Current location - Quotes Website - Collection of slogans - How to Construct "Smart Policing" under the Background of Big Data Era
How to Construct "Smart Policing" under the Background of Big Data Era
Data is the measure of science and the source of knowledge. With the development of the Internet, especially the mobile Internet, a big data era characterized by information explosion is coming. This is both a challenge and an opportunity for the public security organs. In this regard, we must take innovative ideas and thinking, put in-depth implementation of the strategy of strengthening the police through science and technology and vigorously promote scientific and technological innovation in a more important position, and strive to improve the information, science and modernization level of public security work. ■ Strong Police Forum Li Weiting The era of big data calls for the development of big data. If the past is the era when technology is king, then the era of big data is the era when content is king. As a tool to acquire, process and utilize content, more advanced technology can undoubtedly provide us with better solutions. As far as the application of police information is concerned, in recent years, Zhejiang public security organs have preliminarily solved the deadlock of information island and information fragmentation from the technical level through system integration, which has provided a realistic basis for realizing a wider and higher-level application of * * *. Now the problem has been more focused on how to realize the deep application, comprehensive application and high-end application of massive data, and promote these data from quantitative change to qualitative change. In my opinion, it is necessary to develop data, use mathematical algorithms to analyze and model massive data, dig out the inherent and inevitable causal relationship behind all kinds of data, and then judge the probability of an event and scientifically predict its development trend, thus serving the real struggle of prevention and control. According to the reality of public security organs, we should focus on the following four aspects: second, do a good job in optimizing the technical structure. The key point is to strengthen the top-level design of technical architecture, further optimize the current technical architecture, and focus on combing the infrastructure based on cloud technology; Line carding based on visualization, flattening, integration and one-stop and point-to-point technology; Based on the interaction between internal and external networks, various transmission, storage and calculation implementations are sorted out; Arrange the strategic layout based on security considerations. Third, we should do a good job in preprocessing massive data. The so-called data preprocessing is to screen, filter, classify and correlate all kinds of data, establish a data warehouse similar to "supermarket clean vegetables", provide customized and distributed services according to the needs of specific users, change the chaotic storage situation of original data and improve the application efficiency of data. Strive to realize the transformation from technical service provider to content provider, and establish the data warehouse of public security organs through preprocessing massive data. Fourth, we should establish information standards and norms with a rigid wrist. In the era of big data, information sharing has become everyone's knowledge, and the key is how to make better use of it. To solve the problem of standards and information sharing from the source, we should not only establish the concept of "sharing is the principle, but not sharing is the exception", but also establish the concept of "warehousing is the principle, not warehousing is the exception", and standardize project management, code system, interface, data use and system operation and maintenance. New golden decade Calls for Creating a Big Platform for Innovation 10 Years ago, Zhejiang public security organs, without any successful experience to learn from, built a backbone application system of Zhejiang public security informationization through independent innovation, and embarked on an information development road with distinctive characteristics of the times, Zhejiang characteristics and public security characteristics. If the informationization of Zhejiang public security marked by the prevention and control system was called golden decade of information policing, then the "Smart Zhejiang Public Security" marked by great data integration, fusion and application is undoubtedly another golden decade. For a country, the key to modernization is scientific and technological modernization, and the core is the competitiveness of scientific and technological innovation. Innovation is not a slogan, it must be implemented in action. Specific to the construction of "Smart Zhejiang Public Security", we should focus on five breakthroughs: First, project traction. Only by seeing the outline clearly and grasping the construction of key projects can we promote the construction of general projects. At present, we should focus on the application of police cloud construction, in-depth development and application of PGIS platform, integrated video data mining application, modular, integrated, plug-and-play and rapidly deployable field communication command and support platform, as well as intelligent terminals and personalized and humanized background services. The second is to build an innovative application platform for the whole police. It is to build innovative application platforms of police information such as Google, Facebook, Wiki, Baidu, Tencent, Taobao, Tudou and Youku, and establish the "Apple Store" and "Android Market" of public security organs. It is necessary to screen out a number of innovative small software and tools from existing applications, and also to develop or support a number of business tools to crack down on solving crimes and law enforcement cases. At the same time, it is necessary to develop a number of convenient, low-cost and popular application software for public security basic work, social management and serving the masses, so as to facilitate the police to download applications anytime and anywhere. At the same time, it is necessary to improve the system of invention evaluation and appraisal, copyright protection, reward and recognition. To inspire and protect the creative passion of the police. The third is to build information highlands and special zones. Typical demonstration is an important method to promote the work. To build "Smart Zhejiang Public Security", we should first pay attention to the construction of some pilot counties. Cities should choose a county with good basic conditions as a demonstration county and lead the county to try first. The public security organ at a higher level shall adopt some support policies in terms of project construction, financial subsidies, talent support and work assistance, and give priority to them. The fourth is to make maximum use of the external brain to promote innovation. Division of labor and cooperation is the necessity of modern society, and the development of informatization also needs internal and external cooperation. We should be good at leveraging innovation, comb the content of outsourcing services by comprehensively combing information services, standardize the compilation of outsourcing business directories, and explore and improve the outsourcing service model. As long as society and enterprises can bear it, we must boldly let go of access. At the same time, it is necessary to strengthen strategic cooperation with high-tech units, train a group of development and application-oriented professionals such as technical directors and project technicians, and gradually take the road of independent development and operation and maintenance. The high-risk era calls for a good security "tightening spell". The network has no boundaries. The Internet not only provides great convenience for production and life, but also brings great hidden dangers to information security. In a sense, the Internet era is a high-risk era. In the era of risk, we must have the awareness of risk prevention and the ability of crisis management, bearing in mind "100- 1=0". Without security, this "1" is meaningless. At present, Zhejiang public security organs have more than 5,000 application systems, 3,000 websites, equipment and thousands of T-data, which is a veritable "giant system". Problems with such a large system are inevitable, and the key is to avoid big problems. To keep the bottom line of no data loss, continuous network and no system paralysis, we must always pay attention to nine major security: First, content security, and put an end to "one machine for two purposes". The second is operation safety, focusing on whether the operation platform is reliable, whether the operation system is perfect and whether the operation duty is in place. The third is border security to ensure that the interaction between internal and external networks does not go wrong. Fourth, terminal security, to prevent the loss of police communication, tablet computers and other terminals, to ensure the security of these terminals accessing the system. Fifth, transmission security, to ensure that the network has sufficient bandwidth and stability, to prevent data loss accidents. Sixth, the system is developed safely to prevent the source code from flowing into the society and do a good job in intellectual property protection. Seventh, communication ensures security, improves the stability of the system, and ensures that once a crisis occurs, it can respond quickly and eliminate it quickly. Eighth, the safety of the team itself, adhere to the alarm of anti-corruption and anti-change, constantly fight against corruption and promote honesty, and be honest when dealing with operators and other companies. Nine is the healthy development of the security industry, especially to strengthen the management of video surveillance resources to prevent infringement of people's privacy rights. In the era of innovation, it is the most active factor in scientific and technological innovation to call for a substantial improvement in the quality and ability of the team. Public security science and technology information departments at all levels, as the competent departments of public security organs' informatization construction, directly determine the success or failure of the whole public security informatization construction. First, institutions should be sound, unified and standardized. In accordance with the requirements of clear functions and unified titles, we should vigorously strengthen the regularization of the scientific and technological informatization team. At present, there are still many county-level public security organs that have not established science and technology departments. The author believes that this is to meet the needs of work. Even if the institution is not required to be listed separately, it can be co-located with other departments, but there must be specialized personnel engaged in scientific and technological information work. The appellation should also be unified, the functions should be further clarified, and the relationship with the Information Office and the relationship between the internal administration and the cause of the Science and Technology Department should be gradually straightened out. Second, strengthen training and learning. The pace of informatization development is changing with each passing day. For the police with information technology, learning and training is more important than other police types and should be paid more attention to. According to the development of information technology and the actual needs of public security work, the training syllabus should be adjusted in time. We should not only learn new information technology, but also learn new policy and legal knowledge and new public security business knowledge, so as to promote the integration and mutual promotion of advanced technology and public security business. We should vigorously cultivate expert talents, encourage the police to participate in the qualification certification of various posts, and at the same time, we can transfer a group of grassroots backbone police to special classes and project offices for follow-up training, thus cultivating a group of experts. Third, we must enhance our vitality. To strengthen the exchange of talents, it is necessary to introduce outstanding talents in time and replace those who do not meet the needs of the post in time. We should not only cultivate our own talents based on ourselves, but also look outward and actively borrow talents from companies and enterprises for our use. It is necessary to further improve the exchange and cooperation mechanism, carry out strategic cooperation with large enterprises, carry out micro-cooperation with small enterprises, and continuously inject vitality into the development of public security informatization through multi-level and wide-ranging exchanges and cooperation. Fourth, team culture should be cultivated and accumulated. Culture is the soul of a team, and a team without culture is bound to be fragmented. The IT industry has a special culture. If it is sunrise culture, it represents the trend and the future. We should be good at absorbing the vitality and innovation courage of the IT industry, as well as the unique DreamWorks cultural elements of IT people and the traditional cultural elements of the Chinese nation that are indifferent to light, tranquility and far-reaching. We should do our duty, focus on overcoming difficulties, enjoy the joy of office success and realize our own life value. (Author: Zhejiang Provincial Public Security Department)