A Model for Safety & Security Situation Awareness and Shaping from a Perspective of Safety & Security Intelligence
［Purpose/significance］ The world is now going through major changes unseen in a century,and safety & security risks are aggravated,which puts forward an increasingly urgent demand for safety & security governance.As an important means of safety & security governance,the research on Safety & security Situation Awareness and Shaping (SSAS) is of great significance.［Method/process］ Firstly,from a perspective of safety & security intelligence,the connotation of SSAS is analyzed.Secondly,the safety & security intelligence path for SSAS is proposed.Finally,the SSAS model from a perspective of safety & security intelligence is constructed and explained.［Result/conclusion］ The results show that,from a perspective of safety & security intelligence,the basic logical process of SSAS is “gaining insight into the system safety & security situation→generating the system safety & security situation intelligence→generating the safety & security governance policy intelligence→applying the safety & security governance policy intelligence to regulate the system safety & security situation”.The model of SSAS from a perspective of safety & security intelligence is a comprehensive integration of four sub-models,including safety & security situation awareness sub-model,safety & security situation shaping sub-model,safety & security worker sub-model and SSAS system sub-model.
［Purpose/significance］ Breaking through the disinformation,to grasp the development clues of S&T frontier is the key to improving the strategic layout of the S&T frontier and meeting the needs of S&T innovation during the “14th Five-Year Plan” period.［Method/process］ In this paper,the concept,discovery scope and strategic significance of the S&T frontier are analyzed.It also makes a systematic analysis of information work concerns and method combination to discover S&T frontier clue.Finally,the optimization ideas of the information methodology to discover S&T frontier clue are proposed.［Result/conclusion］ The system of spectrum scanning methods is constructed under the guidance of full-spectrum thinking to respond to “full-spectrum scanning,extreme insight,correlation perception,and characterization & expression”.In terms of optimization of spectrum scanning methods,more attention should be paid to the benign integration of methods and techniques with each link in the information work flow.The suitability of the selection and combination of specific scanning methods should be emphasized based on specific scenarios.It also needs to rely on the support of professional discipline knowledge and new technology.
Research on Intelligence Guarantee to Maintain Scientific and Technological Security in Open Scientific Environment
［Purpose/significance］ From the perspective of competition and confrontation,rival intelligence activities pose a serious threat to scientific and technological security.The open science environment has expanded the scope of open source intelligence,making this threat more prominent.Intelligence guarantee is a positive model for maintaining scientific and technological security.It plays an irreplaceable role in safeguarding scientific and technological security in an open scientific environment.［Method/process］ Based on the analysis of the threat of opponent’s intelligence activities to the state,protection ability and situation of scientific and technological security,this paper constructs the framework of intelligence support system around the demand,function and application of intelligence;this paper puts forward the operation mode of intelligence guarantee system from the aspects of operation concept,operation environment,operation subject and decision-making path of scientific and technological security management.［Result/conclusion］ The security intelligence activities and competitive intelligence activities carried out by the opponent against us may threaten our scientific and technological security.Intelligence can ensure the security of scientific and technological exchange,sensitive information and independent and controllable security by creating an information environment that rejects others and benefits oneself and shaping a controllable security situation.The intelligence support system needs to be supported by the “challenge-response” operation concept and the full participation operation environment,and promote its implementation practice,quality and efficiency through the coordination of multiple subjects and the construction of decision-making paths.
Research on the Intelligence Service Mechanism of Science and Technology Think Tank Based on Big Data Thinking
Research on Strengthening the Construction of National Science and Technology Intelligence System from the Perspective of Sino-US Science and Technology Competition
［Purpose/significance］ With the intensification of science and technology competition between China and the United States,the United States has intensified its science and technology intelligence activities against China unprecedently.A series of major events related to national science and technology development and security have continuously warned China’s science and technology intelligence work,and exposed under the new situation,national science and technology intelligence system needs holistic reflection and optimization,national science and technology intelligence system overall ability needs to be strengthened.［Method/process］ Based on system engineering theory,guided by “the view of macro intelligence”,“coordination theory” for traction,this paper defines the connotation of the national science and technology intelligence system,and analyzes on the factors of national science and technology intelligence system.This paper explores the reconstruction path of national science and technology intelligence system,from the concept of six dimensions,including concept culture,organization,resource,talent,theoretical methods and technologies and institutions.［Result/conclusion］ Strengthening national science and technology intelligence system is importance to providing beneficial support for the improvement of China’s national science and technology intelligence capacity,as well as the full play of science and technology intelligence value in the Sino-US science and technology competition.
Research on the Operation Strategies of Research Data Repository Alliance from the Perspective of Collaboration: Take FRDR as an Example
Research on the Relationship Between Discipline Layout Diversity and Discipline Competitiveness: An Example from Library and Information Science
Research on Technology Evolution Pathways Identification and Expansion Based on Citation Network and Semantic Analysis
Measurement and Visualization of Group Polarization on Social Media from the Perspective of Opinion Diversity
Research on the Factors Influencing Digital Hoarding Behavior of College Students and the Configuration Path
［Purpose/significance］ To study the influencing factors and configuration path of digital hoarding behavior with college students as a sample,which can help enrich the related research in this field and provide some suggestions and countermeasures for the intervention of digital hoarding behavior among college students.［Method/process］ Based on social cognitive theory,we analyzed the influencing factors of digital hoarding behavior from both individual and situational perspectives through questionnaire survey method and fuzzy set qualitative comparative analysis method and constructed a theoretical model.［Result/conclusion］ The necessity and sufficiency analysis was conducted by fsQCA software and R software,and the results concluded that there were no necessary conditions for digital hoarding behavior among the six condition variables,and a total of five paths were obtained to trigger digital hoarding behavior,which can be further integrated into three major configurations according to their characteristics and the distribution of core conditions:preventive measures,precise location,and element aggregation.
［Purpose/significance］ Aiming at the problem that the results of several comprehensive evaluation methods of academic influence of scholars are inconsistent,this paper proposes a novel combination evaluation model of academic influence of scholars considering consensus degree.［Method/process］ Firstly,the concepts of this year’s total citations,last year’s total citations,and previous year’s total citations are defined,on the basis of which the index system of academic influence of scholars that contain H index,total citations,and these concepts is constructed.Then,the entropy weight-based Technique for Order Preference by Similarity to an Ideal Solution (EW-TOPSIS) method,Vlse Kriterijuska Optimizacija I Komoromisno Resenje (VIKOR) method,Heronian operator,Decision-making Trial and Evaluation Laboratory (DEMATEL) method,and power operator are utilized to calculate 5 different comprehensive evaluation results of academic influence of scholars.Finally,the information fusion method considering consensus degree is designed to determine the combination evaluation results of academic influence of scholars.［Result/conclusion］ Taking 26 experts of international fuzzy decision-making field as the object,the empirical analysis shows that this model can get an objective and fair rank of academic influence of scholars owing to not only can this model consider the advantages and disadvantages of each comprehensive evaluation method,and avoid the adverse influence of the random selection of comprehensive evaluation methods,but this model can also get more reliable combination evaluation results.
Research on Emergency Management Intelligence Analysis Application Based on War Gaming Thinking：Taking Urban Flood Disaster as an Example
［Purpose/significance］ In the new era,intelligence support for rapid response to emergency decision-making has become an important part of emergency management.The application research of emergency management intelligence analysis based on war gaming thinking is a discussion of rapid response to emergency decision-making based on the core of emergency management intelligence analysis and the implementation method of war gaming.［Method/process］ Firstly,the literature review is carried out on the related research on emergency management intelligence analysis,and the theoretical overview of the MPRR model and war gaming is carried out.Secondly,on the basis of sorting out the pain points of emergency management,the applicability of war games into emergency management is analyzed,and an intelligence analysis framework that fits the MPRR model and war games is constructed,and the corresponding analysis is carried out.Finally,in order to verify the practicability of the framework,taking urban flood disasters as an example,the whole process of the implementation of the urban flood disaster emergency management intelligence analysis war game is demonstrated from the three stages of preparation planning,implementation simulation and summary evaluation.［Result/conclusion］ The study believes that war gaming have enriched the intelligence methods and theories of rapid response to emergency decision-making to a certain extent.At the same time,it also provides positive practical value for the on-site disposal and emergency deployment of emergency management.
Research on the Early Warning of Network Public Opinion Crisis under Multiple Scenarios of Public Emergencies
［Purpose/significance］ Public emergencies have become a difficult problem in social governance,and exploring the early warning process of the network public opinion crisis of the incident will help relevant departments to scientifically understand the development trend of public opinion and improve the ability to deal with crises.［Method/process］ Based on the knowledge metamodel,this paper first expresses the network public opinion crisis early warning scenario from four aspects:scenario events,scenario driving elements,scenario reasoning elements,and scenario target elements,and constructs a dynamic Bayesian network model of early warning scenarios.Secondly,the model is trained and tested in combination with the EM algorithm,and the influencing factors of public opinion crisis early warning under each scenario are clarified.Finally,taking the epidemic incident at Nanjing Lukou Airport as an example,the early warning level of public opinion crisis in each scenario is evaluated and analyzed.［Result/conclusion］ The dynamic Bayesian network trained in this paper has certain reliability,and different response plans in different scenario states will have different impacts on the warning level of public opinion crisis,providing a reference for the government and relevant departments to dynamically make crisis emergency decisions.
［Purpose/significance］ Due to the abundance of existing technical resources and the industry’s first-mover advantage,some countries and enterprises form the industry’s technical barrier.This paper puts forward the method of detecting the core technology and identifying the gap between domestic and foreign technology,which may provide reference for Chinese enterprises to seek technological breakthrough opportunities.［Method/process］ According to the product components,the paper builds four dimensional diagram (product-component-enterprise-patent),and mines products’ core technology on the basis of network-performance of technology and importance of technology.Then the paper identifies the technology gap between domestic enterprises and foreign enterprises based on TSA (Technology Share in the Area).Finally,the patent data of phone camera products from 2011 to 2021 are applied to empirically analyze the core technology of each component of phone camera products and the technology gap at home and abroad.［Result/conclusion］ There is a big gap between Chinese and foreign enterprises in the fields of focusing motor,protective film,infrared filter and lens,while in the fields of image sensor and circuit connection substrate,Chinese enterprises has advantages.
Research on Pre-registration Information Behaviors of the Initial-phase Visitors in Enterprise Virtual Brand Communities
［Purpose/significance］ This article researches the regularity of information behavior to the initial-phase visitors of enterprise virtual brand communities in the stage of pre-registration.It provides guidance for the corporate community to implement targeted policies to meet the specific information value needs to initial-phase visitors.［Method/process］ Summarizing the information behavior patterns of initial-phase visitors under different information value demands analyses the characteristics and influencing factors of basic information behavior by eye-tracking experiences of the role play.［Result/conclusion］ Results show the significant differences in the information behavior patterns of initial-phase visitors under two differences value-needs of information for use and information for emotion.In these two patterns,characteristics and influencing factors of basic information behaviors to visitors for surfing and browsing are diversity.These two different information behavior patterns may response the variety of actions to initial-phase visitors by enterprises.
［Purpose/significance］ The US controlled unclassified information system is generated or held by the US federal government,which is not a state secret.However,according to the laws,regulations and policies,it should take protective measures or restrict the management of information dissemination,which has reference value for the management of unclassified sensitive information of our government.［Method/process］ Study the background and origin of the US controlled unclassified information system,study the management system and technical standard system,analyze the functional structure and development trend of the system implementation,and explore the reference path in comparison with our government's unclassified sensitive information.［Result/conclusion］ Based on the common analysis of the protection of unclassified sensitive information,the study proposes to accelerate the construction of relevant management systems in China,form the scope of government unclassified sensitive information matters,establish a technical protection standard system and clarify relevant legal responsibilities.