Acceso abierto

Research on Cross-platform Data Interaction and Information Fusion Mechanism of Public Security Intelligence for National Security

 y   
17 mar 2025

Cite
Descargar portada

Schwarck, E. (2018). Intelligence and informatization: the rise of the Ministry of Public Security in intelligence work in China. The China Journal, 80(1), 1-23. Schwarck E. ( 2018 ). Intelligence and informatization: the rise of the Ministry of Public Security in intelligence work in China . The China Journal , 80 ( 1 ), 1 - 23 . Search in Google Scholar

Miller, S. (2022). National security intelligence activity: a philosophical analysis. Intelligence and national security, 37(6), 791-808. Miller S. ( 2022 ). National security intelligence activity: a philosophical analysis . Intelligence and national security , 37 ( 6 ), 791 - 808 . Search in Google Scholar

Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. Szczepaniuk E. K. Szczepaniuk H. Rokicki T. Klepacki B. ( 2020 ). Information security assessment in public administration . Computers & Security , 90 , 101709 . Search in Google Scholar

Srapilov, S. M., Alibayeva, G. A., Zhatkanbayeva, A. Y., Baimakhanova, D. M., & Razzak, N. R. (2023). Problems of improving public administration in the context of digitalisation and informatisation. Electronic Government, an International Journal, 19(5), 586-606. Srapilov S. M. Alibayeva G. A. Zhatkanbayeva A. Y. Baimakhanova D. M. Razzak N. R. ( 2023 ). Problems of improving public administration in the context of digitalisation and informatisation . Electronic Government, an International Journal , 19 ( 5 ), 586 - 606 . Search in Google Scholar

Warkentin, M., & Orgeron, C. (2020). Using the security triad to assess blockchain technology in public sector applications. International Journal of Information Management, 52, 102090. Warkentin M. Orgeron C. ( 2020 ). Using the security triad to assess blockchain technology in public sector applications . International Journal of Information Management , 52 , 102090 . Search in Google Scholar

Xu, Z., Hu, C., & Mei, L. (2016). Video structured description technology based intelligence analysis of surveillance videos for public security applications. Multimedia Tools and Applications, 75, 12155-12172. Xu Z. Hu C. Mei L. ( 2016 ). Video structured description technology based intelligence analysis of surveillance videos for public security applications . Multimedia Tools and Applications , 75 , 12155 - 12172 . Search in Google Scholar

Phythian, M. (2012). Policing uncertainty: Intelligence, security and risk. Intelligence and National Security, 27(2), 187-205. Phythian M. ( 2012 ). Policing uncertainty: Intelligence, security and risk . Intelligence and National Security , 27 ( 2 ), 187 - 205 . Search in Google Scholar

Geng, J., & Wu, X. (2021). Using Information Technology to Study the Construction of Harmonious Relationship between the Police and the People in Public Security Organs under the Public Opinion on Weibo. In E3S Web of Conferences (Vol. 253, p. 01020). EDP Sciences. Geng J. Wu X. ( 2021 ). Using Information Technology to Study the Construction of Harmonious Relationship between the Police and the People in Public Security Organs under the Public Opinion on Weibo . In E3S Web of Conferences (Vol. 253 , p. 01020 ). EDP Sciences . Search in Google Scholar

Meissner, M., & Wübbeke, J. (2016). IT-backed authoritarianism: Information technology enhances central authority and control capacity under Xi Jinping. ChiNa’s Core exeCutive, 52. Meissner M. Wübbeke J. ( 2016 ). IT-backed authoritarianism: Information technology enhances central authority and control capacity under Xi Jinping . ChiNa’s Core exeCutive , 52 . Search in Google Scholar

Mahor, V., Rawat, R., Kumar, A., Garg, B., & Pachlasiya, K. (2023). IoT and artificial intelligence techniques for public safety and security. In Smart urban computing applications (pp. 111-126). River Publishers. Mahor V. Rawat R. Kumar A. Garg B. Pachlasiya K. ( 2023 ). IoT and artificial intelligence techniques for public safety and security . In Smart urban computing applications (pp. 111 - 126 ). River Publishers . Search in Google Scholar

Kumbhar, A., Koohifar, F., Güvenç, I., & Mueller, B. (2016). A survey on legacy and emerging technologies for public safety communications. IEEE Communications Surveys & Tutorials, 19(1), 97-124. Kumbhar A. Koohifar F. Güvenç I. Mueller B. ( 2016 ). A survey on legacy and emerging technologies for public safety communications . IEEE Communications Surveys & Tutorials , 19 ( 1 ), 97 - 124 . Search in Google Scholar

He, R., Xu, Y., & Jiang, S. (2022). Applications of GIS in public security agencies in China. Asian Journal of Criminology, 17(2), 213-235. He R. Xu Y. Jiang S. ( 2022 ). Applications of GIS in public security agencies in China . Asian Journal of Criminology , 17 ( 2 ), 213 - 235 . Search in Google Scholar

Patrick, H., Van Niekerk, B., & Fields, Z. (2016). Security-information flow in the South African public sector. Journal of Information Warfare, 15(4), 68-85. Patrick H. Van Niekerk B. Fields Z. ( 2016 ). Security-information flow in the South African public sector . Journal of Information Warfare , 15 ( 4 ), 68 - 85 . Search in Google Scholar

Zheng, L. (2013). Social media in Chinese government: Drivers, challenges and capabilities. Government information quarterly, 30(4), 369-376. Zheng L. ( 2013 ). Social media in Chinese government: Drivers, challenges and capabilities . Government information quarterly , 30 ( 4 ), 369 - 376 . Search in Google Scholar

Jin, W. (2022). Challenges and innovative countermeasures faced by public administration in the context of big data and internet of things. Mathematical Problems in Engineering, 2022(1), 8949365. Jin W. ( 2022 ). Challenges and innovative countermeasures faced by public administration in the context of big data and internet of things . Mathematical Problems in Engineering , 2022 ( 1 ), 8949365 . Search in Google Scholar

Wang, X. (2019, December). Study on E-government Information Security in the Era of Big Data. In 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 2492-2496). IEEE. Wang X. ( 2019 , December ). Study on E-government Information Security in the Era of Big Data . In 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 2492 - 2496 ). IEEE . Search in Google Scholar

Cordella, A., & Paletti, A. (2019). Government as a platform, orchestration, and public value creation: The Italian case. Government Information Quarterly, 36(4), 101409. Cordella A. Paletti A. ( 2019 ). Government as a platform, orchestration, and public value creation: The Italian case . Government Information Quarterly , 36 ( 4 ), 101409 . Search in Google Scholar

Lv, Z., Li, X., Wang, W., Zhang, B., Hu, J., & Feng, S. (2018). Government affairs service platform for smart city. Future Generation Computer Systems, 81, 443-451. Lv Z. Li X. Wang W. Zhang B. Hu J. Feng S. ( 2018 ). Government affairs service platform for smart city . Future Generation Computer Systems , 81 , 443 - 451 . Search in Google Scholar

Donohue, L. K. (2016). The future of foreign intelligence: privacy and surveillance in a digital age. Oxford University Press. Donohue L. K. ( 2016 ). The future of foreign intelligence: privacy and surveillance in a digital age . Oxford University Press . Search in Google Scholar

(2024). Information Collection; General Services Administration Acquisition Regulation; Electronic Data Interchange (EDI) Information. The Federal Register / FIND(182),76831-76831. ( 2024 ). Information Collection ; General Services Administration Acquisition Regulation; Electronic Data Interchange (EDI) Information. The Federal Register / FIND( 182 ) 76831 - 76831 . Search in Google Scholar

Yijuan Liu,Qi Wang,Zheng Zheng & Lijun Cui. (2024). Control modeling and optimization of network information security system based on deep learning data interaction. Measurement: Sensors101221-. Liu Yijuan Wang Qi Zheng Zheng Cui Lijun ( 2024 ). Control modeling and optimization of network information security system based on deep learning data interaction . Measurement: Sensors 101221 -. Search in Google Scholar

Xin Geng,Yinghong Wen,Zhisong Mo,Peng Dong,Fanpeng Kong & Ke Xiong. (2024). On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport. Electronics(8). Geng Xin Wen Yinghong Mo Zhisong Dong Peng Kong Fanpeng Xiong Ke ( 2024 ). On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport . Electronics ( 8 ). Search in Google Scholar