Menggang Li. Research on Industrial. Security Theory. Springer

Similar documents
Research on Industrial Security Theory

China Semiconductor Industry Association

Undergraduate Program for Specialty of Software Engineering

Session 3:Funding and Financing of Air Cargo Infrastructure and Mobile Equipment. June 27, 2017

Bachelor of Applied Finance (Financial Planning)

Strengthen the Interconnection Cooperation, Promote ICT Development in ASP

Programming Practices By Joe Feliu in conjunction with Harris Kern s Enterprise Computing Institute

!"#$$%&'( )&('*+) *%,"#- )##.+- -#*'(*-% "!) -/)'#-* (*) &&'%/) (+-*4$)33$(-'

The Global Cybercrime Industry

SM04: Transforming Your Security Command Post into a Strategic Information Nerve Center

3M China Overview. Stephen Shafer Vice President & Managing Director Greater China Area. December 12, 2017

ANNA UNIVERSITY :: CHENNAI - 25 TIME TABLE

Course Information

A Scientific Approach to Financial Supernetworks

Industrial and Commercial Bank of China Wins Best Data Center Initiative

August POST GRADUATE DIPLOMA IN BUSINESS ADMINISTRATION

Course information for

SYSTEM CONCEPTS. Definition of a System

Systemic Analyser in Network Threats

Kazakhstan: Balance of Payments and External Debt. for the first quarter of 2017

B.A. IN ECONOMICS AND FINANCE

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN

Textbook of Computable General Equilibrium Modelling

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

DIPLOMA COURSE IN INTERNAL AUDIT

Connecting the Connectivities Symposium 11 June Thailand

FOREIGN DIRECT INVESTMENT IN IRELAND: CONTRIBUTION TO ECONOMIC RECOVERY & FUTURE TRENDS. Brendan McDonagh Director of Strategic Policy IDA Ireland

716 West Ave Austin, TX USA

Chinese International Optical Cable Interconnection

Innovation Beyond Boundaries GE in China title will go here

Construct CPIP, Implement Five Key Projects, and Promote. Urban Informationization in Beijing

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

Thailand Initiatives and Challenges in Cyber Terrorism

Risk Management in Electronic Banking: Concepts and Best Practices

Medium and Long Term Development Strategy of China s Civil Space Infrastructure (2015~2025)

Security and networks

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

Recommendations for Small and Medium Enterprises. Event Date Location

Course Information

Open your sustainable future with JASE-World.

APPENDIX DD. 1. Social Work Combined Program Competencies Outcome Matrix Findings for Each Measurement

The Main Issues and the Game Changing Concepts of Chinese Economy

Organized Crime Agency of British Columbia

DSV XPress. Global Transport and Logistics

South-South Global Thinkers Scoping Paper

BUSINESS OVERVIEW. Customer Services and Market Expansion

Bachelor of Design (Interior Design)

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS

EDEXCEL GCSE BUSINESS (9-1) KNOWLEDGE BOOK. Student Name: Edexcel GCSE Business Knowledge Book Ed1.indd 1 14/11/ :36

China Multi-layer Ceramic Capacitor (MLCC) Industry Report, June 2013

ENGINEERING AND TECHNOLOGY MANAGEMENT

# IT OPERATIONS MANAGEMENT. tweet Book01. Managing Your IT Infrastructure in the Age of Complexity. Book Excerpt

Urban Land Institute. November Make Your Move. Brian Beaulieu ITR Economics.

Standard Course Outline IS 656 Information Systems Security and Assurance

Wire Manager User Guide

Economics: Principles in Action 2005 Correlated to: Indiana Family and Consumer Sciences Education, Consumer Economics (High School, Grades 9-12)

CEMA Marc Mar h c 2013 Alan Alan Beaulieu ITR E c E onomics ITR Economics

BP Neural Network Evaluation Model Combined with Grey-Fuzzy Based on Included Angle Cosine

Transformation Through Innovation

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p

Several factors will be considered when matching instructors with training opportunities identified by Corporate Solutions.

Pakistan-India SCO Membership: Challenges & Opportunities

Industrial And Manufacturing Systems (IMSE)

An Indian Journal FULL PAPER. Trade Science Inc. Research on data mining clustering algorithm in cloud computing environments ABSTRACT KEYWORDS

Company Address: Level 7, Metropolis Tower, No. 2, Haidian East Three Street, Zhongguancun Xi Zone, Haidian District,Beijing, , P.R.

Address: West Wenming Road, Changyuan County, Henan Province, China. Postcode: Lizzy Wu. Short Introduction to Weihua Group

ifo Beitrage zur WSrtschaftsforschung

Undergraduate and Graduate Courses in English BSc in Otaniemi/ MSc in Töölö/ others see weboodi

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

PART I A Technical Guide to Oracle Endeca Information Discovery

Foreign Direct Investment (FDI) and Renewable Energy. Donal Flavin, Strategic Policy Manager, IDA Ireland

China: MVNO and public broadband opened to the private sector on a trial basis

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

2011 Results Announcement China Railway Construction Corporation Limited

AGROBANK. Investment offer for sale of bank s shares

!"##$!%$&'()"*!+,"-#)!.#(#,"/0!1234,$*!5)&

Principles for a National Space Industry Policy

Agricultural Outlook Forum February 21-22, 2008 U.S. Department of Agriculture

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina

Towards Systematic Usability Verification

Commonwealth Cyber Declaration

*Summer training report will be evaluated by external examiner(s)appointed by vice-chancellor on the recommendation of chairman,pgbos.

Evolution of Spear Phishing. White Paper

Charting the Progress of Smart City Development in Shanghai

Only the original curriculum in Danish language has legal validity in matters of discrepancy

FIRST QUARTER 2018 CHARLOTTE-MECKLENBURG GROWTH REPORT

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

2017 Aid for Trade - Partner Country Questionnaire SurveyMonkey

2018 China International Consumer Electronics Show (SINOCES) Invitation

Prentice Hall: Economics Principles in Action 2005 Correlated to: Kansas Social Studies Standards (High School)

BDI The Voice of German Industry. Mittelstand companies in the German economy

An Overview of UN Technology Initiatives. Objective

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

Hitachi s s Business in China: Risk & Reward

From Building Better Models with JMP Pro. Full book available for purchase here.

GRAPHIC COMMUNICATION (GRC)

Slides for courses based on the textbook

Executive Summary. Global Macroeconomic Environment. 2014, implying a slowdown compared to the final results obtained in 2012.

Benefits of Open Cross Border Data Flows

Transcription:

Menggang Li Research on Industrial Security Theory Springer

Contents 1 Introduction 1 1.1 Significance of Studying Theories of Industrial Security 1 1.1.1 Theoretical Significance of Studying Industrial Security 1 1.1.2 Practical Significance of Studying Industrial Security.... 2 1.1.3 Practical Significance of Studying Industrial Security.... 2 1.2 Background of the Study of Industrial Security Issue 4 1.2.1 Status Quo of Foreign Industrial Security Study 4 1.2.2 Status Quo of the Domestic Industrial Security Study... 5 1.3 Logical Framework of This Book 7 1.4 Main Content of This Book 8 1.5 Main Innovations of This Book 10 1.6 Study Methods of This Book 11 1.6.1 The Method Combining Empirical Analysis and Normative Analysis 11 1.6.2 The Method Combining Qualitative Analysis and Quantitative Analysis 12 1.6.3 The Method Combining Statistical Analysis and Comparative Analysis 12 1.6.4 The Method of Case Study 13 1.7 Evolution of Security Outlook 13 1.7.1 Security and Security Outlook 14 References 14 2 Evolution of Security Outlook 15 2.1 National Security 16 2.2 National Security Outlook 18 2.2.1 Realist Security Outlook 19 2.2.2 Liberalist Security Outlook 20 2.2.3 Constructivist Security Outlook 21 vii

viii Contents 2.3 Traditional National Security Outlook 2.3.1 The Theoretical System of Traditional National Security Outlook 23 2.3.2 Features of the Traditional National Security Outlook... 27 2.3.3 External Factor and the Traditional National Security Outlook 28 2.4 Nontraditional National Security Outlook 29 2.4.1 Definition of Nontraditional National Security Outlook.... 30 2.4.2 Theory System of Nontraditional National Security Outlook 32 2.4.3 Characteristics of Nontraditional National Security Outlook 33 2.4.4 Internal Factors and Nontraditional National Security Outlook 34 2.4.5 Comparison of Traditional National Security Outlook and Nontraditional National Security Outlook 35 2.5 Theory of National Economic Security 39 2.5.1 Formation of National Economic Security Outlook 39 2.5.2 Meaning of National Economic Security Outlook 42 2.5.3 Position of National Economic Security 43 2.5.4 Overview of Foreign Theories of National Economic Security 46 2.5.5 Overview of Domestic Studies on National Economic Security 52 2.5.6 Main Contents of National Economic Security 54 2.6 National Industrial Security Outlook 60 2.6.1 Position of Industrial Security 60 2.6.2 Formation of National Economic Security Outlook 62 2.6.3 Basic Theories of Industrial Security 64 2.6.4 Definition of Industrial Security 65 References 65 3 Basic Theories of Industrial Security 69 3.1 Industrial Classification 69 3.1.1 Meaning of Industrial Security 70 3.1.2 Industrial Security and Its Correlativity 77 3.2 New Theories of Industrial Security 83 3.2.1 Industrial Security Is a New Market Failure 83 3.2.2 Industrial Security Is a Social Responsibility 88 3.2.3 Maintenance of Industrial Security Needs Judicial Guarantee 94 3.3 Basic Characteristics of Industrial Security 102 3.3.1 Strategic Characteristic of Industrial Security 102 3.3.2 Comprehensive Characteristic of Industrial Security 104 3.3.3 Urgent Characteristic of Industrial Security 105

Contents ix 3.3.4 Systematic Characteristics of Industrial Security 106 3.3.5 Hierarchical Characteristic of Industrial Security 107 3.3.6 Dynamic Characteristic of Industrial Security 108 3.3.7 Tactical Characteristic of Industrial Security 109 3.4 Classification of Industrial Security 110 3.4.1 Existing Classification of Industrial Security 110 3.4.2 Analysis of Existing Classification of Industrial Security 112 3.4.3 Classification of Industrial Security Based on the Theoretical Frame of Industrial Economics 113 3.4.4 Industrial Security Classification Based on Industrial Classification 115 3.5 Factors Influencing Industrial Security 116 3.5.1 Analysis of Influencing Factors Based on Internal and External Causes 116 3.6 Main Inflow Channels of Hot Money 125 3.6.1 Inflow Through Capital Project 125 3.6.2 Inflow Through Current Project 125 3.6.3 Inflow Through Private Project 126 3.6.4 Inflow Through Illegal Private Bank 126 3.6.5 Inflow Through Nontrade Channel 126 3.7 Main Active Fields of Hot Money and Its Influence in China... 127 3.7.1 RMB Market 127 3.7.2 Stock Market 128 3.7.3 Real Estate Market 128 3.7.4 Private Lending Market 129 3.7.5 Market of Petroleum and Grain 129 3.7.6 Analysis of Influencing Factors Based on the Theoretical Frame of Industrial Economics 164 3.8 Theoretical Model of Industrial Security 165 3.8.1 Basic Model of Industrial Security Theory 165 3.8.2 Theoretical Model of Industrial Security Based on Different Methods of Classification 167 3.8.3 Theoretical Model of Industrial Security Based on Internal and External Influencing Factors 167 3.8.4 Theoretical Model of Industrial Security Based on Influencing Factors of Organization, Structure Deployment, and Policy 168 References 168 4 Analysis of Industrial Security Based on the Theoretical Frame of Industrial Economics 171 4.1 Industrial Organization Theory and Industrial Organization Security 171 4.1.1 Industrial Organization Theory 171 4.1.2 Industrial Organization Security 174

x Contents 4.1.3 Current Situation of China's Industrial Organization Security ^ 4.1.4 Maintenance of China's Industrial Organization Security ^83 4.2 Industrial Structure Theory and Industrial Structure Security.... 188 4.2.1 Industrial Structure Theory 188 4.2.2 Industrial Structure Security 190 4.2.3 Current Situation of Industrial Structure Security of China 198 4.2.4 Maintenance of Chinese Industrial Structure Security... 202 4.3 Industrial Layout Theory and Security 205 4.3.1 Industrial Layout Theory 205 4.3.2 Industrial Layout Security 209 4.3.3 Current Situation of Industrial Layout Security of China 212 4.3.4 Maintenance of Industrial Layout Security of China 214 4.4 Industrial Policy and Security of Industrial Policy 221 4.4.1 Industrial Policy 221 4.4.2 Industrial Policy Security 225 4.4.3 Actual Situation of Industrial Policy Security in China... 229 4.4.4 Maintenance of Industrial Policy Security in China 233 References 239 5 Construction of Theoretical System of Industrial Safety 241 5.1 Theory of Industry Protection 242 5.1.1 Industry Protection Theoretical Review 242 5.1.2 Definition of Industry Protection 246 5.1.3 Classification of Industrial Protection 247 5.1.4 Effect of Industrial Protection 248 5.1.5 Industry Protection Theory in the Opening Market 250 5.1.6 The Main Features of Protectionist in New Situation 254 5.1.7 Industrial Protective Influence of the Global Economy Under the New Situation 257 5.2 Theory of Industrial Damage 260 5.2.1 Definition of Industrial Damage 260 5.2.2 The Causes for Industrial Injury 261 5.2.3 Industry Injury Investigation 262 5.2.4 The Predication of the Damage Magnitude of the Industry 268 5.2.5 The Relief of Industry Damage 270 5.2.6 The Connotation of Industry Injury Theory 272 5.2.7 The Practice of Our Country's Anti-industry Injury 273 5.3 Industry International Competition Theory 277 5.3.1 Industry Competitiveness Is the Core of Industry Safety 278

Contents xi 5.3.2 Theoretical Review of Industrial International Competitiveness 280 5.3.3 Industrial Competitiveness, National Competitiveness, and Enterprise's Competitiveness 282 5.3.4 Basic Method of Analyzing Industry Competitiveness... 285 5.3.5 The Development Stages of Industry's International Competitiveness, 286 5.3.6 The Analysis Framework of the Evaluation of Industrial International Competitiveness 291 5.3.7 Theoretical Connotation of Industrial International Competitiveness 291 5.4 Industrial Control Theory 292 5.4.1 Review of Industrial Control Theory 292 5.4.2 The Definition of Industrial Control 299 5.4.3 Content of Industrial Control 301 5.4.4 Credit Rating Criteria 303 5.5 The Evaluation and Early Warning of Industrial Safety 308 5.5.1 Industrial Safety Evaluation 309 5.5.2 Early Warning System of Industry Safety 309 5.6 The Index System of Industrial Safety Evaluation 315 5.6.1 The Design Principles of the Index System 315 References 316 6 Industrial Security Evaluation System and Early Warning 319 6.1 Introduction 319 6.1.1 Principles 319 6.1.2 Design Procedures of the Indicator System 321 6.2 Industrial Security Evaluation Model 321 6.2.1 Choosing Industrial Security Evaluation Model 321 6.2.2 Output of Industrial Security Evaluation Result 327 6.3 Construction of Typical Industrial Security Evaluation System... 327 6.3.1 Design Procedures of Indicator System 327 6.3.2 Main Content of the Indicator System 329 6.3.3 Industrial Security Evaluation Model 349 6.3.4 Industrial Security Evaluation System and Degree of Security Estimate Analysis Framework 352 6.4 Industrial Security Early Warning 352 6.4.1 Industrial Security Early Warning Method 355 6.4.2 Industrial Security Early Warning Model on the Basis of Quantitative Model 356 6.5 Industrial Security Early Warning System Execution 367 References 369

xij Contents 7 The Evaluation System and Pre-warning of Industry Security 371 7.1 An Empirical Analysis of Industrial Security 371 7.1.1 Manipulation of Different Statistical Criteria 371 7.1.2 The Evaluation of Industrial International Competitiveness 373 7.1.3 The Evaluation of Industrial Foreign Dependency 376 7.1.4 Evaluation of Industrial Control 381 7.1.5 The Preliminary Estimate of Chinese Industrial Safety... 383 7.2 Chinese Industrial Foreign-Controlled Report in 2008/2009 384 7.2.1 Market Control of Foreign Direct Investment in Chinese Industry 384 7.2.2 Foreign Direct Investment in Chinese Industrial Brand Control 390 7.2.3 Foreign Direct Investment Stake in China's Industrial Control 392 7.2.4 Technical Control of FDI Over Industries of China 395 7.2.5 FDI Controlling Over Major Enterprises of Our Industry: Taking the Equipment Manufacturing as the Research Subject 399 7.2.6 Comprehensive Thinking Over the Control of FDI Over Our Industries 399 7.3 Real Evidence of the Insurance Industry Security Early Warnings 400 7.3.1 Security Problems Caused by the Characteristics of Insurance Industry 400 7.3.2 The Analysis and Method Selection of Insurance Industry Security Early Warning System 402 7.3.3 The Analysis and Construction of the Insurance Industry Safety Warning Index System 410 7.4 China's Logistics Industry Safety Evaluation Report 428 7.4.1 The Basic Theoretical Explanation of the Logistics Industry Security 428 7.4.2 The Safety Qualitative Analysis of China's Logistics Industry 43 j 7.4.3 Quantitative Analysis on the Logistics Industry Safety... 436 References 442