首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
分别从期望成本最小和最坏情况成本最小两个方面研究了对供应链施加保护措施的节点选址模型和网络设计模型,以最大程度地降低中断风险的影响。  相似文献   

2.
论西部地区农村科技传播与普及体系建设   总被引:5,自引:0,他引:5  
农村科技传播与普及是农业科技发展的重要组成部分,尤其是面对西部地区农业科技成果转化速度慢、农民的科学素养亟待提高的现状,加强农村料技传播与普及体系就显得更加重要。目前,西部地区农村科技传播与普及体系事业有了较大的进展,但也存在若干问题,如体系不健全、科普工作不规范等。要建设一个以政府农技推广体系为主体的多元化科技传播与普及体系,需采取完善政策法规、加大投入力度、加快人才培养等措施。  相似文献   

3.
The paper examines how technology challenges conventional borders of national legal systems, as shown by cases that scholars address as a part of their everyday work in the fields of information technology (IT)-Law, i.e., computer crimes, data protection, digital copyright, and so forth. Information on the internet has in fact a ubiquitous nature that transcends political borders and questions the notion of the law as made of commands enforced through physical sanctions. Whereas many of today??s impasses on jurisdiction, international conflicts of law and diverging interpretations of statutes can be addressed by embedding legal safeguards in ICT and other kinds of technology, to overcome the ineffectiveness of state action by design entails its own risks, e.g., threats of paternalism hinging on the regulatory tools of technology. Rather than modelling people??s behaviour by design, the article suggests that design policies should respect individual and collective autonomy by decreasing the impact of harm-generating behaviour (e.g., security measures and default settings for data protection), or by widening the range of people??s choices (e.g., user friendly interfaces).  相似文献   

4.
李琳 《科教文汇》2011,(28):206-208
随着经济和网络的发展,域名与商标的冲突应运而生。本文区分驰名商标与非驰名商标,结合相关案例,简要探讨解决商标与域名冲突问题的策略和思路,以期对二者的保护和平衡提供借鉴。  相似文献   

5.
王守都 《情报杂志》2021,(3):104-111,38
[目的/意义]随着互联网及信息通讯技术的飞速发展,人类生活的各个领域与网络空间的联系日益密切,网络空间安全日益成为美国国家安全的重要议题。[方法/过程]借助安全叙述的理论框架,以17份《美国国家安全战略》为研究材料,通过话语分析的方式,探究美国政府是如何构建网络空间安全的安全叙述。[结果/结论]在此基础之上,归纳出美国网络空间安全的安全叙述的三大基本特征及深层动因,并结合这些特征对于未来大国权力博弈的领域作出展望。  相似文献   

6.
基于新木桶理论的数字图书馆网络安全策略研究   总被引:2,自引:0,他引:2  
唐开  王纪坤 《现代情报》2009,29(7):89-91
目前,随着数字图书馆的飞速发展,数字图书馆网络安全风险日益突出,图书馆必须不断加强网络系统的安全防护。文章根据新木桶理论的原理,探讨了加强数字图书馆网络安全防护的措施。  相似文献   

7.
[目的/意义] 公安情报共享中的利益冲突问题已成为阻碍公安大数据战略实施的重要障碍。基于价值共创理论,剖析当前我国公安情报共享价值形成机理与利益冲突协调机制,能够为合理协调公安情报共享中的利益冲突提供理论依据和参考。[方法/过程] 从主体共创价值视角,研究公安情报共享中的价值共创关系及价值实现过程,以价值共创全过程为视角认为投入、风险和收益构成了公安情报共享中的利益冲突诱因,将利益冲突诱因类型分为原发性诱因、突发性诱因、继发性诱因,并进一步探讨公安情报价值共创的共创筹备阶段、共创价值累积阶段、共创价值惠及阶段的利益冲突形成机制。[结果/结论] 综合运用规划和互动方式从投入保障、风险管理、收益协调3个方面构建公安情报共享价值共创利益冲突协调机制。  相似文献   

8.
Along with the proliferation of big data technology, organizations are involved in an overwhelming data ocean, the huge volume of data makes them at a loss in the face of frequent data breaches due to their failure of efficient data security management. Data classification has become a hot topic as a cornerstone of data protection especially in China in recent years, by categorizing information types and distinguishing protective measures at different classification levels. Both the text and tables of the promulgated data classification-related regulations (for simplicity, laws, regulations, policies, and standards are collectively referred to as “regulations”) contain a wealth of valuable information which can guide the work of data classification. To best assist data practitioners, in this paper, we automatically “grasp” expert experience on how to classify data from the analysis of such regulations. We design a framework, GENONTO, that automatically extracts data classification practices (DCPs), such as information types and their corresponding sensitive levels to construct an information type lexicon as well as to encode a generic ontology on top of 38 real-world regulations promulgated in China. GENONTO employs machine learning techniques and natural language processing (NLP) to parse unstructured text and tables. To our knowledge, GENONTO is the first work that explores critical information like the category and the sensitivity of information types from regulations, and organizes them in a structured form of ontology, characterizing the subsumptive relations between different information types. Our research helps provide a well-defined integrated view across regulations and bridges the gap between what experts say and how data practitioners do.  相似文献   

9.
基于联盟组合理论和中国转型情境,本文初探了企业应该如何有效管理产学研联盟组合,从理论上将有效产学研联盟组合管理廓清为三个相继阶段:有效产学研联盟组合伙设计、有效产学研联盟组合构建、有效产学研联盟组合管控。第一阶段,有效产学研联盟组合设计包括一致、搜寻和筛选3个子过程;第二阶段,有效产学研联盟组合构建包括谈判、契约和架构3个子过程;最后一个阶段,有效产学研联盟组合管控包括了成立组合专属管理机构、协同创新和监控评价3个子过程。本文的理论贡献在于,较为全面地探讨了企业产学研联盟组合有效管理提升企业自主创新能力作用机制的路径机理,并提出了相应的理论命题,从而拓展了我国产学研联盟的理论研究。  相似文献   

10.
多安全域环境下的访问控制是域间进行协作必须要解决的问题之一。交互主体间的陌生性以及共享资源的敏感性成为跨域建立信任关系的主要障碍。自动信任协商的提出提供了解决这一问题的新途径,它通过协作主体间信任证和访问控制策略的反复交互披露,在资源的请求者和提供者之间自动地建立起信任关系。在分析现有自动信任协商技术的基础上,针对信任协商中存在的证书敏感属性信息泄露的问题提出了改进的方案。该方案可有选择性地披露信任证的敏感属性,从而达到协商过程中减少敏感信息泄露和提高协商系统抗攻击能力的目的。  相似文献   

11.
组织设计理论研究贯穿于组织理论发展的全过程,是研究组织问题的重要切入点。我国近30年来,组织设计研究的关注热点发生了重大变化。通过CiteSpace软件对检索于中国期刊全文数据库(CNKI)的相关文献数据,绘制组织设计理论研究的关键词共现网络图谱。借助文献计量指标和直观动态的科学知识图谱,探析国内组织设计理论研究的聚焦问题、热点领域和尚存在的问题,从知识内源性探讨、项目驱动型组织研究、中小企业组织设计研究和研究方法趋势等方面,探讨组织设计理论的未来研究对策。  相似文献   

12.
Knowledge is distributed unevenly through most enterprises. Hence, flows of knowledge (e.g., across time, people, locations, organizations) are critical to organizational efficacy and performance under a knowledge-based view of the firm. However, supported principally by narrative textual theory in the emerging knowledge management (KM) field, the researcher has difficulty describing how different kinds of knowledge will flow through various parts of an organization. This causes difficulty also for predicting the effects of alternate approaches to dispersing knowledge that ‘clumps’ in various areas. This problem is also manifest for the KM professional, who lacks clear theory or tools to anticipate how any particular information technology or other managerial intervention may enhance or impede specific knowledge flows in the enterprise. In this expository article, we build upon a steady stream of research in computational organization theory to develop agent-based models of knowledge dynamics. This work draws from emerging theory for multidimensional representation of the knowledge-flow phenomenon, which enables the dynamics of enterprise knowledge flows to be formalized and emulated through computational models. This approach provides the means for knowledge-flow processes to be visualized and analyzed in new ways. Computational experimentation enables the performance of many alternate process designs and technological interventions to be compared through examination of dynamic models, before committing to a specific approach in practice. We illustrate this research method and modeling environment through semi-formal representation and agent-based emulation of several knowledge-flow processes from the domain of software development. We also outline key directions for the new kinds of KM research and practice elucidated by this work.  相似文献   

13.
阐述创新实验室安全的概念,对目前中国、韩国的创新实验室安全的法律法规状态作简要介绍与分析,对非传统安全进行探讨。在此研究的基础上,对我国科技创新实验室安全环境的相关政策与管理方向提出若干建议。  相似文献   

14.
首先对入侵检测系统的相关技术进行了深入地讨论和分析,并系统阐述了常见网络攻击手段和防范措施,对入侵防御系统的现状和发展方向论述,并详细叙述了入侵防御系统总体设计方案。形成了一种入侵防御系统的预取模型。通过实验分析,该系统能针对不同种类攻击而对系统实现多方位的信息安全保护,很大程度上提高了受保护网络系统的安全性。  相似文献   

15.
姜欣 《软科学》2012,26(5):41-44
在费尔德斯坦模型的基础上,利用生命周期效用最大化理论,从个人效用最大化和全社会效用最大化这两个角度出发,建立符合我国国情的最优社会保障支出模型。根据模型求解出最优的社会保障支出水平的公式,以我国1990~2009年的数据为样本,对其进行测算和分析,得出我国最优的社会保障支出水平为29.84%,我国现行的社会保障支出水平处在较低水平的结论。  相似文献   

16.
现阶段促进四川科技成果转化的对策和建议   总被引:3,自引:0,他引:3  
赵敏 《软科学》2005,19(2):60-62
在国家和省的相关政策法规的推动下,四川省科技成果转化成效显著,但与经济社会发展的要求还存在比较大的距离,在分析和研究国外和其他省市的有效做法的基础上,提出四川省加速科技成果转化的对策和建议。  相似文献   

17.
A key challenge in current Business Analytics (BA) is the selection of suitable indicators for business objectives. This requires the exploration of business data through data-driven approaches, while modelling business strategies together with domain experts in order to represent domain knowledge. In particular, Key Performance Indicators (KPIs) allow human experts to properly model ambiguous enterprise goals by means of quantitative variables with numeric ranges and clear thresholds. Besides business-related domains, the usefulness of KPIs has been shown in multiple domains, such as: Education, Healthcare and Agriculture. However, finding accurate KPIs for a given strategic goal still remains a complex task, specially due to the discrepancy between domain assumptions and data facts. In this regard, the semantic web emerges as a powerful technology for knowledge representation and data modeling through explicit representation formats and standards such as RDF(S) and OWL. By using this technology, the semantic annotation of indicators of business objectives would enrich the strategic model obtained. With this motivation, an ontology-driven approach is proposed to formally conceptualize essential elements of indicators, covering: performance, results, measures, goals and relationships of a given business strategy. In this way, all the data involved in the selection and analysis of KPIs are then integrated and stored in common repositories, hence enabling sophisticated querying and reasoning for semantic validation. The proposed semantic model is evaluated on a real-world case study on water management. A series of data analysis and reasoning tasks are conducted to show how the ontological model is able to detect semantic conflicts in actual correlations of selected indicators.  相似文献   

18.
基于不完全执行污染排放管制的企业与政府博弈分析   总被引:2,自引:0,他引:2  
邓峰 《预测》2008,27(1):67-71
企业经济活动所产生的污染是我国环境污染的主要来源,我国的环境政策大多局限于控制政策本身和实施政策所需的措施,并假设这些措施均能完全执行。而企业作为一个由利害关系基本一致的成员组成的群体,必然形成坚强的"利益刚性",其对政府的环境管制会采取各种规避措施。本文通过构建一个政府先行的博弈模型分析在管制不完全执行的情况下政府与企业之间的互动关系。  相似文献   

19.
冲突话语是一种常见的动态语言现象,主要分为攻击性冲突话语和非攻击性冲突话语两大类。Helen Spencer-Oatey(2000,2007,2008)提出的人际和谐管理理论,在中英、中美冲突话语对比研究领域已经取得一定成果。该文基于Helen Spencer-Oatey的人际和谐管理理论,以日本的冲突话语作为语料分析对象,从语用角度探究其对人际交往的负面效应,分析话语冲突产生的原因以及如何有效地避免、缓解、消除话语冲突。  相似文献   

20.
基于科技创业政策法规环境理论的分析,对宁波市科技创业政策法规进行梳理,针对宁波科技创业政策法规环境建设中存在的问题,提出优化宁波科技创业政策法规环境建设的建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号