Font Size: a A A

Research On The Application Of Big Data In The Management Of Persons With Terrorism Control

Posted on:2019-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:Q Z HouFull Text:PDF
GTID:2416330563456381Subject:Public security
Abstract/Summary:PDF Full Text Request
On August 31,2015,the Chinese government issued the "Circular of the State Council on Issuing Action Plan for the Promotion of Big Data Development." The issuance of this notice further promoted a sustainable development path for China's big data strategic planning from the national will level,and formed a social wave of attention to big data,mining big data,and using big data in the whole society.The public security organs stand at the forefront of the times,and inevitably they must comply with the trend of big data development,innovate social governance methods,and pay full attention to the important role of big data.The control of terrorism-related personnel is an important part of the public security counter-terrorism work,and it must also comply with the development trend of the times.Through the research on the application of big data in the management and control of humans involved in terrorism,we can understand the seriousness of China's anti-terrorism situation and the status of the use of big data.And this paper explores the application of big data in the management of personnel involved in terrorism.And proposed suggestions for improving the use of big data.This will help open up new perspectives for China's anti-terrorism work,improve the efficiency and quality of the management of personnel involved in terrorism,and safeguard China's national security and stability.The research goal of this paper is to find out a set of big data models in the management and application of human resources involved in terrorism by analyzing the role of big data and its needs and problems in the management and application of humans involved in terrorism.And put forward proposals for improving big data applications.The first step is to analyze the research basis and research significance,and to explain the application of big data at home and abroad in the field of anti-terrorism;The second is to explain the concepts and characteristics of big data and people involved in terrorism,and to analyze the differences between people involved in terrorism and ordinary key personnel;The third aspect is the analysis of the application of big data in the management of terrorism-related personnel,which is mainly based on the needs of the current anti-terrorism situation and the analysis and integration of the data related to terrorism;The fourth aspect is the analysis of the practical problems of big data in the management and application of human resources related to terrorism.The main reason is that the application of big data has a strong dependence on the network,and the construction of the information database related to terrorism and the lack of data sharing mechanisms.The big data warning mechanism is not Perfection,lack of big data analysis talents,etc.;The fifth aspect is a discussion of the possible theoretical models for the use of big data,mainly from data classification,data collection methods,big data management and control systems,and big data analysis.The sixth aspect proposes sound suggestions,including making full use of the people's masses,remedying the blind spot of big data,building a professional database and data sharingsystem,building a big data warning mechanism,conducting international cooperation,training big data talents,and data security.The management of future big data involved in terrorism should focus on solving the problems existing in the real world and continue to improve based on the theoretical model.The application of big data in the management and control of persons involved in terrorism will help enrich the theory of anti-terrorism,which will inevitably increase the social security protection and control capabilities,and open up a new situation for the management and control of people involved in terrorism.
Keywords/Search Tags:Big Data, people involved in terrorism, Control, Data collection and analysis
PDF Full Text Request
Related items