首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The secret character of National Security Directives (NSDs) impairs Congress's ability to pursue its constitutionally mandated policy making and oversight roles when the president employs these directives to unilaterally make national security policy. In addition, their typically classified status presents numerous problems for scholars who can monitor the president's unilateral actions when he employs executive orders, proclamations, or executive agreements, but cannot do so in the case of policy created by security classified NSDs. Many of these directives remain classified for significant periods, as the results presented in this article will show. Furthermore, classification and declassification policy is unilaterally set by the president and, therefore, may be arbitrarily altered to lengthen the time it takes for NSDs to become available for congressional and public scrutiny. The article concludes that a statutory basis could provide more government openness and enhance Congress's ability to provide effective oversight of national security policy made through NSDs.  相似文献   

2.
[目的/意义]建立健全情报产品标准及其质量控制机制是确保情报分析产品与服务质量的重要举措。研究美国情报产品标准及其质量控制机制,为我国制定情报产品标准提供参考。[方法/过程]通过考察美国情报界和执法界情报产品规范相关法律政策与标准文件,总结归纳美国情报产品类型、规范与质量控制机制,分析美国情报产品标准设计的基本逻辑与思想。[结果/结论]美国按照项目流程和要素规范管理逻辑,秉持"合法性""实用性""实证性""用户需求导向"的基本理念,遵循"源数据控制、认知缺陷控制、分析过程控制和陈述规范控制"的基本思想,按照"假设-证据(信息)-结论(判断与建议)"的分析框架,从"一般质量要求、内容规范、形式规范、信源属性、用户反馈/质量监管、法庭证词与法律考量"出发规定情报产品标准,通过"情报分析人员自我把关、用户反馈、同行评议、主管机构监管"等四类控制机制,确保情报产品符合"准确、客观、及时、独立"的质量标准,形成相对成熟的情报产品标准与质量控制机制。建议我国借鉴美国经验,立足《国家情报法》,明确情报产品的基本要求,制定统一的情报产品标准,提供情报产品范本,建立有效的质量控制机制,以提高我国情报产品的质量。  相似文献   

3.
新冠肺炎疫情已成为国家重大公共卫生安全突发事件。结合这次重大疫情应对过程,思考情报学和情报工作的作用具有重大的现实意义。文章从情报学视角剖析此次疫情发生、发展与抗击过程中所出现的信息与情报问题;立足总体国家安全观和新“大情报观”,提出国家公共卫生突发事件应对的情报体系框架,并分别对国家公共卫生突发事件预防与应急响应中的情报机制,情报嵌入的预测预警和应急管理系统,基于“数据-信息-知识-情报”信息链的情报工作体系和民众的信息素养与健康促进支持体系进行了阐述,以促进情报学与公共卫生安全领域的交叉与融合,促进公共卫生重大突发事件应对机制和应急管理体系完善。  相似文献   

4.
提出战略情报研究人员的关键信息识别能力同战略情报研究成果质量息息相关,并通过实验,确定国家科学图书馆各类战略情报研究人员的关键信息识别能力,明确主要影响因素,了解战略情报研究人员在关键信息识别中出现的问题,并提出有针对性的措施,提高战略情报研究人员的关键信息识别能力和表音工作质量。  相似文献   

5.
信息犯罪析要   总被引:9,自引:0,他引:9  
当今社会正在快速步入信息化社会。社会信息化给人类生活带来前所未有的便利,同时也对人类生活提出了重大挑战。信息犯罪就是其中之一。目前我国的法律体系对信息犯罪的界定也较零乱,没有系统性,无法有效地遏制和打击这类犯罪行为。因此信息犯罪作为信息法学的一项重要...  相似文献   

6.
[目的/意义]将体验型产品在线评论按照文本长度分为长文本在线评论和短文本在线评论,探究这两类评论的时间和内容特征,为电子商务平台掌握消费者在线评论行为规律和商品需求偏好提供情报依据。[方法/过程]利用Python爬虫语言获取电影评论网站中在线评论的相关信息,构造在线评论时间间隔序列,基于人类行为动力学相关构念,探究不同类型在线评论发布行为的时间特征规律;利用文本挖掘方法找出不同类型在线评论的文本内容特征并进行比较分析。[结果/结论]以电影评论网站在线评论为数据来源,从时间角度总结出不同类型在线评论行为的时间间隔序列符合幂率分布;从文本内容角度发现不同类型在线评论的文本内容特征既有一定的相似性,也表现出明显的差异。  相似文献   

7.
Abstract

This article presents the results of a survey of consortial and reciprocal agreements among academic interlibrary loan departments. An electronic survey was created using SurveyMonkey software. The survey consisted of 18 questions (Appendix A). The questions covered the types of consortial agreements by geographic area, what types of items are loaned, the number of reciprocal agreements, fees for non-member libraries and resource sharing agreements that use integrated library systems. The purpose of the survey was to gather information on the various types of consortial agreements in use today in interlibrary loan departments.  相似文献   

8.
对我国情报学研究中的情报、情报学和竞争情报三个基本问题谈了我的理解,以期促进我国情报工作和情报学研究的发展,推动中国情报界对这些问题的反思。  相似文献   

9.
10.
[目的/意义]对情报概念内涵、情报学理论范式变革、情报工作内涵进行梳理,阐明发展数据驱动型情报研究工作的必然趋势.[方法/过程]通过文献调研,从历史视角梳理信息、情报学的概念内涵和情报工作对象的演化,基于数据-信息-情报-知识-智慧(DIKIW)的相互关系模型,说明在情报工作中数据建设的重要性;将情报学的理论范式分为四...  相似文献   

11.
The Federal Register Act statutorily mandated an official gazette for the Federal Government to provide better accountability for administrative regulations, rules, and orders, and greater transparency in the creation of such law. The later establishment of the Code of Federal Regulations and the enactment of the Administrative Procedure Act added enhancement and incentives to the original act. The National Archives and Record Administration recently celebrated the seventy-fifth anniversary of this publication. The overview of the origins, development, and legacy of the Federal Register provided here was prepared as a background text for an invited lecture by the author at National Archives headquarters marking the creation of the Register and its heritage.  相似文献   

12.
Publishers of books for the library and scholarly markets use prepublication reviews to reduce the risk of publishing a book that does not meet scholarly standards or is not economically justifiable. Book purchasers use postpublication reviews to reduce the risk of spending their budgets unwisely. Despite problems associated with both sorts of review, they are integral to the processes of scholarly communication and academic career advancement. The role and policies ofChoice, a book review journal directed toward scholars and librarians of undergraduate-level collections, are discussed in detail.  相似文献   

13.
This essay argues that Federal Communication Commission's implementation of the universal service requirements mandated by federal law fails to meet any measurable means of reducing the gap between the information haves and have-nots. It is primarily an information poverty reduction program. Introducing the idea of community-based universal service, along with a federally-funded entitlement program for specific local and state organizations, introduces several unsettling and untested aspects to the social equity equation. Gathering better measurements about participants in the program and specific research directions could go a long way toward reducing this uncertainty.  相似文献   

14.
In the summer of 2004, it was revealed that the U.S. Census Bureau had provided tabulations in 2002 and 2003 on Arab Americans to the Department of Homeland Security that included detailed information on the number of people of Arab backgrounds living in selected ZIP codes. Although not a violation of law, the Census Bureau realized that this perceived breach of confidentiality would have a negative impact on public trust, and within a few months following the news of the Arab American tabulations it announced that it would no longer assist law enforcement and intelligence agencies with tabulations on ethnic groups and other sensitive populations. In spite of this damage control, we believe that the Bureau's tabulation of Arab Americans provides momentum to a process that adversely affects data quality by increasing both non-response and the cost of obtaining survey and census data. We argue that there are no “methodological fixes” that can repair the damage, and further that public relations campaigns and internal administrative changes are not optimal solutions because of the governing structure within which the Bureau currently operates. Ultimately, the best way to limit the damage already done is to effect a political solution. Toward this end we describe short- and long-term actions. In the long run, we recommend removing the Census Bureau from the Executive branch of government and re-structuring it under a permanent and non-political oversight panel similar to either the Federal Reserve Board or the Congressional Budget Office. Such a move would make a strong statement that the Bureau is non-partisan federal statistical agency.  相似文献   

15.
在回顾“信息”、“情报”之争的起因以及发展过程和情报学研究现状及存在种种问题的基础上,从语言翻译和逻辑学的的角度阐述目前情报学学科体系的不合理之处以及“信息”和“情报”应该严格予以区分的合理性和必要性,最后并就情报学学科体系重建提出了自己的想法。  相似文献   

16.
National security controls on information and communication have been realized in Australia through various intelligence agencies and acts of the Parliament which, to varying degrees, restrict public access to documents regarded as essential to the “national interest.” This overview describes these entities and laws as well as the role of the Freedom of Information Act. It concludes that, in stark contrast to the United States, there has been a “freeing-up” of national security controls on information and communication in Australia in recent years.  相似文献   

17.
情报学理论研究视野及模式探讨   总被引:7,自引:0,他引:7  
本文以情报学的目标和任务为切入点,在分析和界定了信息、知识、情报概念的基础上,通过分析信息环境变迁中的情报学研究进展,提出了新时期情报学的理论研究模式。  相似文献   

18.
电子政务信息资源开发利用的安全保障   总被引:2,自引:0,他引:2  
安全保障是电子政务信息资源开发利用的重要前提条件。本文从制定法律政策、构建政府信息安全体系、加强个人信息保护等三个方面,论述了做好安全保护工作的措施。  相似文献   

19.
For libraries, the shift from ownership of printed works to access of electronic works has required the negotiation and processing of license agreements. Many rights and restrictions covered in license agreements are in direct conflict with traditional library processes and procedures. These agreements are contracts, based on contract law, and as such often supersede standard library policy based on copyright law. A comparison of rights guaranteed by the copyright law and rights assigned by a selected set of license agreements identifies certain areas of user rights that must be identified and protected.  相似文献   

20.
专利情报与企业专利战略制定   总被引:4,自引:0,他引:4  
在介绍专利情报类型的基础上,构建包含管理、技术、法律状态3方面的专利情报体系,设计出确认竞争对手——分析对手技术实力——评判对手专利战略——预测对手反应模式——制定本企业专利战略的基于竞争对手分析的企业专利战略制定过程,并描绘出专利情报与企业专利战略制定的对应图谱。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号