ebook img

Research on Industrial Security Theory PDF

453 Pages·2013·3.865 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Research on Industrial Security Theory

Menggang Li Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory MenggangLi ChinaCentreforIndustrialSecurityResearch Beijing,People’sRepublicofChina ISBN978-3-642-36951-3 ISBN978-3-642-36952-0(eBook) DOI10.1007/978-3-642-36952-0 SpringerHeidelbergNewYorkDordrechtLondon LibraryofCongressControlNumber:2013955584 ©Springer-VerlagBerlinHeidelberg2013 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionor informationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerpts inconnectionwithreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeing enteredandexecutedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplication ofthispublicationorpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthe Publisher’s location, in its current version, and permission for use must always be obtained from Springer.PermissionsforusemaybeobtainedthroughRightsLinkattheCopyrightClearanceCenter. ViolationsareliabletoprosecutionundertherespectiveCopyrightLaw. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexempt fromtherelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. While the advice and information in this book are believed to be true and accurate at the date of publication,neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityfor anyerrorsoromissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,with respecttothematerialcontainedherein. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Acknowledgements IwouldliketoexpressmydeepestgratitudetoAllStar(Beijing)TranslationCo., Ltd., their excellent translators and the whole responsible team. Without such authentic and precise translation, I would not have the opportunity to express my ideas on industrial security to overseas readers. Translators Wang Jinhui and Cao Qijie paid tremendous efforts to provide the best translation version in a limited time and the All Star staff also contributed a lot in coordination and final-period management.Eachofthemdeservescreditforthequalityandstyleofthisbook. v Contents 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 SignificanceofStudyingTheoriesofIndustrialSecurity. . . . . . . . 1 1.1.1 TheoreticalSignificanceofStudying IndustrialSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 PracticalSignificanceofStudyingIndustrialSecurity. . . . 2 1.1.3 PracticalSignificanceofStudyingIndustrialSecurity. . . . 2 1.2 BackgroundoftheStudyofIndustrialSecurityIssue. . . . . . . . . . 4 1.2.1 StatusQuoofForeignIndustrialSecurityStudy. . . . . . . . 4 1.2.2 StatusQuooftheDomesticIndustrialSecurityStudy. . . . 5 1.3 LogicalFrameworkofThisBook. . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 MainContentofThisBook. .. . . .. . . .. . . . .. . . .. . . .. . . . .. 8 1.5 MainInnovationsofThisBook. . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.6 StudyMethodsofThisBook. . . .. . . . . .. . . . .. . . . . .. . . . . .. 11 1.6.1 TheMethodCombiningEmpiricalAnalysis andNormativeAnalysis. . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.6.2 TheMethodCombiningQualitativeAnalysisand QuantitativeAnalysis. . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.6.3 TheMethodCombiningStatisticalAnalysisand ComparativeAnalysis. . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.6.4 TheMethodofCaseStudy. . . . . . . . . . . . . . . . . . . . . . . . 13 1.7 EvolutionofSecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.7.1 SecurityandSecurityOutlook. . . . . . . . . . . . . . . . . . . . . 14 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2 EvolutionofSecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.1 NationalSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.2 NationalSecurityOutlook. . .. . . . .. . . .. . . .. . . .. . . . .. . . .. 18 2.2.1 RealistSecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . 19 2.2.2 LiberalistSecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . 20 2.2.3 ConstructivistSecurityOutlook. . . . . . . . . . . . . . . . . . . . 21 vii viii Contents 2.3 TraditionalNationalSecurityOutlook. . . . . . . . . . . . . . . . . . . . . 22 2.3.1 TheTheoreticalSystemofTraditionalNational SecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 2.3.2 FeaturesoftheTraditionalNationalSecurityOutlook. . . . 27 2.3.3 ExternalFactorandtheTraditionalNational SecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.4 NontraditionalNationalSecurityOutlook. . . . . . . . . . . . . . . . . . 29 2.4.1 DefinitionofNontraditionalNationalSecurityOutlook. . . . 30 2.4.2 TheorySystemofNontraditionalNational SecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 2.4.3 CharacteristicsofNontraditionalNational SecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.4.4 InternalFactorsandNontraditionalNational SecurityOutlook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4.5 ComparisonofTraditionalNationalSecurityOutlook andNontraditionalNationalSecurityOutlook. . . . . . . . . . 35 2.5 TheoryofNationalEconomicSecurity. . . . . . . . . . . . . . . . . . . . 39 2.5.1 FormationofNationalEconomicSecurityOutlook. . . . . . 39 2.5.2 MeaningofNationalEconomicSecurityOutlook. . . . . . . 42 2.5.3 PositionofNationalEconomicSecurity. . . . . . . . . . . . . . 43 2.5.4 OverviewofForeignTheoriesofNational EconomicSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 2.5.5 OverviewofDomesticStudiesonNational EconomicSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 2.5.6 MainContentsofNationalEconomicSecurity. . . . . . . . . 54 2.6 NationalIndustrialSecurityOutlook. . . . . . . . . . . . . . . . . . . . . . 60 2.6.1 PositionofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . 60 2.6.2 FormationofNationalEconomicSecurityOutlook. . . . . . 62 2.6.3 BasicTheoriesofIndustrialSecurity. . . . . . . . . . . . . . . . 64 2.6.4 DefinitionofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . 65 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 3 BasicTheoriesofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . . . . 69 3.1 IndustrialClassification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 3.1.1 MeaningofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . 70 3.1.2 IndustrialSecurityandItsCorrelativity. . . . . . . . . . . . . . 77 3.2 NewTheoriesofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . . 83 3.2.1 IndustrialSecurityIsaNewMarketFailure. . . . . . . . . . . 83 3.2.2 IndustrialSecurityIsaSocialResponsibility. . . . . . . . . . . 88 3.2.3 MaintenanceofIndustrialSecurityNeeds JudicialGuarantee. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 3.3 BasicCharacteristicsofIndustrialSecurity. . . . . . . . . . . . . . . . . 102 3.3.1 StrategicCharacteristicofIndustrialSecurity. . . . . . . . . . 102 3.3.2 ComprehensiveCharacteristicofIndustrialSecurity. . . . . 104 3.3.3 UrgentCharacteristicofIndustrialSecurity. . . . . . . . . . . . 105 Contents ix 3.3.4 SystematicCharacteristicsofIndustrialSecurity. . . . . . . . 106 3.3.5 HierarchicalCharacteristicofIndustrialSecurity. . . . . . . . 107 3.3.6 DynamicCharacteristicofIndustrialSecurity. . . . . . . . . . 108 3.3.7 TacticalCharacteristicofIndustrialSecurity. . . . . . . . . . . 109 3.4 ClassificationofIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . . . 110 3.4.1 ExistingClassificationofIndustrialSecurity. . . . . . . . . . . 110 3.4.2 AnalysisofExistingClassificationofIndustrial Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 3.4.3 ClassificationofIndustrialSecurityBased ontheTheoreticalFrameofIndustrialEconomics. . . . . . . 113 3.4.4 IndustrialSecurityClassificationBasedonIndustrial Classification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 3.5 FactorsInfluencingIndustrialSecurity. . . . . . . . . . . . . . . . . . . . . 116 3.5.1 AnalysisofInfluencingFactorsBasedonInternal andExternalCauses. . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 3.6 MainInflowChannelsofHotMoney. . . . . . .. . . . . . . . . . . . . . . 125 3.6.1 InflowThroughCapitalProject. . . . . . . . . . . . . . . . . . . . 125 3.6.2 InflowThroughCurrentProject. . . . . . . . . . . . . . . . . . . . 125 3.6.3 InflowThroughPrivateProject. . . . . .. . . . . . .. . . . . . .. 126 3.6.4 InflowThroughIllegalPrivateBank. . . . . . . . . . . . . . . . . 126 3.6.5 InflowThroughNontradeChannel. . . . . . . . . . . . . . . . . . 126 3.7 MainActiveFieldsofHotMoneyandItsInfluenceinChina. . . . 127 3.7.1 RMBMarket. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 3.7.2 StockMarket. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 3.7.3 RealEstateMarket. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 3.7.4 PrivateLendingMarket. . . . . . . . . . . . . . . . . . . . . . . . . . 129 3.7.5 MarketofPetroleumandGrain. . . . . . . . . . . . . . . . . . . . 129 3.7.6 AnalysisofInfluencingFactorsBased ontheTheoreticalFrameofIndustrialEconomics. . . . . . . 164 3.8 TheoreticalModelofIndustrialSecurity. . . . . . . . . . . . . . . . . . . 165 3.8.1 BasicModelofIndustrialSecurityTheory. . . . . . . . . . . . 165 3.8.2 TheoreticalModelofIndustrialSecurityBased onDifferentMethodsofClassification. . . . . . . . . . . . . . . 167 3.8.3 TheoreticalModelofIndustrialSecurityBased onInternalandExternalInfluencingFactors. . . . . . . . . . . 167 3.8.4 TheoreticalModelofIndustrialSecurityBased onInfluencingFactorsofOrganization,Structure Deployment,andPolicy. . . . . . . . . . . . . . . . . . . . . . . . . . 168 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4 AnalysisofIndustrialSecurityBasedontheTheoretical FrameofIndustrialEconomics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 4.1 IndustrialOrganizationTheoryandIndustrial OrganizationSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 4.1.1 IndustrialOrganizationTheory. . . . . . . . . . . . . . . . . . . . . 171 4.1.2 IndustrialOrganizationSecurity. . . . . . . . . . . . . . . . . . . . 174

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.