scholarly journals A DPSIR-TODIM Model Security Evaluation of China’s Rare Earth Resources

Author(s):  
Yupei Du ◽  
Wenju Wang ◽  
Qian Lu ◽  
Ziyang Li

Rare earth is an important strategic mineral resource for national economy and national security. As the largest producer and exporter of rare earth, China’s rare earth industry has problems associated with excessive production, mismatched pricing power and environmental pollution. Therefore, an in-depth study of the rare earth industry security is necessary. Based on proposed definition for mineral resource security, this paper established a rare earth resource security evaluation model based on the “driver-pressure-state-impact-response” conceptual model using an extended TODIM (an acronym in Portuguese for interactive and multi-criteria decision-making) method combined with the E-DEMATEL (entropy and decision-making trial and evaluation laboratory) method. The model was then applied to Chinese rare earth data from 2006–2015 to assess the security, from which it was found that while the security level was not high, the overall trend was improving. Moreover, some critical response factors affecting REEs (rare earth elements) security are identified, including tariffs, research investment, etc. This paper not only introduces a new evaluation of REEs security but also explores the crucial indicators and the response mechanism.

Author(s):  
Lin Lin

There are several defects with the current evaluation strategy for educational competitiveness of universities, namely, the lack of a well-established evaluation system and the complexity of evaluation factors. To overcome these defects, this paper analyzes the key factors affecting the educational competitiveness of universities, and establishes an evaluation system covering such three aspects as basic input, progress and output. On this basis, an evaluation model was created to assess the educational competitiveness of universities, in the light of multiple factors on varied levels. Overall, our evaluation system and its model can effectively achieve the multi-factor evaluation of the educational competitiveness of universities, providing a good solution to complex system decision-making problems.


Water ◽  
2018 ◽  
Vol 10 (8) ◽  
pp. 1106 ◽  
Author(s):  
Guanghua Dong ◽  
Juqin Shen ◽  
Yizhen Jia ◽  
Fuhua Sun

The security of water resources is the core content and ultimate goal of urban water resource management agencies. The management of water resources is directly related to the needs of urban residents’ lives and the area’s socio-economic development. How to determine the effective evaluation indicators and methods is an important prerequisite to solving the water resource security problem. This study took Luoyang City as the research area and constructed a water resource security evaluation index system based on pressure-state-response framework. An analytic hierarchy process and entropy weight method were used to determine the index weight. A set pair analysis model was then introduced to evaluate the security of water resources in Luoyang from 2006 to 2016. The results of this study show that the standard of water resource security generally improved in Luoyang in the latter years of the study period. From 2006 to 2008, Luoyang was graded at the Insecurity Level. This compares to a slightly improved grading of Critical Security Level from 2009 to 2016 (except for 2013). However, the overall grade is still low. The pressure on the Luoyang water resource system mainly comes from the development of the urban socio-economy, which in turn has caused problems for both the quantity and quality of water resources. Therefore, a series of countermeasures have been introduced as a means of improving the water resource security of Luoyang, and these measures have achieved certain results. However, further improvements to the efficiency of water resource utilization and strengthening the management and protection of water resources remain necessary.


2020 ◽  
Vol 12 (24) ◽  
pp. 10639
Author(s):  
Jawon Kim ◽  
Chanwoo Lee ◽  
Hangbae Chang

This research establishes a security evaluation model from the insider leakage perspective and suggests an objective evaluation measurement. Organizational security risks are fused and compounded both inside and outside the organization. Although multiple security controls are implemented to minimize an organization’s security risk, effective security control requires management to preemptively check the organization’s security level. Existing criteria for evaluating security level are limited to external security risks and have improper limit points for dealing with security risks that are fused and compounded within an organization. The focus of this study is the prevention of technical information leakage. Furthermore, we propose a method for measuring the level at which the objectivity of certain items is secured. We compiled 26 detailed evaluation items, considering the security requirements to prevent technical information leakage. We not only performed suitability, reliability, and factor analyses and statistical validation, but also established a method to measure the security level. This measurement method ensures the effectiveness and objectivity of the evaluation of security level, mitigating the risks of security incidents caused by insiders. The results serve as a reference for organizations when designing security evaluation criteria and automated tools based on our evaluation model for future research.


2017 ◽  
Vol 14 (1) ◽  
pp. 69-73 ◽  
Author(s):  
Kelei Shi

Network information security is controlled by various factors, so its evaluation is a complicated system engineering. In response to the complexity and uncertainty of such factors, we carry out a research on network information security evaluation and propose an evaluation model and algorithm based on grey relational clustering analysis. A comprehensive analysis is made concerning the influencing factors of network information security to establish an evaluation index system for network information security. Furthermore, ideal domains of various security levels are established through normalization of different evaluation indexes, hence calculating the grey relational coefficient and grade between target object and such ideal domains. As a result, we determine the category of network information security level. Finally, a practical case demonstrates that the proposed model is feasible and operable.


2020 ◽  
Vol 39 (5) ◽  
pp. 7571-7585
Author(s):  
Xindong Peng ◽  
Florentin Smarandache

The rare earth industry is a crucial strategic industry that is related to the national economy and national security. In the context of economic globalization, international competition is becoming increasingly fierce, and the rare earth industry is facing a more severe survival and development environment than ever before. Although China is the greatest world’s rare earth country in rare earth reserves, production, consumption and export volume, it is not a rare earth power. The rare earth industry has no right to speak in the international market. The comparative advantage is weakening and the security of rare earth industry appears. Therefore, studying the rare earth industry security has important theoretical and practical significance. When measuring the China’s rare earth industry security, the primary problem involves tremendous uncertainty. Neutrosophic soft set (NSS), depicted by the parameterized form of truth membership, falsity membership and indeterminacy membership, is a more serviceable pattern for capturing uncertainty. In this paper, five dimensions of rare earth industry security are identified and then prioritized against twelve different criteria relevant to structure, organization, layout, policy and ecological aspects of industry security. Then, the objective weight is computed by CRITIC (Criteria Importance Through Inter-criteria Correlation) method while the integrated weight is determined by concurrently revealing subjective weight and objective weight. Later, neutrosophic soft decision making method based CoCoSo (Combined Compromise Solution) is explored for settling the issue of low discrimination. Lastly, the feasibility and validity of the developed algorithm is verified by the issue of China’s rare earth industry security evaluation.


2019 ◽  
Vol 118 (9) ◽  
pp. 154-160
Author(s):  
Dr. Kartikey Koti

The essential idea of this assessment is investigate the social factors affecting particular theorists' decisions making limit at Indian Stock Markets. In the examination coordinated standard of direct is Classified subject to two estimations the first is Heuristic (Decision making) and the resulting one is prospect.. For the assessment coordinated the data used is basic natured which is assembled through a sorted out survey from 100 individual money related authorities based out in Hubli and Dharwad city, Karnataka State in India on an accommodating way. The respondents were both sex and overwhelming part male were 68% . These theorists were having a spot with the age bundle between35-45 which is 38%. These respondents have completed their graduation were around 56%. These respondents had work inclusion of 5 to 10 years which is 45% and the majority of which were used in government portion which is 56%. Their compensation was between 4 to 6 Lakh and were fit for placing assets into business areas. The money related experts were widely masterminded placing assets into different portfolios like 32% in Share market and 20 % in Fixed store. These examiners mode to known various endeavor streets were through News, family and allies.  


1978 ◽  
Vol 17 (3) ◽  
pp. 380-382
Author(s):  
M. Javed Akbar Zaki

To many social theoreticians, the population explosion, particularly in the developing nations presents a crippling threat to their developmental pro¬cesses. Their argument's validity rests mainly on the assumption that expected economic progress is swallowed up by unbalanced rise of numbers in the population. The book being reviewed deals mainly with this subject matter and is divided into two parts, each containing three articles contributed by various researchers. Part one, 'The Social context of Fertility Decision' is focused on analyzing the role of factors affecting fertility at the micro-level decision making process. The first article 'Fertility decision in rural India' by Vinod Jainath, examines the applicability to rural India of various models of the process of fertility decision making and finds most of these wanting with respect to the Indian social situation. While analyzing the fertility patterns of Rural India, he points out the positive need for larger families among the poor small farmers mainly due to labour supply considerations. The author argues that unemployment and under¬employment actually motivate the poor to have more children as it better ensures their economic security in their old age. As the chances of gaining employ¬ment for their offspring diminish, they are induced to increase the total number of children in order that atleast one will be able to support them. Thus a vicious circle of poverty arises in large families because of each of the parents wanting to increase their children's chances of employment by ultimately reducing the overall employment opportunities even further and exacerbating their poverty.


Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


Sign in / Sign up

Export Citation Format

Share Document