450 research outputs found

    Summary of my innovation and contributions to research on cultural productivity, contemporary literature and art, and strategic planning of culture construction

    Get PDF
    This statement summarizes my academic achievements in the professional research of humanity and social sciences, my contributions to academy and society, my innovations in theoretical construction and application of the project, and the outlook on my future academic development. The whole text is divided into six parts: an overview of my major works; comprehensive and detailed summary of my research on cultural productivity, its creative breakthroughs and social influence; my academic contribution to research on contemporary literature and art in China; my substantial contribution to the formulation of strategic plans for culture construction and the relevant investigation and study (generally in Hebei Province in China); academic innovations and social influence of some of my specific projects (e.g. information aesthetics); and my plan and prospect for future academic work

    A Comparative Study on Cybersecurity Act Implemented in the United States and China

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œ์ง€์—ญํ•™์ „๊ณต), 2020. 8. ์‹ ์„ฑํ˜ธ.The past decade in cyberspace witnessed state-mediated attack in pursuance of accomplishing ones political end. Once limited to opportunistic private criminal groups, the concept of cyberattack transformed into a countrys important means to bolster national security and further propagate national stance in cyberspace. Henceforth, cyberspace emerges as compelling security realm. When compared to traditional security environment, judging the situation is convoluted on account of the unique characteristics of cyberspace. Under the amorphous nature of cyberspace, if anything, nations become more nationalized. The nature of cyber realm characterized by innate openness and hyper-connectivity will trigger structural change in cybersecurity landscape. Thus the thesis argues that although nations will actively interact and engage in collective initiatives fueled by the rising voice of forming global governance for cybersecurity, the overriding state sovereignty in the end would breed discord in the cyber era. Every move in cyberspace rests upon a nations political end thereby taking account of geopolitical interests assumes greater importance since invisible borderline matters. Given the nations inclination to utilize cyber capabilities for political ends, what happens in conventional security realm can also occur in cyberspace. The thesis chooses the US and China, allegedly Group of Two (G2), to study how both country take governmental measures vis-ร -vis cybersecurity. Two great powers, with no doubt, are the pioneers in this emerging security realm. Not only both actively engage in building up cyber capabilities but also actively engage in appealing for cooperation to its allies. By conducting a comparative study on Cybersecurity Act of 2015 in the US and Cybersecurity Law of the PRC in 2016, the thesis aims to demonstrate how G2 implement legal regulation to safeguard domestic information infrastructure amidst the rising cyber threats posed by both state and non-state actors. In doing so, the thesis will research how respective country exerts its national interests in cyberspace while cooperate with other countries to defend global security. The thesis will add a new dimension on current cybersecurity studies by filling the gaps in previous literature. The thesis will contribute in understanding Sino-US relation regarding hegemonic competition in cyberspace and further propose the prospects of nations in the cyber era.์ง€๋‚œ ์‹ญ ๋…„์˜ ์‚ฌ์ด๋ฒ„ํ™˜๊ฒฝ์€ ์ •์น˜์  ๋ชฉ์ ์„ ์ด๋ฃจ๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ์œผ๋กœ์จ ๊ตญ๊ฐ€ ์ฃผ๋„์˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ์ฃผ๋ฅผ ์ด๋ฃฌ๋‹ค. ํ•œ๋•Œ ๊ธฐํšŒ์ฃผ์˜์  ๋ฒ”์ฃ„์ง‘๋‹จ์— ๊ตญํ•œ๋œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์€ ์ด์ œ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ, ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ์˜ ์ •์น˜์  ์„ ์ „์˜ ์ค‘์š”ํ•œ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉ๋œ๋‹ค. ์ด์— ๋”ฐ๋ผ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์€ ๊ทธ ๊ท€์ถ”๊ฐ€ ์ฃผ๋ชฉ๋˜๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์œผ๋กœ ๊ธ‰๋ถ€์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์  ์•ˆ๋ณด ์˜์—ญ๊ณผ ๋น„๊ตํ–ˆ์„ ๋•Œ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๋…ํŠนํ•œ ํŠน์„ฑ์œผ๋กœ ๋ง๋ฏธ์•”์•„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ์„ ๊ฐ€๋Š ํ•˜๋Š” ๊ฒƒ์€ ํ›จ์”ฌ ๋ณต์žกํ•˜๋‹ค. ๊ฐœ๋ฐฉ์„ฑ๊ณผ ์ดˆ์—ฐ๊ฒฐ์„ฑ์œผ๋กœ ํŠน์ง•๋˜๋Š” ๋ฌด์ •ํ˜•์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ ์—ญ์„ค์ ์ด๊ฒŒ๋„ ๊ตญ๊ฐ€๋Š” ๋”์šฑ ๊ตญ๊ฐ€์ฃผ์˜์ ์ธ ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ ์ˆ˜๋ฆฝ์„ ์œ„ํ•ด ๊ธ€๋กœ๋ฒŒ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ตฌ์ถ•์˜ ํ•„์š”์„ฑ์— ๋”ํ•ด ๊ฐ ๊ตญ๊ฐ€๋“ค์ด ๊ณต๋™์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์œ„ํ•ด ํ˜‘๋ ฅํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋” ์šฐ์„ ์‹œ๋˜๋Š” ์ฃผ๊ถŒ๊ตญ๊ฐ€์˜ ์ด์ต์€ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์—์„œ์˜ ๊ฐˆ๋“ฑ์„ ์ดˆ๋ž˜ํ•  ๊ฒƒ์ด๋‹ค. ์ด๋Š” ๊ถ๊ทน์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์ „๋ง์˜ ๊ตฌ์กฐ์  ๋ณ€ํ™”๋ฅผ ๋ถ€์ถ”๊ธด๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„ ํ•˜์— ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ํ–‰์œ„๊ฐ€ ๊ฒฐ๊ตญ ํŠน์ˆ˜ํ•œ ๋ชฉ์ ์— ๋‹ฌ๋ ค์žˆ์Œ์— ๊ธฐ์ธํ•ด ์ด ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์˜ ์ดํ•ด์— ์•ž์„œ ์ง€์ •ํ•™์  ์ด์ต๊ด€๊ณ„์˜ ์ดํ•ด๊ฐ€ ์š”๊ตฌ๋œ๋‹ค. ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰์„ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ์˜ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉํ•˜๋ ค๋Š” ์ง€๋‚œ ์‹ญ ๋…„์˜ ๊ฒฝํ–ฅ์€ ์ „ํ†ต์  ์•ˆ๋ณด์˜์—ญ ์ฐจ์›์—์„œ ๋ฐœ์ƒํ•˜๋˜ ์ผ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๋˜ํ•œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ์ด ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ด€๋ จ ์–ด๋– ํ•œ ์ •๋ถ€์ฐจ์›์˜ ์กฐ์น˜๋ฅผ ์ทจํ•˜๋Š” ์ง€ ์—ฐ๊ตฌํ•จ์— ๋ชฉ์ ์„ ๋‘”๋‹ค. ์–‘๊ตญ์€ ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰ ๋ฐœ์ „์— ๊ตญ๊ฐ€์  ํˆฌ์ž๋ฅผ ์•„๋ผ์ง€ ์•Š์„ ๋ฟ ์•„๋‹ˆ๋ผ ๋™๋งน๊ตญ๋“ค์—๊ฒŒ๋„ ํ˜‘๋ ฅ์„ ์ด‰๊ตฌํ•˜๋ฉฐ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์— ๊ฐ€์žฅ ์ ๊ทน์„ฑ์„ ๋ ๋Š” ๊ตญ๊ฐ€์ด๋‹ค. ๋ฏธ๊ตญ์˜ 2015๋…„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฒ•๊ณผ ์ค‘๊ตญ์˜ 2016๋…„ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ๋ฒ•์„ ๋น„๊ต ์—ฐ๊ตฌํ•ด ๋ณธ ๋…ผ๋ฌธ์€ ์–‘๊ตญ์ด ๊ตญ๋‚ด์˜ ์ •๋ณด ์ธํ”„๋ผ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ๋ฒ•์  ๊ทœ์ œ๋ฅผ ๋งˆ๋ จํ–ˆ๋Š”์ง€ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๋˜ํ•œ ๊ฐ๊ตญ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ ์–ด๋–ป๊ฒŒ ๊ตญ์ต์„ ํ–‰์‚ฌํ•˜๋ฉฐ ๋™์‹œ์— ๋ฒ”์ง€๊ตฌ์  ์ฐจ์›์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ํ˜‘๋ ฅ ๋งค์ปค๋‹ˆ์ฆ˜์„ ์ถ”๊ตฌํ•˜๋Š”์ง€ ์—ฐ๊ตฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ๋ฏธโˆ™์ค‘ ๊ฒฝ์Ÿ๊ตฌ๋„์˜ ๊ด€์ ์—์„œ ์žฌํ•ด์„ํ•˜๋ฉฐ ๋” ๋‚˜์•„๊ฐ€ ๊ฑฐ์‹œ์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์ „๋งํ•œ๋‹ค๋Š” ์ ์—์„œ ํ˜„์žฌ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์—ฐ๊ตฌ์— ๊ธฐ์—ฌํ•œ๋‹ค.I. Introduction 1 1. Research Background 1 2. Argument Overview 3 3. Significance of the topic 5 4. Methodology 8 II. Literature Review 10 1. Sino-US relation and Cybersecurity 10 2. Previous studies on cybersecurity 16 3. Cybersecurity and relevant legal regulation 25 a. The United States 25 b. China 29 4. Limitations of prior research 32 III. The United States 34 1. An overview of national security and cyberspace 34 a. Cybersecurity environment 34 b. Cybersecurity strategy guideline 37 2. Information security and regulatory regime 41 a. Definition of Critical Information Infrastructure 41 b. The evolution of discussion on information security 45 3. Cybersecurity Act of 2015 48 IV. China 51 1. An overview of national security and network security 51 a. The development process of informatization 51 b. Cybersecurity strategy guideline 54 2. Network security and regulatory regime 57 a. Cybersecurity environment 57 b. Definition of Critical Information Infrastructure and regulatory regime 59 3. Cybersecurity Law of the PRC 62 V. Analysis 64 1. Thesis findings 64 a. The US model of protecting homeland cybersecurity 66 b. Chinese model of controlling mainland network security 68 2. Implications and prospects of nations in the cyber era 69 a. Cybersecurity as a shared problem 69 b. Race to cyber supremacy 72 VI. Conclusion 75 Bibliography 78 Abstract in Korean 91Maste

    Diagnosis on layout of Chinaโ€™s multimodal demonstration project

    Get PDF

    The Reference and Enlightenment of E-Learning Course Evaluation Criterion in Taiwan Open University

    Get PDF
    Teaching quality is on the basis of the survival and development of colleges and universities, under the background of economic globalization, the internationalization of education and information technology, network education, remote teaching strongly promote the exchanges and cooperation between mainland and Taiwan higher education, promoting the ascension of education quality of teaching in colleges and universities worldwide, as well as to the college teaching quality management poses challenges, comprehensively improving the quality of higher education has become the governments at all levels, the focus of the whole society and the higher, the quality of teaching management in colleges and universities is a systems engineering, and exercise all-round monitoring the quality of talent training, needs the government, school, society, teachers and students participating and corresponding technical support to complete. This paper discusses the evaluation criteria of digital learning course, through the knowledge diffusion, communication and sharing, to find knowledge acquisition method and the information science and technology elements to rapidly change on course. By comparing Taiwan open university with Zhejiang Open University, try to find a reference to the digital education quality monitoring, and inspiration for the creation to Zhejiang Open University

    Framing the Internet in China: Cross-Cultural Comparisons of Newspapersโ€™ Coverage in China, Hong Kong, Singapore, the United States, and the United Kingdom

    Get PDF
    This study introduced the framing theory, Shoemaker and Reeseโ€™s hierarchical model, and Hofstedeโ€™s cultural dimensions into a cross-cultural comparative analysis of news coverage of the Internet in China from 2000 to 2004 in selected newspapers in China, Hong Kong, Singapore, the United States and the United Kingdom. Significant differences were found to exist across the societies in both the salience of Internet-related issues and the usage of generic news frames. The issue of Internet diffusion and use was most frequently mentioned in the newspapers from China, Singapore, and the United Kingdom. The U.S. newspapers paid most attention to the issue of Internet censorship and regulations; whereas the issue of e-commerce and Internet business most frequently appeared in the newspapers from Hong Kong. In terms of generic news frames, the newspapers from China were significantly more likely to use the human interest, morality and leadership frames. The newspapers from Hong Kong mainly relied on the factual and economic consequences frames to report the Internet in mainland China. The U.S. and U.K. newspapers were distinct for their highly frequent usage of the conflict frame. This study also investigated how much variations in media framing could be explained by such national-level factors as freedom status and cultural dimensions across societies. Logistic regression models indicated that the patterns of influence varied across the societies with different types of news frames and their associations with different types of Internet-related issues. The cultural dimension of long-/short-term orientation was found to be a general factor influencing the presence of different types of news frames. In addition, a literature review of the changing Chinese media suggests that the Chinese press has become increasingly diversified in both structure and function. Therefore, another goal of the study was to test the influence of extramedia-level factors within a society by examining whether the framing of the Internet in the leading Party organ newspaper, the Peopleโ€™s Daily, would differ from the Beijing Youth Daily, a local newspaper with national influence and more financial and operational autonomy. They differed from each other in presenting the politically sensitive issue, Internet censorship and regulations

    Media Since 1949: Changes and Continuities

    Full text link

    The research of Single window clearance mode in different countries and regions and the current demerits existing in China

    Get PDF

    INFORMATION SYSTEMS RESEARCH IN CHINESE UNIVERSITIES: AN EXAMINATION OF THE INPUT SIDE

    Get PDF
    Along with the rapid growth of the Chinese economy over the past decades, information systems (IS) research in China has undergone a profound transformation. This exploratory study reports on a survey involving 107 university researchers, focusing on the input aspects of IS research and how institutional factors affect the input. In this paper, input mainly refers to research activities, effort, methods and reference disciplines. Data show researchers are withdrawing from IS development projects, while increasing their effort in academic research. Compared to the past, IS research topics are now more aligned to the international mainstream. A major hurdle for empirical research is the lack of familiarities with empirical research methodology, as indicated by nearly half of the respondents. Effort in academic research tends to correlate with the researchers\u27 income scheme, i.e., sources and proportion of base salary and benefits in their overall income. However, surprisingly, emphasis on quality of publication has not significantly influenced researchers\u27 effort yet, nor has the increased degree of internationalization affected the selection of research methods and the shift to empirical research. The underlying reasons are explored, and implications are also discussed
    • โ€ฆ
    corecore