期刊文献+
共找到7,048篇文章
< 1 2 250 >
每页显示 20 50 100
A Collaborative Protection Mechanism for System-on-Chip Functional Safety and Information Security in Autonomous Driving
1
作者 Zhongyi Xu Lei Xin +1 位作者 Zhongbai Huang Deguang Wei 《Journal of Electronic Research and Application》 2025年第2期226-232,共7页
This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i... This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements. 展开更多
关键词 Autonomous driving SoC functional safety Information security Collaborative protection mechanism Collaborative protection architecture
在线阅读 下载PDF
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
2
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
3
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security Level protection measurement
在线阅读 下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
4
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
在线阅读 下载PDF
The Looming Threat Blackout of the National Grid and Critical Infrastructure (A National Security Crisis) 被引量:1
5
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2025年第1期31-35,共5页
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy... The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy. 展开更多
关键词 National grid blackout critical infrastructure security EMP cyberattack resilience AI-powered grid protection ML in energy security power grid vulnerabilities physical attacks on infrastructure predictive maintenance for power grids energy crisis and national security
在线阅读 下载PDF
Research on Cybersecurity Threats and Defenses in the Context of Financial Technology
6
作者 Sishan Li Wei Li 《Journal of Electronic Research and Application》 2025年第3期20-24,共5页
With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it ... With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it also poses significant cybersecurity challenges to the financial sector. This study comprehensively analyzes the current state, challenges, and protective measures of cybersecurity in the financial sector, aiming to provide important references for financial institutions in formulating cybersecurity strategies and enhancing risk management. 展开更多
关键词 Financial sector CYBERsecurity protective measures Data security
在线阅读 下载PDF
Financial Data Security Management in the Era of Big Data
7
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期37-42,共6页
In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data te... In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data technology has significantly improved the decision-making efficiency,customer insight,and risk management capabilities of financial institutions.The financial industry has become a pioneer in the application of big data technology,which is widely used in scenarios such as fraud detection,risk management,customer service optimization,and smart transactions.However,financial data security management also faces many challenges,including data breaches,privacy protection,compliance requirements,the complexity of emerging technologies,and the balance between data access and security.This article explores the major challenges of financial data security management,coping strategies,and the evolution of the regulatory environment,and it looks ahead to future trends,highlighting the important role of artificial intelligence and machine learning in financial data security. 展开更多
关键词 Big data Artificial intelligence Data security Privacy protection
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
8
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERsecurity data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
9
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Legal Research on the Protection of the Rights and Interests of Small and Medium-sized Shareholders: Based on the Response of Two-Tier Shareholding Structure
10
作者 Yuji Lin 《Proceedings of Business and Economic Studies》 2025年第3期153-159,共7页
The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier sharehol... The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market. 展开更多
关键词 Two-tier shareholding structure Small and medium-sized shareholders Rights and interests protection securities law Sunset clause Information disclosure
暂未订购
China's food security situation and key questions in the new era:A perspective of farmland protection 被引量:7
11
作者 LIANG Xinyuan JIN Xiaobin +5 位作者 HAN Bo SUN Rui XU Weiyi LI Hanbing HE Jie LI Jin 《Journal of Geographical Sciences》 SCIE CSCD 2022年第6期1001-1019,共19页
As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,tra... As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,transformed supply channels,tightening international situation and frequent emergencies)in recent years and has attracted extensive attention from the academic community subject to multiple factors.This study uses literature review,statistical analysis,and spatial analysis methods to systematically explore China’s food security situation in the context of farmland resource constraints.It is found that the demand-side pressures such as demographic changes,social class differentiation,and dietary structure adjustments derived from economic growth and rapid urbanization have placed extremely high expectations on food supply.However,the quantitative restrictions,utilization ways,and health risks of farmland resources on the supply side constitute a huge hidden concern that affects the stability of food production.Although China’s farmland protection system is undergoing a transition from focusing on quantity management to sustainable use,the matching and coordinating demand pressure and supply capacity for food security is unbalanced.Therefore,facing uncertain future development scenarios,policymakers should focus on building a resilient space for China’s farmland protection to withstand the interference of major emergencies.The existing farmland protection space policy can be integrated by establishing a national farmland strategic reserve system(based on resilient space),and further development of targeted use control measures for zoning,grading,and classification will help realize sustainable China’s farmland resources use. 展开更多
关键词 food security systematical analysis key questions farmland protection resilient space China
原文传递
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
12
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database security and protection System)
在线阅读 下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
13
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationshi... Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
在线阅读 下载PDF
Research of the Farmland Protection Based on Food Security——A Case Study of Anshan City in Liaoning Province, China 被引量:1
14
作者 YANG Rong-li 《Asian Agricultural Research》 2011年第1期93-96,共4页
The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the stu... The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security. 展开更多
关键词 Food security Farmland protection Production capacity Anshan City China
在线阅读 下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
15
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
在线阅读 下载PDF
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments 被引量:1
16
作者 Abdoul-Ramane Abdoulaye Aboudou Yacoubou Mama Aboudou Ramanou 《Journal of Geoscience and Environment Protection》 2015年第5期93-103,共11页
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho... Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments. 展开更多
关键词 URBAN Agriculture Food security Market-Gardening Channel Land Dynamics protection of the Environment Employment Parakou
暂未订购
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
17
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle Database security protection Database Backup Disaster Recovery Colleges and Universities
在线阅读 下载PDF
Protection Model of Security Systems Based on Neyman-Person Criterion
18
作者 Haitao Lv Ruimin Hu +1 位作者 Jun Chen Zheng He 《Communications and Network》 2013年第3期578-583,共6页
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr... In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model. 展开更多
关键词 security System protection PROBABILITY security Network Breach protection PROBABILITY Breach Path
在线阅读 下载PDF
Coordination Mechanism of the Legal Protection of Resource Security with Its Relative Laws
19
作者 Chen Demin Wang Huabing 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第3期21-26,共6页
The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordin... The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility. 展开更多
关键词 resource security legal protection relative laws MECHANISM
在线阅读 下载PDF
China's Labor and Social Security Protection under the Globle Financial Crisis 被引量:1
20
作者 SHI MEIXIA Professor of School of Economics and Management of Beijing Jiaotong University 《The Journal of Human Rights》 2011年第1期14-16,共3页
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati... Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis. 展开更多
关键词 security China’s Labor and Social security protection under the Globle Financial Crisis
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部