首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Concern has been expressed within and outside the United States government about the implications for national security of foreign ownership of and control over aspects of the US defense industrial base and the transfer of militarily sensitive technology to other countries. The focus has rightly been placed on direct contact, through over or clandestine means, between US organizations that are engaged in the development or manufacture of such technology and foreign countries. Avenues of indirect contact and/or access have, however, received less attention. This survey is a review of the various elements of one such avenue-foreign control over or presence in the US financial community. Since finance is an essential element of economic activity and US policy strongly endorses the unfettered freedom of movement of all aspects of economic activity across national borders, a strong foreign presence in the American financial sector is expected and welcomed. Yet the obvious use of finance to control and channel production and distribution leads to consideration of the ways in which foreign interests in acquiring or affecting sensitive technologies can be advanced through financial means.  相似文献   

2.
3.
Demographic changes in Canada have resulted in an increase in the Muslim portion of the Canadian population. The anti-Muslim “Islamophobia” reaction to the 9/11 attacks led to an isolation and marginalization of Canada's Muslim citizens and residents. As the isolation and marginalization of any community creates a National Security vulnerability, the Royal Canadian Mounted Police has been working with Muslim-Canadians using the principles of community policing to create trust and work towards the mutual goals of the safety of all Canadians.  相似文献   

4.
5.
在介绍了数据库安全的重要含义和安全标准等级的基础上,以Hicrosoft SQL Server数据库为例,针对数据库的应用,系统讨论了保证数据库安全所采取的技术手段和措施,重点论述了用户标识和口令、存取控制、视图机制、扩展存储管理、防火墙技术、审计跟踪、数据加密等,从而提高用户对数据库安全的防范意识.  相似文献   

6.
This paper analyzes the technology transfer policies that are being developed to reduce the regional disparities in economic growth in China. In particular, these technology transfer policies focus on increasing the innovative activity in central China, in order to spur economic development and growth.  相似文献   

7.
本文首先叙述了国内外安防的要求与近十年来安防技术的发展,侧重介绍了空间信息与多媒体网络通信技术的发展及在安防中的应用可能性。  相似文献   

8.
论网络主权与新的国家安全观   总被引:4,自引:0,他引:4  
互联网和全球网络空间的兴起发展,使传统绝对化的主权观念受到冲击,网络主权是国家主权在网络环境下的国家主权的自然延伸。互联网的自由化、无边界性与国家独立性、固定边界有着鲜明的不同,国家之间的相互依赖性大大增强,面临的复杂法律问题仅凭一国的力量也很难解决,加之国际组织的权力强化和地位提升,国家不得不让渡部分主权或自我限制主权,以促成国家之间的协调合作。同时国家安全问题也受到前所未有的挑战,信息安全成为国家安全的重要方面,树立新的安全观,提高信息保障能力成为信息时代维护国家安全的必然选择。  相似文献   

9.
10.
11.
张姝 《行政与法》2006,(5):14-16
中国社会保障制度发展不平衡,广泛存在着基于身份的歧视,由于城乡的差别、不同所有制的差别,许多人被排除在社会保障的主体范围之外。不断扩大社会保障覆盖面是我国社会保障制度建设的艰巨任务,也是人民群众最关心、最直接、最现实的利益问题。可以从以下两个方面着手:一是对于目前已经基本定型的城镇社会保障制度,从其防范的风险本身的特点出发,根据不同的社会保障项目内容,将符合条件的群体全部纳入进来;二是根据广大农村的现实情况和需要,逐步建立起农村社会保障制度,使广大农民平等地享有社会保障。  相似文献   

12.
The applied technology transfer process is a communication process based on planning, marketing, and training. Planning is the single most important element, while pre-planning is also essential. The marketing part of applied technology transfer involves an in-depth knowledge of both consumers and products. A sound knowledge of media is also essential. The marketing step is the key delivery or transfer element. Applied technology transfer is a system that requires skills such as management and communication techniques which can be learned in traditional academic courses. However, other skills such as applied human relations are more easily learned under a supervised workshop approach. More complex technology transfer systems require additional training on a continuing education basis. The development of technology transfer learning centers can also be useful. Applied technology transfer is a research investment rather than a cost. It is the technology transfer process that insures the timely application of research effort. Research pay-off is derived from use of research products. Thus, applied technology transfer represents research delivery insurance.  相似文献   

13.
Scholars in technology transfer come from a variety of different backgrounds and employ different theoretical and methodological assumptions. Such multidisciplinary approach has fertilized the evolution of a florid technology transfer literature, with insights from entrepreneurship, economics, and management. This paper brings the perspective of entrepreneurial finance into the realm of technology transfer, and identifies emerging topics that can complement our understanding of some aspects of technology transfer, especially with regard to supply-side public policies. This article introduces the rationale for the special issue dedicated to entrepreneurial finance and technology transfer. We summarize the main topics and themes covered by a selection of papers presented at the annual conference of the Technology Transfer Society in 2013, and suggest areas for future research.  相似文献   

14.
The Journal of Technology Transfer - Nearly 40 years ago Congress laid the foundation for federal agencies to engage in technology transfer activities with a primary goal to make federal...  相似文献   

15.
Frequent tensions continue to plague the operations of multinational corporations (MNCs) in less-developed countries (LDCs). Accusations of insensitivity and heed-lessness toward the needs and aspirations of LDCs are commonplace. In this writer's opinion, negative perceptions of the MNCs' operations result in part from differing “world views” between the two groups that are frequently overlooked in strategy formulation. This paper is an attempt to demonstrate that productive, culturally sensitive strategies can be formulated if MNCs use a multiple-perspective approach in their relationships with LDCs. To illustrate this, cognitive mapping is used to analyze the MNCs' decisionmaking behavior. Use of this process should provide MNCs with an opportunity to evaluate the consequences of their actions, the prospect of more effective strategies emerges.  相似文献   

16.
鉴于国家安全在我国经济和社会可持续发展中居于举足轻重的地位,本文从国家安全的内涵及其发展入手,论述运用环境法律制度保障国家安全的现实急迫性和法理基础,最后提出完善相关环境法律维护国家安全的建议措施。  相似文献   

17.
作为中国经济发展的核心,中国银行业如何抓住机遇、应对挑战,将成为中国经济提升的关键,而金融信息化和信息网络化是中国银行业顺利转型、迅速与世界金融体系接轨的必经之路。信息和网络技术的推广应用给人们带来方便的同时,利用信息网络技术犯罪也在迅速增长。  相似文献   

18.
Pouring millions into R&;D with insufficient innovation and paltry returns? One solution: Revamp the process of bringing a product to market by integrating the efforts of technology and marketing personnel.  相似文献   

19.
20.
As societies and cultures are changed, technology transfer is an integral part of the process of creating a new world order. A primary question is whether technology transfer serves as a force for good or evil. Based on some of the recent history of the United States and the impact oftechnology transfer upon a small group of tribal people in India, this article discusses the need for a social impact analysis approach to ameliorate the negative effects of rapid changes caused by unregulated technology transfer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号