원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.8
2015.08
pp.385-396
초록
영어
The Information Industry Ecological Security is a combination of security and dynamic development. This paper analyzes the evolution mechanism of Information Industry Ecological Security from the perspective of evolution driving force, evolution process and so on using the theories and methods of Ecology and Synergetics systematically, and take China’s Information Industry Ecological Security as an example of empirical research, then provided a range of effective policy suggestions for relevant Chinese government departments to control and guide China's Information Industry Ecological Security.
목차
Abstract
1. Introduction
2. Information Industry Ecological Security
2.1. Concept of Information Industry Ecological Security
2.2. Characteristics of Information Industry Ecological Security
3. Analysis on the Evolution Mechanism of Information Industry Ecological Security
3.1. Evolution Driving Force of Information Industry Ecological Security
3.2. Evolution Process of Information Industry Ecological Security
4. Evolution Modeling of Information Industry Ecological Security and Empirical Research
4.1. Evolution Process Modeling of Information Industry Ecological Security
4.2. Empirical Research on China’s Information Industry Ecological Security
5. Conclusions
Acknowledgements
References
1. Introduction
2. Information Industry Ecological Security
2.1. Concept of Information Industry Ecological Security
2.2. Characteristics of Information Industry Ecological Security
3. Analysis on the Evolution Mechanism of Information Industry Ecological Security
3.1. Evolution Driving Force of Information Industry Ecological Security
3.2. Evolution Process of Information Industry Ecological Security
4. Evolution Modeling of Information Industry Ecological Security and Empirical Research
4.1. Evolution Process Modeling of Information Industry Ecological Security
4.2. Empirical Research on China’s Information Industry Ecological Security
5. Conclusions
Acknowledgements
References