1,703 research outputs found

    Research of Construction of Sci-tech Innovation Platform in Anhui Province in China

    Get PDF
    In the age featured with Big Data, Anhui Province has made great progress in scientific and technological innovation. As a result, there appear new features and new requests of sci-tech management. This article, from the perspective of Big Data, basing on the realistic condition of sci-tech innovation platform’s construction in Anhui province in China, has discussed how to build a better platform. We has creatively proposed the construction principle, which is three-elements-driving (Big Data, Internet of Things and Cloud Computing) and the four-in-one constructing subjects of system and mechanism, innovative service, industry cultivation and technology research and development, and has provided strategic suggestions on how to guarantee the platform’s smooth running from three respects of system and mechanism, fund source and environment. At last, it has analyzed and studied the platform’s effective operation. Key words: Big Data, Anhui Province, sci-tech innovation platfor

    Opportunity for marine fisheries reform in China

    Get PDF
    China's 13th Five-Year Plan, launched in March 2016, provides a sound policy platform for the protection of marine ecosystems and the restoration of capture fisheries within China's exclusive economic zone. What distinguishes China among many other countries striving for marine fisheries reform is its size- accounting for almost one-fifth of global catch volume-and the unique cultural context of its economic and resource management. In this paper, we trace the history of Chinese government priorities, policies, and outcomes related to marine fisheries since the 1978 Economic Reform, and examine how the current leadership's agenda for "ecological civilization" could successfully transform marine resource management in the coming years. We show how China, like many other countries, has experienced a decline in the average trophic level of its capture fisheries during the past few decades, and how its policy design, implementation, and enforcement have influenced the status of its wild fish stocks. To reverse the trend in declining fish stocks, the government is introducing a series of new programs for sustainable fisheries and aquaculture, with greater traceability and accountability in marine resource management and area controls on coastal development. As impressive as these new plans are on paper, we conclude that serious institutional reforms will be needed to achieve a true paradigm shift in marine fisheries management in China. In particular, we recommend new institutions for science-based fisheries management, secure fishing access, policy consistency across provinces, educational programs for fisheries managers, and increasing public access to scientific data.Additional co-authors: Yingqi Zhou, Ping Zhuang, and Rosamond L. Naylo

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    Strategic Latency Unleashed: The Role of Technology in a Revisionist Global Order and the Implications for Special Operations Forces

    Get PDF
    The article of record may be found at https://cgsr.llnl.govThis work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-59693This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-5969

    Cybernationalism and cyberactivism in China

    Get PDF
    El nacionalismo en la era de Internet se está convirtiendo cada vez más en un factor esencial que influye en la agenda-setting de la sociedad china, así como en las relaciones de China con los países extranjeros, especialmente con Occidente. Para China, una mejor comprensión de la estructura teórica universal y de los patrones de comportamiento del nacionalismo facilitaría la articulación social general de esta tendencia y potenciaría su papel positivo en la agenda-setting social. Por otra parte, un estudio del cibernacionalismo chino basado en una perspectiva china en el mundo académico occidental es un intento de transculturación. Desde el punto de vista de las relaciones internacionales y la geopolítica actuales, que son bastante urgentes, este intento ayudaría a mejorar la compatibilidad de China con el actual orden mundial dominado por Occidente, a reducir la desinformación entre China y otros países y a sentar las bases culturales e ideológicas para otras colaboraciones internacionales. Teniendo en cuenta el estado actual de la investigación sobre el nacionalismo chino y la naturaleza participativa de las masas del cibernacionalismo, esta disertación se centra en el cibernacionalismo en las tres partes siguientes. El primero es un estudio de los orígenes históricos del cibernacionalismo chino. Esta sección incluye tanto una exploración del consenso social en la antigua China como un estudio de la influencia del nacionalismo en la historia china moderna. El estudio de los orígenes históricos no sólo nos muestra la secuencia cronológica de la experiencia del desarrollo y la evolución tanto del proto-nacionalismo como del nacionalismo en China, sino que también revela un impulso decisivo para las reivindicaciones y comportamientos actuales del cibernacionalismo. La segunda parte trata del proceso de formación y ascenso del cibernacionalismo desde el siglo XXI. El importante antecedente del paso del nacionalismo al cibernacionalismo es el proceso de informatización de la sociedad china. Una vez completado el estudio de la situación básica de la sociedad china de Internet, especialmente el estudio de los medios sociales como espacio público, podemos vincular Internet con el nacionalismo y examinar el nuevo desarrollo del nacionalismo en la era de la participación de masas. El objetivo final es conectar el proto-nacionalismo, el nacionalismo y el cibernacionalismo, y seguir construyendo una comprensión del cibernacionalismo que sea coherente tanto con los principios universales del nacionalismo como con el contexto chino. Por último, validamos los resultados derivados del estudio anterior a través de la realidad social, es decir, estudiando las prácticas de ciberactivismo del cibernacionalismo para juzgar su suficiencia general así como su validez. Llevaremos a cabo varios estudios de caso de natural language processing basados en big data para reproducir la lógica de comportamiento y el impacto real del ciberactivismo de la manera más cercana posible a la realidad de Internet, evitando al mismo tiempo los defectos de argumentación unilateral y de infrarrepresentación de los estudios de caso tradicionales.Nationalism in the Internet age is increasingly becoming an essential factor influencing agendasetting within Chinese society, as well as China’s relations with foreign countries, especially the West. For China, a better understanding of the universal theoretical structure and behavioral patterns of nationalism would facilitate the overall social articulation of this trend and enhance its positive role in social agenda setting. On the other hand, a study of Chinese cybernationalism based on a Chinese perspective in western academia is an attempt at transculturation. From the viewpoint of the current rather urgent international relations and geopolitics, such an attempt would help to enhance China’s compatibility with the current western-dominated world order, reduce misinformation between China and other countries, and lay the cultural and ideological groundwork for various other international collaborations. Considering the current state of Chinese nationalism research and the mass participatory nature of cybernationalism, this dissertation focuses on cybernationalism in the following three parts. The first is a study of the historical origins of Chinese cybernationalism. This section includes both an exploration of the social consensus in ancient China and a survey of the influence of nationalism in modern Chinese history. The historical origins study not only shows us the chronological sequence of experiencing the development and evolution of both proto-nationalism and nationalism in China, but also reveals a decisive impetus for the current claims and behaviors of cybernationalism. The second part deals with the process of formation and rise of cybernationalism since the 21st century. The important background for the move from nationalism to cybernationalism is the informatization process of Chinese society. After we have completed the study of the basic situation of Chinese Internet society, especially the study of social media as a public space, we can link the Internet with nationalism and examine the new development of nationalism in the era of mass participation. The ultimate goal is to connect the proto-nationalism, nationalism, cybernationalism, and furtherly construct an understanding of cybernationalism that is consistent with both the universal principles of nationalism and the Chinese context. Finally, we validate the results derived from the previous study through social reality, i.e., by studying the cyberactivism practices of cybernationalism to judge its general sufficiency as well as validity. We will conduct several natural language processing case studies based on big data to reproduce the behavioral logic and actual impact of cyberactivism in the closest possible way to the Internet reality while avoiding the unilateral argumentation and under-representation flaws of traditional case studies

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security

    Emerging Threats of Synthetic Biology and Biotechnology

    Get PDF
    Synthetic biology is a field of biotechnology that is rapidly growing in various applications, such as in medicine, environmental sustainability, and energy production. However these technologies also have unforeseen risks and applications to humans and the environment. This open access book presents discussions on risks and mitigation strategies for these technologies including biosecurity, or the potential of synthetic biology technologies and processes to be deliberately misused for nefarious purposes. The book presents strategies to prevent, mitigate, and recover from ‘dual-use concern’ biosecurity challenges that may be raised by individuals, rogue states, or non-state actors. Several key topics are explored including opportunities to develop more coherent and scalable approaches to govern biosecurity from a laboratory perspective up to the international scale and strategies to prevent potential health and environmental hazards posed by deliberate misuse of synthetic biology without stifling innovation. The book brings together the expertise of top scholars in synthetic biology and biotechnology risk assessment, management, and communication to discuss potential biosecurity governing strategies and offer perspectives for collaboration in oversight and future regulatory guidance

    Hybrid Warfare

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called ‘irregular warfare’ and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. This volume supports the development of such an approach by bringing together practitioners and scholarly perspectives on the topic and by covering the threats themselves, as well as the tools and means to counter them, together with a number of real-world case studies. The book covers numerous aspects of current Hybrid Warfare discourses including a discussion of the perspectives of key western actors such as NATO, the US and the EU; an analysis of Russia and China’s Hybrid Warfare capabilities; and the growing threat of cyberwarfare. A range of global case studies – featuring specific examples from the Baltics, Taiwan, Ukraine, Iran and Catalonia – are drawn upon to demonstrate the employment of Hybrid Warfare tactics and how they have been countered in practice. Finally, the editors propose a new method through which to understand the dynamics of Hybrid Threats, Warfare and their countermeasures, termed the ‘Hybridity Blizzard Model’. With a focus on practitioner insight and practicable International Relations theory, this volume is an essential guide to identifying, analysing and countering Hybrid Threats and Warfare
    corecore