|
|
National Security Strategy Information Demand Modeling and Intelligent Matching Research |
Li Gang, Yu Hui, Xia Yikun |
Center for Studies of Information Resources, Wuhan University, Wuhan 430072 |
|
|
Abstract As an important part of national security information management, research on the demand for this information is key to supporting strategic decision-making and has great theoretical and practical significance for improving the overall management ability of national security strategy. This study uses concept analysis, structure analysis, and case analysis to reveal the concept connotation, attribute characteristics, and classification of national security strategic information demand. The study determines the element structure behind the national security strategy's information demand reasoning; puts forward the functional tasks involved in demand perception prediction, analysis and evaluation, and response decision-making; and builds the national security strategy information demand model and intelligent matching framework based on the information process. This provides new ideas and methods for the innovation of national security strategy information management research.
|
Received: 05 February 2021
|
|
|
|
1 习近平: 坚持总体国家安全观, 走中国特色国家安全道路[EB/OL]. (2014-04-16) [2021-10-29]. http://cpc.people.com.cn/n/2014/0416/c64094-24900492.html. 2 Smiljanic D. Development of the Croatian national security strategy in the hybrid threats context[J]. Croatian International Relations Review, 2017, 23(80): 97-129. 3 严鼎程. 李德哈特间接路线战略思想研究[D]. 北京: 中共中央党校, 2018. 4 杨毅. 国家安全战略理论[M]. 北京: 时事出版社, 2008. 5 黄大富. 国防发展战略: 中国军事百科全书[M]. 北京: 中国大百科全书出版社, 2008. 6 刘跃进. 中国官方非传统安全观的历史演进与逻辑构成[J]. 国际安全研究, 2014, 32(2): 117-129, 159. 7 Bailes A J K. Strategy papers on the Arctic or High North: a comparative study and analysis[M]. Islandiae: Sigillum Universitatis, 2012. 8 Finnemore M, Sikkink K. International norm dynamics and political change[J]. International Organization, 1998, 52(4): 887-917. 9 Balcazar Villareal M I. Modernization of the strategic intelligence system for national security in Mexico[J]. Revista de Estudios en Seguridad Internacional-Resi, 2019, 5(1): 71-81. 10 Xiao X. China's national security: strategic challenges and choices[J]. China: An International Journal, 2016, 14(1): 171-181. 11 毛欣娟. 国家安全学科体系构建的内在逻辑与基本面向[J]. 情报杂志, 2021, 40(1): 99-103, 200. 12 Cederberg A, Eronen P. How can societies be defended against hybrid threats?[R]. Strategic Security Analysis, 2015(9): 1-10. 13 Loch K D, Carr H H, Warkentin M E. Threats to information systems: today's reality, yesterday's understanding[J]. MIS Quarterly, 1992, 16(2): 173-186. 14 Janczewski L J, Caelli W. Cyber conflicts and small states[M]. New York: Routledge, 2016. 15 AlGhamdi S, Win K T, Vlahu-Gjorgievska E. Information security governance challenges and critical success factors: systematic review[J]. Computers & Security, 2020, 99: 102030. 16 Betts R K. Enemies of intelligence: knowledge and power in American national security[M]. New York: Columbia University Press, 2007: 67. 17 陈明, 汤文峤. 网络空间安全战略情报保障能力的影响因素及对策研究[J]. 情报杂志, 2021, 40(2): 111-115, 82. 18 王延飞, 赵柯然, 陈美华, 等. 情报感知的研究解析[J]. 情报理论与实践, 2018, 41(8): 1-4. 19 吕宏玉, 杨建林. 基于模板的国家战略情报需求识别研究[J]. 情报理论与实践, 2019, 42(11): 8-14. 20 巴志超, 李纲, 安璐, 等. 国家安全大数据综合信息集成: 应用架构与实现路径[J]. 中国软科学, 2018(7): 9-20. 21 朱宇倩, 王秉. 安全情报感知与分析模型研究[J]. 情报理论与实践, 2021, 44(6): 69-75. 22 雷帅, 李晓松, 陈敬一. 基于WSR-RDJF国防科技战略情报研究的方法框架[J]. 情报理论与实践, 2020, 43(10): 25-30. 23 Sauerwein C, Pekaric I, Felderer M, et al. An analysis and classification of public information security data sources used in research and practice[J]. Computers & Security, 2019, 82: 140-155. 24 IEC I. Information technology-security techniques-Information security management systems-overview and vocabulary[S]. The Spanish Association for Standardization and Certification, 2014. 25 余志伟. 面向业务过程的信息系统安全需求识别方法及其关键技术研究[D]. 杭州: 浙江大学, 2006. 26 Russell N, ter Hofstede A H M, Edmond D, et al. Workflow data patterns: identification, representation and tool support[C]//Proceedings of the International Conference on Conceptual Modeling. Heidelberg: Springer, 2005: 353-368. 27 张尧学, 窦郁宏, 陈松乔, 等. 程序挖掘的用户需求获取与分解[J]. 计算机工程与科学, 2003, 25(1): 1-5. 28 Clark R M. Intelligence analysis: estimation & prediction paperback[M]. Baltimore: Amer Literary Press, 1996: 332. 29 Mursu á, Luukkonen I, Toivanen M, et al. Activity Theory in information systems research and practice: theoretical underpinnings for an information systems development model[J]. Information Research, 2007, 12(3): paper 311. 30 Lim K. Big data and strategic intelligence[J]. Intelligence and National Security, 2016, 31(4): 619-635. 31 王延飞, 陈美华, 赵柯然, 等. 国家科技情报治理的研究解析[J]. 情报学报, 2018, 37(8): 753-759. 32 马晓娟, 陈烨, 闻杰, 等. 战略情报预测模型的作用机理与价值述评[J]. 情报杂志, 2020, 39(8): 6-15. 33 沙勇忠, 徐瑞霞. 基于AT的应急信息需求分析: 框架及实证研究[J]. 信息资源管理学报, 2011, 1(2): 32-48. 34 高金虎. 论战略情报与战略决策的关系——基于美国情报界的历史考察[J]. 情报杂志, 2021, 40(1): 1-11, 18. 35 Herring J P. Building a business intelligence system[J]. Journal of Business Strategy, 1988, 9(3): 4-9. 36 卢英佳. 《爱尔兰国家网络安全战略》简析[J]. 中国信息安全, 2020(9): 64-66. 37 不减反增! 华为再发力, 爱尔兰利润不受5G影响![EB/OL]. (2019-12-12) [2021-01-07]. https://baijiahao.baidu.com/s?id=1652715608662768413&wfr=spider&for=pc. |
|
|
|