首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
电力系统的信息安全体系和策略   总被引:1,自引:0,他引:1  
周晓芬 《科技广场》2007,(5):113-115
本文论述了电力企业的信息安全问题。信息安全包括物理层面、网络层面、系统层面、应用层面和管理层面的安全,为了保障信息安全,必须搭建信息安全体系和制定相应的策略。  相似文献   

3.
浙江省位于信息经济领域的前列,本文选取了浙江省2001-2016年间信息经济领域创新政策文本,基于政策演化理论,通过文本量化分析,从政策主体、政策目标、政策工具三个维度分析浙江信息经济领域创新政策的演进特点。研究发现:政策主体的合作广度不断增加,合作强度有待加强;两化融合的政策目标受到重视,对信息基础设施的政策目标关注不够;各类政策工具的使用趋于均衡,金融政策工具所占比例稍显落后,并在此研究基础上提出相关政策建议。  相似文献   

4.
我国排污权交易企业参与现状与对策研究   总被引:2,自引:0,他引:2  
环境问题是关系我国可持续发展的关键问题,是经济结构调整工作的重要内容。排污权交易作为一项重要的环境管理市场化手段,在我国部分省市进行了试点实践,出现了企业参与度低、市场交易量少的问题,严重影响了排污权交易政策作用的发挥。本文全面分析了我国排污权交易的企业参与现状,通过政府政策、市场机制、企业决策三个环节研究了产生问题的原因,以提高企业参与度为目的,从完善政府职能,健全市场机制,提升企业能力这三个方面提出了对策建议。  相似文献   

5.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

6.
基于1978-2020年上海市380份科技人才政策分析结果和276份科技人才问卷结果,以目标-工具-对象为框架,对比政策供给和人才需求两个层面评估上海科技人才政策效果。研究发现:尽管上海科技人才政策频发,政策供给与人才需求的匹配效果并不令人满意。人才流动、交流和评价的目标关注不够;需求型工具、信息支持和住房保障政策不足;政策对技术人员、科研人员和青年人才支持不足,过于重视外国人才而忽视本土人才的培养和激励。基于以上供需差异问题,提出针对性政策建议。  相似文献   

7.
中国水价政策实证研究——以合肥市为例   总被引:1,自引:0,他引:1  
周芳  马中  郭清斌 《资源科学》2014,36(5):885-894
针对我国水资源短缺、水污染严重及现行水价政策存在的诸多问题,本文提出了我国水价政策的基本原则和基于环境无退化的水价定价方法,在合肥市进行了实证研究,分析了水价改革的经济和环境效益,为我国水价政策的改革和完善提供依据和参考。研究表明,水污染物排放标准和水价标准要保证环境质量不退化;水价政策的定价原则包括环境无退化原则、全成本定价原则、公共和商业分置原则;环境无退化的水价定价方法具有显著的经济效益和环境效益,合肥市的水费收入增加34.17~55.47亿元,实现氨氮减排0.57~0.89万t,有利于实现水价政策目标,企业、居民和政府都可以承受基于环境无退化原则的水价改革;水价政策执行的监督管理亟待加强,否则水价政策设计再好也只是纸上谈兵;水价定价权应该下放到地方政府,国家对水价政策制定给予宏观指导。  相似文献   

8.
针对目前酒后驾车危害性日趋严重,而交警手持式呼气检测设备又不能方便、全面的检查预防酒驾,设计了一款基于单片机和手机的车载防酒驾系统。采用酒精阵列传感器检测,摄像头拍照对比,GPS模块定位来获取酒驾信息。通过蓝牙传输和手机酒驾APP发送信息,使酒驾信息得到及时的处理。该系统具有简单方便、灵敏、安全等的特点,可以有效杜绝酒后驾驶的发生。  相似文献   

9.
本文论述了Google如何收集用户信息,黑客如何通过高级操作符获取用户的敏感信息并通过Google搜索服务器漏洞信息进行攻击,为用户正确使用Google进行了警示。文章最后提出了通过提高用户防范意识,个人隐私技术手段保护,服务器保护,和政策法规保护等方面来防范Google黑客对用户信息的侵犯。  相似文献   

10.
Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy policies must address not only collection and access to transactional information, but also its timely disposal. One unintended side effect of data retention is the disappearance of social forgetfulness, which allows individuals a second chance, the opportunity for a fresh start in life. We examine three domains in which social policy has explicitly recognized the importance of such a principle: bankruptcy law, juvenile crime records, and credit reports. In each case, we frame the issue in terms of the social benefits of forgetfulness, rather than in terms of individual privacy protection. We examine how different policy approaches to privacy might handle the retention of data and propose a comprehensive policy that includes a variety of strategies. The broad conclusion of the article is that data retention and disposal should be addressed as a part of a broader and comprehensive policy approach, rather than in a piecemeal fashion or as an afterthought.  相似文献   

11.
Ethnographic methods and geographic information systems were used to investigate the extent, causes and consequences of telephone disconnection in Camden, NJ. The results have significant implications for public policies intended to promote universal telephone penetration. Universal service is usually perceived as an issue for rural areas and the elderly, but the most extensive pockets of low telephone penetration are found in inner cities, where the problem is associated with the young, the transient, and ethnic minorities. The basic monthly rate paid by subscribers is usually thought to be the most important factor affecting affordability, but the data suggest that most marginal users are driven off the network by usage-related costs, and more generally by the problem of credit-worthiness. Given prevailing consumption patterns in low-income urban areas, 'electronic redlining' seems less of a threat than that poor Americans will, upon exposure to the advanced features of the national information infrastructure (NII), buy services that they cannot afford. Intellectuals and policy analysts value telephone service more than cable television service, but residents of inner cities frequently do not agree with this evaluation. In reformulating universal service policy, we must take account of the growing heterogeneity of telecommunications services, and keep in mind the importance of credit risk as a factor affecting the public's ability to access and use telecommunication networks.  相似文献   

12.
基于社会建构理论政策研究范式的应用,可以发现中国交通政策的目标旨在实行"公交优先"的发展战略,以保障广大居民出行的利益。但是在追求高效率配置交通资源,以促进经济增长的政策实践层面上,"公交优先"的发展战略没有落到实处,广大居民的出行利益,特别是弱势群体的出行需要没有得到很好的体现和保障。相反,私家车使用者在占有较优越的交通资源的同时,却让占人群大部分的公共交通、自行车、步行交通方式使用者承担着不应该承担的负外部性效用。如何加强对私家车交通方式的管理和控制,以确保广大居民的出行利益,从而充分体现社会的公平,无疑决定着交通政策进一步变革的方向。  相似文献   

13.
大数据时代的信息安全管理体系研究是企业信息安全保障体系建设的重要组成成分,对完善企业信息安全体系建设,保障企业信息安全,提高企业信息化水平具有重要意义。针对大数据环境下企业信息安全管理体系进行理论框架和应用策略研究,分析安全管理现状,指出国内企业在大数据安全管理方面存在不足;探索大数据云安全管理体系构建,给出大数据云安全体系框架;研究大数据安全管理体系应用过程实施策略,给出过程模型及具体工作实施规划。为企业建立健全网络信息安全管理体系提供借鉴。  相似文献   

14.
Judging by the large R&D-active companies that have slimmed down their research labs in recent years, it would seem that corporate research is increasingly managed as an economic asset that is predominantly driven by market forces and ruled by IPR strategies. Has this development significantly affected industry’s basic research and interactions with research communities in the public sector? This paper examines the global trends in an underdeveloped source of information on corporate science: their research articles published in the international scientific and technical journals.Statistical analysis of some 290,000 corporate research articles published in 1996-2001 indicate that, contrary to large increases in patenting and growth in patent citations to research literature, the numbers of research articles that list author affiliate addresses in the corporate sector have declined steadily, especially for those articles authored exclusively by industrial researchers. More detailed analysis of trends in the bio-pharmaceuticals sector and semiconductors sector show sector-specific publication trends and patterns related to specifics of their innovation processes.Overall, these observations provide factual evidence indicating that corporate research is in an on-going process of structural change characterised by a stronger emphasis on the appropriation and commercialisation of in-house research results.  相似文献   

15.
Abstract

Australia's treatment of information technology (IT) has vacillated between two policy directions: laissez faire, market directed strategy on the one hand, and strong government interventionist, plan directed strategy on the other. The resultant policy mix is more a collection of individual initiatives than a coherent strategy. It produces conflict between initiatives aimed at developing indigenous information industries and those improving the productivity and competitiveness of all industry by encouraging the wider application of IT. Unlike its East Asian neighbors, Australia does not have a powerful, independent economic planning agency capable of creating and implementing industrial and technology policy. Policies must be developed through the give and take of a democratic political process, a process that can lead to fragmented, uncoordinated policies based on bureaucratic inertia, the demands of special interest groups, and short‐term political considerations, rather than long‐term strategic plans. The future of IT policy in Australia will depend upon the kinds of consensus that can be achieved on the role of IT in economic development. It will also depend on the government's skill in implementing policy and on the reactions of the private sector to whatever policies emerge.  相似文献   

16.
随着计算机技术的日益普及,特别是网络与数据库的迅速发展,信息系统的安全问题已日益突出.在实际应用中,访问控制是实现安全策略的系统安全技术,它管理所有资源的访问请求,即根据安全策略的要求,对一个资源访问请求做出是否许可的判断.它能够有效防止非法用户访问系统资源和合法用户非法使用资源.结合科学数据共享平台中访问控制模型的要求,通过比较目前几种主要模型,总结出各自优缺点,最后根据科学数据共享平台的特点,将MAC和ERBAC这两种模型结合应用于该平台.  相似文献   

17.
Dan Breznitz 《Research Policy》2007,36(9):1465-1482
The Israeli software industry has been an indisputable success since the 1990s. This paper utilizes the development of the Israeli industry to empirically explore the argument of the horizontal technology policies (HTP) framework on the impact of neutral science and technology policies on industrial development. The paper micro-analyzes the Israeli software industry and compares its unique historical development pattern with other emerging countries. It describes (1) the rise of this industry as one outcome of the development of the entire IT industry in Israel; (2) the reasons behind the industry's ability to conduct and focus on intensive R&D activities; (3) the industry's success in becoming an integral part of the American financial and IT industrial sector. It argues that only by understanding the intricate co-evolution of state-industry relations and the specific HTP regime employed in Israel can we understand the current behavior, conditions, business models, and capability of the industry. Therefore, the argument is that Israel's industrial science and technology developmental agencies did not aim at creating a software industry, but rather at the development of novel products R&D-based industry. However, the software industry has been significantly influenced throughout its development by the specific system of innovation which these policies fostered. Thus, the paper argues that public policy is one of the main reasons why the industry has focused almost entirely on product R&D activities. In addition, the paper suggests that the state's science and technology industrial policy has propelled the industry into its intimate relationship with the American financial sector.  相似文献   

18.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

19.
李健 《软科学》2014,(4):25-28
运用结构方程建模方法,以EMBA学员中企业高管人员为调研对象,搜集20082010年269家企业的数据资料并进行统计分析与检验,对企业政治战略、政治社会资本与政策优惠之间的关系进行了实证研究,结果发现:企业政治战略对构建政治社会资本和获取政治资源都具有促进作用,但不同的政治行为对政策优惠产生作用的路径不同;企业政治战略对政策优惠的作用是间接的,通过提升政治社会资本相关维度水平实现政策优惠的获取。  相似文献   

20.
农业政策和环境政策的相互影响及协调发展   总被引:2,自引:0,他引:2  
汪宁  叶常林  蔡书凯 《软科学》2010,24(1):37-41
讨论了我国现有农业政策和环境政策的相互影响,分析了在不影响现有农业政策目标的情况下,农业政策和农村环境政策的协调发展形式:农业环境政策一体化。政策决策者必须在农业污染控制、粮食安全和农民收入之间寻找平衡点,通过改进制度安排,强化与农业投入品的使用有关的规定,提供咨询和推广服务,修改与产品标准有关的规定,实施环境成本分担以及加强监测和研究活动,同时借鉴发达国家的实践,在农民收入不受影响或者部分少量减少、增加农民整体收入的同时,减少污染并改善农村环境质量。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号