。 展开更多
关键词 个人-组织匹配 信息安全违规行为 工作投入 组织承诺
下载PDF
国家安全观视域下的美国数据隐私框架探析
18
作者 相丽玲 王高开 梁晨 《情报理论与实践》 CSSCI 北大核心 2024年第3期199-206,187,共9页
[目的/意义]从国家安全观视角,不仅能考察美国数据隐私保护框架的顶层设计,也能充分、全面、立体地揭示出美国数据隐私保护制度的整体趋势与优劣,为我国跨境数字贸易流通有效安全政策的制定提供理论依据。[方法/过程]运用文献研究与内... [目的/意义]从国家安全观视角,不仅能考察美国数据隐私保护框架的顶层设计,也能充分、全面、立体地揭示出美国数据隐私保护制度的整体趋势与优劣,为我国跨境数字贸易流通有效安全政策的制定提供理论依据。[方法/过程]运用文献研究与内容分析法,对美国新型国家安全观的基本构成与特点、数据隐私立法演化历程及其数据隐私框架进行了分析。[结果/结论]美国新型国家安全观下的数据隐私保护以数字经济优先发展为前提;其数据隐私整体框架,由国内和跨境数据保护与流动规则两个部分组成;美国数据隐私保护统一立法、跨境数据流动监管与治理现代化立法成为趋势;美国主导的同盟国跨境数据流动圈的形成,成为逆全球化的数据贸易壁垒;构建“共同价值观下的网络空间命运共同体”成为中国的必然选择。 展开更多
关键词 美国 个人数据 数据隐私 国家安全观 国家安全战略
下载PDF
英国警务数据开放过程中的数据安全风险防控体系研究
19
作者 张宁 强宇豪 《情报杂志》 CSSCI 北大核心 2024年第11期165-173,共9页
[研究目的]梳理英国警务数据开放过程中的数据安全风险防控政策、制度体系和具体防控措施,系统分析其特征特点,为我国警务数据安全风险防控提供参考和借鉴,以推进警务数据有序规范开放。[研究方法]采用文献研究方法,梳理英国政府和警察... [研究目的]梳理英国警务数据开放过程中的数据安全风险防控政策、制度体系和具体防控措施,系统分析其特征特点,为我国警务数据安全风险防控提供参考和借鉴,以推进警务数据有序规范开放。[研究方法]采用文献研究方法,梳理英国政府和警察机构在政府网站、警察网和地方警局门户网站上公开的警务数据管理法规、制度和政策,描述英国警务数据开放过程中的数据安全风险防控机构的职责权限和分工协作、数据安全风险防控原则、数据安全风险偏好分类分级制度,并具体分析英国警务数据开放过程中的数据安全风险类型和相应的防控举措等方面内容。[研究结论]研究发现,英国警务数据开放过程有序推进、有章可循;数据开放制度体系相对完善规范;安全风险管理方法操作性强,无论是在数据安全管理政策和制度体系方面,还是在个人隐私保护和数据安全风险管理方面,英国都进行了卓有成效的探索。在此基础上,提出我国警务数据开放过程中数据安全风险管理的政策建议。 展开更多
关键词 数据安全 数据开放 警务数据 数据安全风险 风险防控 个人隐私保护 英国
下载PDF
长期护理保险制度建立后的残疾人照护保障体系研究
20
作者 何文炯 纪楠楠 +3 位作者 刘来泽 何山 严晓斌 惠文 《残疾人研究》 CSSCI 2024年第1期24-32,共9页
经历了多年试点之后,长期护理保险制度将在全国普遍实施,其保障对象应当是包括残疾人在内的全体社会成员,这就要求重新谋划残疾人照护保障体系。事实上,评残标准中的“残疾”与长期护理保险中的“失能”内涵有所区别,面向残疾人的照护... 经历了多年试点之后,长期护理保险制度将在全国普遍实施,其保障对象应当是包括残疾人在内的全体社会成员,这就要求重新谋划残疾人照护保障体系。事实上,评残标准中的“残疾”与长期护理保险中的“失能”内涵有所区别,面向残疾人的照护服务内容与面向失能人员的护理服务内容也有所不同,而且残疾人及其家庭对照护服务费用的支付能力更弱,因而残疾人比一般社会成员有更多的照护保障需求。据此,需要对全社会的照护保障体系作出整体性安排。残疾人照护保障体系可以由两项制度构成:一是与其他社会成员一起参加长期护理保险,政府财政予以一定的保费补助;二是建立残疾人照护服务补助制度,由财政资金解决长期护理保险制度未能解决的那部分照护服务费用。现阶段的重点:一是将残疾人纳入长期护理保险保障范围;二是适度增加财政对残疾人照护保障的投入;三是创新残疾人照护服务供给机制;四是提高照护保障及相关服务的专业化水平。 展开更多
关键词 残疾人 照护保障 长期护理保险 残疾人照护服务补助
下载PDF
上一页 1 2 48 下一页 到第
使用帮助 返回顶部