Font Size: a A A

The Challenge And Countermeasure Of National Security In The Big Data Age

Posted on:2016-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2176330470950780Subject:Public administration
Abstract/Summary:PDF Full Text Request
National Security is a cornerstone of consolidating the stability and peace of the country,which is related to the existence and development of the country. In recent years, the term “bigdata” has growingly appeared in the view of human beings who are undergoing theunprecedented data explosion. With its rapid development, big data has permeated in variousfields and been employed extensively in field of national security, greatly affecting the nationalsecurity. As China is currently undergoing profound social changes against the fiercelychangeable international situation, domestic reform moves onto the period of overcoming greatdifficulties and into the critical and crucial parts; thus, the risks of non-traditional security hasrose, and there is much to do to maintain national security. The Chinese government has beenfully aware of the significance and urgency of protecting national security in new era, so it hasestablished Central National Security Committee and published National Security StrategyScheme, which attaches more importance to the national security issues. While the era of bigdate brings in-depth changes to social life of human beings, it also poses great challenges tonational security. Therefore, it has become an unavoidable and urgent issue to carefully studynational security theory, fully and correctly understand the interrelations between developmentof big data and national security, and based on this to come up with recommendations andmeasures so as to effectively meet the challenges to national security brought by big data.This thesis is comprised of seven parts:The first part is the introduction that explains the background and significance of thechosen topic, summarizes the research related to the chosen topic in China and abroad, anddetermines the research objective and methodology of this thesis.Relevant concepts and rationale are expounded in the second part of this thesis, in whichthe big data and national security are defined, the characteristics of big data is generalized, theoccurrence and development of big data and national security are introduced, the factorsaffecting national security are summarized. And it provides the theoretical basis of this thesis.The impacts of big data on national security are discussed in the third part. Throughanalyzing the connotations of big data as well as mechanism of big data affecting nationalsecurity, the thesis explains the interrelations between big data and national security. Throughanalyzing the characters of big data, the thesis analyzes the challenge of big data to nationalsecurity.The fourth part is case study. By studying the typical cases where the national security isendangered, such as “PRISM Gate”,“Jasomine Revolution”, Hong Kong “Occupying Central”Movement, Xinjiang Violent and Terrorist Events, Weng’an Event, Qidong Event, andso forth, the thesis analyzes the great challenges brought by the big data from the perspective ofinformation security, political security, ideological security, social stability, and public security.The fifth part presents analysis concerning the foreign countries reactions to the big datatimes in terms of national security. The thesis analyzes the reactions by the USA, the UK, France,Germany, Russia, and Japan and summarizes the pros and cons of these reactions in order toshed light on the measures taken by China.In the sixth part, the thesis provides the measures in response to the big data times. It putsforward the principle of reactions from the perspective of national security in the big data times,and provides specific measures in response to big data times from ideological, management,social reality and technological perspectives.The seventh part concludes the thesis.
Keywords/Search Tags:National Security, Big Data, Challenge, Countermeasures
PDF Full Text Request
Related items