首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
杜玲 《学理论》2012,(23):156-157
档案管理工作不仅关涉到国家的安全,而且对于企业及个人的正常发展都有重要的影响。作为一名新时期的档案管理人员,在日常的管理工作中,应时刻抱有档案意识、档案保密意识、档案法律意识、档案责任意识和档案服务意识,以此为整个社会正常的发展作出应有贡献。  相似文献   

2.
档案是人类社会活动的真实记录,是人类文明进步的阶梯.档案工作是人类为了更有效地保存和积累已往的文明成果,并使之更好地服务于人类现实社会活动的工作,档案工作随着社会的进步而进步,随着社会的发展而发展,档案工作必须与社会发展相适应.  相似文献   

3.
1987年颁布的《档案法》是国家档案法制建设的重要措施,对于完善档案法规体系,加强档案管理,有效地保护和利用档案,促进档案事业的建设和发展,发挥了积极作用。本文根据《档案法》的有关条款,谈一下《档案法》对档案事业的作用。 第一、《档案法》有利于维护档案文件的安全和完整。 档案法第十六条规定:“集体所有的和个人所有的对国家和社会具有保存价值的或者应当保密的档案,档案所有者应当妥善保管。对于保管条件恶劣或者其他原因被认为可能导致档案严重损毁和不安全的,国家档案行政管理部门有权采取代为保管等确保档案完整和安全的措施”,“档案所有者可以向有关档案馆寄存或者出售,严禁倒卖牟利,严禁私自卖给外国人”。档案作为人类社会活动的真实记录,由于社会活动的多样性,决定了档案形成的分散性和不确定性。由于人们档案意识上的差异,所以需要以法律的形式规范社会各方面的档案行为,维护国家档案文件的完整与安全。《档案法》在维护档案文件的安全和完整方面,规范了全社会各方面的档案行为,为档案的延续和积累,起到了规范性的作用。 第二、《档案法》维护档案工作的基本原则,从法制角度建立健全了档案工作的规章制度,使档案管理工作有法可依。  相似文献   

4.
张淑芳 《学理论》2013,(19):196-197
档案技术装备评价有利于分析各种主客观因素对档案技术装备使用的影响,提高档案馆(室)既有档案技术装备的社会、经济、管理、技术和安全效率,推动档案馆(室)档案技术装备的科学购置与推广应用。构建档案馆(室)档案技术装备评价的指标体系应当充分考虑其社会、经济、管理、技术和安全五个方面的因素。  相似文献   

5.
档案保护技术,是保障馆(室)藏档案安全的专门技术,是档案馆、档案室等档案存放保管场所的基本安全技术保障,是档案安全管理工作主要内容之一,也是档案学中涉及自然科学与工程技术内容最多的学科。对档案保护技术研究的现状进行归纳梳理,有助于日后这一研究的发展。  相似文献   

6.
哈尔滨市要全面实现小康社会的目标,需要安全的环境作保障.近年来,在市委、市政府的领导下,哈尔滨市社会安全建设取得了丰硕成果,但也存在一些不容忽视的问题,这些问题制约了哈尔滨市经济和社会的发展.本文从哈尔滨市的实际出发,运用一些数据列举了哈尔滨市社会安全建设方面的不足,希望能引起有关方面的重视,从而为哈尔滨市建设"三个适宜"现代文明城市目标的实现扫平障碍,并为哈尔滨市社会的大发展、快发展和好发展提供理论支持.  相似文献   

7.
档案是人类在各个时期社会实践活动的真实记录,是宝贵的历史文化遗产,档案工作是精神文明建设的重要组成部分.重视这项工作,对于建立社会主义共同理想和促进社会主义精神文明的发展,具有极为重要的意义.  相似文献   

8.
随着科学技术的不断发展,计算机技术、缩微技术、声像技术等广泛应用于档案管理工作中,为实现档案现代化管理工作提供了强有力的手段.基层档案室作为档案信息建设的基础部门,搞好档案的现代化管理工作,对推进新时期档案事业发展具有重要意义.  相似文献   

9.
现代社会,各种风险威胁日益凸显,人们更加向往安全,这对政府发展提出了新的衡量标准.从保障公共安全和维护社会和谐出发,对风险社会中政府发展的衡量标准可构想为:四项总体街量标准,即政府的合法性、有效性、回应性和适应性;三项基本指标,即政府能否促进经济和社会的安全发展、能否遏止发展中的副作用、能否满足公众的安全需求;政府发展的具体指标是能否提升政府的相应能力,即增强合法性、回应公众安全需求、适应新挑战、促进安全发展、进行安全决策、实行安全监管、防范风险和处理危机、公正分配价值和风险、维持社会和谐及善于合作治理等方面的能力.  相似文献   

10.
档案是各个时期国家机构、社会组织和个人从事政治、经济、科学、文化等社会实践活动而直接形或的文字、图表、声像等历史记录.同时,档案也是人类活动的记录,是人们总结经验,汲取教训,能动地认识世界、改造世界的有力工具.就强化档案服务意识的重要性进行了分析,并提出具体的强化举措,以此创新档案事业可持续发展.  相似文献   

11.
档案馆是集中保管党和国家重要档案的基地,是社会各方面利用档案信息资源的中心。在当今信息化时代,加强公共服务能力建设,提高公共服务能力,为全面建设小康社会和构建社会主义和谐社会服务,这不仅是各级档案馆自身发展的内在需要,也是新时期经济社会发展的客观要求。本文首先分析了档案馆公共服务存在的问题,以此对症下药,提出了加强档案馆公共服务能力建设的六条建议,希望以此引起大家的注意和重视。  相似文献   

12.
刘少德 《学理论》2011,(36):270-271
针对医院科室教学档案管理的现状及存在的问题,我院在管理模式、管理内容以及管理措施等方面进行了深入细致的研究和积极创新,把科室教学档案作为医院文化建设中的一项重要内容来抓,通过一系列的精心运作,取得了显著成效,为医院迎查评估达标提供了可靠保证。  相似文献   

13.
程晓敏  叶育琦 《学理论》2012,(13):195-197
学籍档案是高校档案的重要组织部分,学籍档案管理工作对保证高校学历电子注册、新生学籍电子注册、学年电子注册工作的完成有不可替代的作用。通过分析高校学籍档案管理面临的挑战,结合学校实际,提出更好地实现学籍利用价值的对策。  相似文献   

14.
Rona Sela 《社会征候学》2018,28(2):201-229
The essay discusses one characteristic of colonial archives – how the ruling state plunders/loots the colonized’ archives and treasures and controls them in its colonial archives - erasing them from the public sphere by repressive means, censors and restricts their exposure and use, alters their original identity, regulates their contents and subjugates them to colonizer’s laws, rules and terminology. It focuses on two archives plundered by Israel in Beirut in 1980s: the Palestine Research Center and archive of Palestinian films. The essay continues my earlier research on Palestinian visual (and other) archives taken as booty or looted by pre-state Jewish military organizations and soldiers or civilians in the first half of the twentieth century, especially during the Nakba (the Palestinian catastrophe, 1948), and later by Israel’s military bodies. It analyzes the plunder itself while focusing on the power relations reflected toward the hybrid gazes of the colonizer and the colonized and discusses colonial features of military archives holding and controlling seized materials. While colonial museums have been largely discussed, and also archives holding colonial history, this is one of the first essays to discuss features of colonial archives holding plundered archives/material.  相似文献   

15.
Among the recently declassified security documents from the MI5 archive have been files about British counter-espionage against the Soviet Union in the 1930s. The collaboration between Russian archivists and western academics and journalists has produced official and unofficial accounts of such espionage from the Soviet perspective. The management of the spies Percy Glading and John Herbert King, and their discovery by British counter-espionage, were interesting examples of the contest between Soviet intelligence and the British security authorities, which highlighted the strengths and weaknesses of both sides in a basically unequal contest.  相似文献   

16.
Since the major British banks first purchased computers in the 1960s, they have been concerned with the security challenges that these machines presented. One of the most potent risks was TEMPEST, the discovery that computers emitted radiation which could reveal the content of information processed by them, even if it had been encrypted. Archival material recently uncovered within the Bank of England’s archives from the mid-late 1970s is presented here to provide a first look at how the Bank evaluated the credibility of the threat posed by TEMPEST and how it sought to manage this new risk.  相似文献   

17.
In 1958 a British serviceman, based near the Woomera rocket range in South Australia, passed secrets to the Soviet Union. They concerned the joint Anglo-Australian guided missile project. Recently-released archival files reveal the intense anxiety, bordering on panic, that this security breach provoked in Canberra and London. The article places this reaction against the background of a long-term quest by Britain and Australia to convince the United States to restore wartime co-operation in the field of atomic technology and lift its embargo on the transmission of classified information. By unraveling, for the first time, the story of the Woomera spy case, the article illuminates issues of security, defence preparations and Anglo-Australian relations.  相似文献   

18.
The May 2002 tranche of British Security Service files released to the Public Record Office included hitherto classified policy files containing documents on Secret Service Committee meetings held from 1919 to 1923. This body wrote an important yet relatively obscure chapter in British intelligence history: the post-First World War reorganization and retasking of British secret service machinery, the focus now being Soviet Russia. However, by encouraging the deliberate overstatement of the Bolshevik 'subversive' threat and then backing excessive measures to counter it, some British officials may have sown the seeds of government's later inability to detect a much graver peril to national security, that of Soviet espionage.  相似文献   

19.
Unknown Agabekov     
The decision to declassify selected historical documents from the archives of the Security Service in 1997 has been a boon to academic historians of intelligence. The declassified files reveal the successes and failures of the Security Service in fulfilling its statutory function of defending the realm. Yet the activity of Soviet spies continues to be one of the most challenging topics in intelligence history. The role of Soviet defectors in transforming the Security Service's understanding of the nature and extent of Soviet intelligence operations, meanwhile, remains largely understudied. In the case of Agabekov, for example, the reaction of SIS or MI5 to his ‘disappearance’ in the spring of 1938 has long been neglected. It is possible that there was no reaction at all, because both services had long-since written off Agabekov as a source. This helps explain why Agabekov's case has been ignored in the relevant literature in both Russia and the West.  相似文献   

20.
This report presents, discusses and extends strategic models for representing the process of merging records from different sources when confidentiality of the records is required by law or custom. Examples and variations on the models cover simple situations, such as eliciting anonymous data from previously identified respondents, as well as more complex merge operations, such as merging files from different data archives and merging data under code linkage systems. The versatility and potential corruptibility of the models are also discussed.Supported by NSF Grants GI29843 and GS320-73X. Professors Eli Rubenstein, Donald T. Campbell, and Lance Hoffman were generous in providing advice on earlier drafts of the paper. However, views expressed here do not necessarily reflect the views of the sponsoring agency or of these individuals.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号