The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social Security plays an important role in "social power systems" as well as in "social stability system". This paper selected the two variables of social security and the consumption, made analysis using the tool of first-order differential equation. By model analysis, we have concluded that (1) different levels of social security will affect inhabitant expected income, further...
Our country is a multiracial nation. It is need to pay attention to the security of masses' life and property while ensure the economy of each nationality region. This article is to aim at the characteristics of those minority nationality regions. React and manage different emergency immediately. Then ensure the security of masses' life and property. With the development of technology and according...
China's social medical security system includes medical insurance for urban workers, medical insurance for urban residents, new type of rural cooperative medical care and medical assistance. To solve the problem of inadequate and unaffordable medical services, the government has provided a large number of public financial subsidies for this system. But similar to America, China's population aging...
With China's floating population increasing, in some medium cities migrant resident areas have formed. The migrant resident areas are the areas that are located in urban and rural fringe of the city with mixed residence, easy to have law and order problems and should be controlled by the public security strictly. This article analyzes three management models of the public security organs about migrant...
Based on the premise of the urbanization of the rural migrant workers, the author analyses their housing situations and the reasons for the problems, and then puts forward some suggestions for the existing household registration system, including establishment of a multi-level housing security system, increase of the public policy support for migrant workers, urban planning policy related to the urbanization...
In the background of the global financial crisis, the public economic policy to play an important role as the operational guidelines and measures of regulating macroeconomic and controlling to guide people's economic activities. This article talked about the response initiatives of the public economic policy in the financial crisis based on the categories of the public economic policy, which from...
M-GBCP is a new topic in the field of e-GBCP, and regarded as the application of wireless communication technology and computer technology in the public management, which provides public service for the public through mobile terminal and network technology. This paper examines provision of public service based on mobile communications technology.
This paper analyzes and compares country code Top Level Domain (ccTLD) administration policies. The study investigated the effect of security-related components of these policies on the ccTLD security to determine whether the strength of the security components had any significant effect on the rate of malicious activities in the domains. To achieve this, thirty ccTLDs were selected based on the Human...
Biometric represents in our days a solution to a lot of the user identification and security problems. The abuse on personal information's and misuse, intentional and inadvertent is a gaping hole in many security equipments. Our paper will examine almost all the technological and feasibility aspects that can be used in developing applications such as biometrical passport. Many negative aspects influence...
Scientific and accurate evaluation of the government crisis management capabilities, which is the foundation for comprehensive risk management. Comprehensive identification and analysis of factors that affect the public sector crisis management capabilities and scientific designing of the crisis management capability evaluation system and choosing a suitable method of the evaluation model will be...
Canada has gained a world-leading position in the science and technology of cabled ocean observing systems, principally through the federal and British Columbia (BC) government investments ($120M) in the VENUS and NEPTUNE Canada ocean observatories, now deployed in coastal to deep ocean waters off BC's West Coast. The combination of continuous power, high bandwidth and real-time data streaming make...
The ideas that democratic governments should be open, accessible, and transparent to the governed are not new ones, but they are receiving renewed emphasis through the combination of government reform efforts and the emergence of Web 2.0 social media tools that promote information sharing, integration, and public discourse. Although these initiatives are young, they already exhibit daunting complexity,...
In order to solve the issue on housing shortage of Low-income families, Government vigorously promotes the construction of public housing. To discover the security level of public housing, the paper set up the public housing public satisfaction evaluation index system, and also built the public housing public satisfaction evaluation model. Then, it used the survey data of a public housing residential...
This paper examines the development in Ontario of the `enhanced driver's licence' as a passport substitute for entering the US, including the public discussion surrounding it. We discuss the significant security, privacy, and identity risks that outweigh the benefits claimed, and call for more effective public participation in decision making over future ID schemes.
The problem of rural public service is an important part of public administration, public service and rural social development theory. The paper systematically combs the defining methods of ldquopublic servicerdquo at home and abroad and scientifically defines the concept of ldquorural public servicerdquo by using the logic and perspective of public administration on the basis of fundamental principles...
Can an ad hoc team be assembled at a moment's notice and perform as though they address (every single day) the exact public disaster before them, regardless the scale and complexity, even if it has never been considered before? Can they create a response that not only demonstrates the capability, competence and capacity to respond, but also the precision, predictability and confidence the public deserves?...
A technical transaction support environment to be used in the field of e-government is introduced. A transaction platform provides electronic services offered by public administration. Citizens can access these services by using smartcards and perform transactions as self-service. A case study focuses on automating enquiries previously handled by the registration office. It shows a sample implementation...
The enhanced development of information and communication technologies in government has created new opportunities for agencies to collect, share and re-use data. At the same time, the commercial worth of governmental data sets and value-added information products/services have increased. Government agencies are finding that data they have routinely collected to fulfil their statutory and business...
The e-government system faced the multi-level security threat, which has influenced the exertion of the systematic function of the e-government. This paper analyzed the security demand for the e-government system separately from the physical layer, network layer, system layer, using layer and administration layer; introduced the method model that the security system of the e-government system designed...
To actualize information resources sharing and improve the applied value of information in E-government, the construction of information resources management center is needed to conduct. Based on the previous research, this paper puts forward a general frame of information resources management center, with data exchange center, data center, disaster recovery backup center and information service platform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.