Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (10): 79-82    DOI:
Current Issue | Archive | Adv Search |
Analysis on the Significance of the Application of Big Data in Improving the Government Emergency Management Ability
Kuang Hui
Guizhou Provincial Committee Party School of C.P.C
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Big data shows us the development direction of the Internet. The studies on the application of big data can provide an effective way for the government to upgrade public management and public services. The purpose of this article is to explore how the big data applications improve the efficiency of the government emergency management from the connotation of the big data and the present situation. At the same time, in the application of big data, it is also important to pay attention to the protection of data security, to improve the privacy policy, and to keep the balance between public safety and citizen privacy.
Key wordsapplication of big data      emergency management      data security     
Published: 09 November 2017
:  TP311.13  

Cite this article:

Kuang Hui. Analysis on the Significance of the Application of Big Data in Improving the Government Emergency Management Ability. Computer & Telecommunication, 2015, 1(10): 79-82.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I10/79

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[3] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[6] ZHANG Yuan-yuan. Discussion on Data Security in Cloud Computing Environment[J]. 电脑与电信, 2017, 1(12): 64-66.
[7] HAN Lei, CHEN Han, HAO Xiao-xue. Research on Security Management Scheme of Enterprise Hadoop Big Data Platform[J]. 电脑与电信, 2017, 1(11): 40-43.
[8] Li Ruiqiang. Research on Cloud Computing Data Security Protection[J]. 电脑与电信, 2017, 1(10): 89-91.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd