用户名: 密码: 验证码:
信息腐败研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着改革开放的日益深入,全球信息化的不断加速,我国经济体制正在经历着从社会主义计划经济向社会主义市场经济体制转变的过程中。经济实力不断提升,但是人们的思想也相继发生变化,道德约束逐步降低,各种腐败不断发生,信息腐败就是其中一种。信息腐败由于其隐蔽性强、可控性差、破坏性大,造成公共信息资源产权转移、信息资源价值消减以及政府权威减低,社会公众对公共信息资源存取的积极性和参与性降低,导致社会信息分化,甚至阻碍社会信息化进程,因此信息腐败逐渐引起了政府和学者的广泛关注。
     本文研究了与信息腐败相关的理论,引入信息传输模型,分析了信息腐败行为的构成要件,建立了信息腐败产生模型,并对模型进行了解释和验证,最后提出了信息腐败预防与惩治的若干建议。
     (1)信息腐败相关理论研究
     从信息腐败产生的背景引出相关问题,提出信息腐败研究的目的和意义,以文献综述的形式评述了国内外对信息腐败研究关注的焦点和热点,厘清本文的研究思路和研究内容。信息腐败涉及到信息学、经济学、社会学以及政治和法律等学科,论文就相关的理论进行了探讨,阐述相关理论与信息腐败之间的关系,例如信息资源的配置、“经济人”假设和寻租理论等,为信息腐败产生模型的构建提供依据,并奠定理论基础。
     (2)信息腐败产生模型研究
     以阐述信息论中的“信息传输模型”为切入点,引入“经济人”假设,在遵循模型构建步骤的基础上,分析了信息腐败行为的构建要素,从而构建了信息腐败产生模型。利用该模型解释信息腐败产生的动机、发展的过程以及信息腐败的特点,最后以两个典型案例为例证明信息腐败产生模型构成要素的完备性以及相互作用的合理性。
     (3)信息腐败危害与防治对策研究
     首先分析信息腐败产生的危害,存在公共信息资源产权转移、政府权威降低、信息分化加剧,甚至阻碍社会信息化进程等危险;其次提出了信息腐败发生与防治的成本曲线,说明信息腐败的防治目标是使其发生的次数较低,而难以杜绝;最后提出信息腐败防治的理论框架图,在“经济人”假设的基础上,从信息腐败行为动机和发生机会(信息腐败手段和方式)两个途径提出防治的建议,为提高社会公众信息素养、加强法律体制建设、完善监督体系等方面进行信息腐败防治提供参考。
With Reform and Opening-up increasing deeply, the global information has been accelerating. Economic system of China is being transformed from the socialist planned economic system to the socialist market economic system. With economic growth, people's thinking has also changed and moral is going deterioration. Some kinds of corruptions happen continuously and information corruption is one of them. Because of strong concealment, poor controllability and strong destruction of information corruption, it results some disasters. For example, property rights of public information resources are transferred improperly, the values of information resources are damaged and authorities of governments are decreased. It is difficult for public to access public information, so that leads to social information gap and hinders development process of social information. Information corruption has gradually attracted more and more attention of the governments and researchers.
     This dissertation studies some theories which relate to information corruption, proposes a generation model of information corruption based on transmission model, and analyzes the components of information corruption, then lists some cases explaining and validating above model. Finally some prevention and punishment suggestions about information corruption are given.
     (1) Theories related to information corruption
     Based on analyzing the background of information corruption, aim and significance of this dissertation are introduced. It reviews the focuses and hotspots of information corruption at home and abroad through literature review, and defines contents and research methods. Information corruption is involved in lots of disciplines, such as information science, economics, sociology, politics, law and so on. It discusses the related theories, illustrates the relationship between them, including information resource allocation, hypothesis of economic man, theory of rent-seeking, which provides the theoretical basis for the construction of the generation model of information corruption.
     (2) Generation model of information corruption
     Firstly, it details information transmission model, and introduces the theory of Hypothesis of Economic Man, then analyzes elements of information corruption which are based on the methods of constructing model. Secondly, it establishes generation model of information corruption which combines information transmission model with corruption. Then it explains the model from different perspectives which include motivation of generation, process of development and characteristics of information corruption. Thirdly, making use of two cases, this dissertation tries to verify whether above model includes necessary elements, and interaction between the elements is reasonable. From the cases, it proves that the model reveals process of generation of information corruption well.
     (3) Suggestions about prevention of information corruption
     First of all, this dissertation analyzes the dangers of information corruption, such as transfer of property rights of public information resources, reduction of the government authority, increase of the information differentiation, and inhibition of social informationization. Besides, according to above disadvantages, this dissertation proposes the cost curve of occurrence and control of information corruption, and illustrates that goal of prevention of information corruption is to decrease opportunity of its occurrence, but it is difficult to elimination information corruption. Finally, this dissertation constructs a framework of the prevention and control of information corruption. It puts forward prevention and control suggestions from the behavior motives and happens opportunities (information corruption means and methods) based on the theory of Hypothesis of Economic Man, which will facilitate to improve public information literacy, strengthen legal system and perfect the supervision system.
引文
[1]丹尼尔.贝尔.信息社会的社会结构[M].北京:科学技术文献出版社,1984.
    [2]谢俊贵.信息的富有与贫乏:当代中国信息分化问题研究[M].上海:上海三联书店,2004.
    [3]胡鞍钢.中国:挑战腐败[M].杭州:浙江人民出版社,2001:3-4.
    [4]任建明,杜志洲.腐败与反腐败:理论、模型和方法[M].北京:清华大学出版社,2009:6-7.
    [5]亨廷顿.变化中的政治秩序[M].北京:生活·读书·新知三联书店,1988:54.
    [6]李文生.腐败防治论[M].北京:中国检察出版,2004:4-7.
    [7]董振华.如何有效遏制边缘腐败[OL].[2011-05-27].http://www.hbshgzx.com/Article/lzwh/201105/1805.html.
    [8]孙秀娟,李颜峰.论我国政府信息公开中公民参与权的完善[J].科协论坛,2010(3):173,174.
    [9]夏义堃.公共信息资源的多元化管理体制研究[D].武汉:武汉大学,2005.
    [10]谢俊贵,王丹凤.另类黑洞:当代社会的信息腐败问题[J].高校图书馆工作,2007,27(3):25-28.
    [11]同[8]
    [12]叶国平.边缘腐败的十种表现[J],瞭望新闻周刊,2003,(38):30-31.
    [13]易伍林.两类水库移民社会网现状对比研究-以江西永修境内的三峡移民和新安江移民为例[D].福州:福州大学,2004.
    [14]赵晓.确立公共信息的产权制度[N].经济观察报,2003-12-01.
    [15]同[10]
    [16]同[8]
    [17]同[13]
    [18]同[14]
    [19]同[10]
    [20]同[9]
    [21]戴艳清.公共信息资源的有偿服务有其政府规制[D].湘潭:湘潭大学,2009.
    [22]杜刚.论大众媒介在党的执政中的地位和作用[J].中国特色社会主义研究,2010(5):62-64.
    [23]石晓军,肖远文.信息垄断、信息民主与信用信息[J].江西财经大学学报,2004(5):77-79.
    [24]刘波.缓解社会信息分化的几点思考[J].现代企业教育,2008(7),145-146.
    [25]陈传夫,姚维保.我国信息资源公共获取的差距、障碍与政府策略建议[J].图书馆论坛,2004,(6):54-57.
    [26]路小红.信息不对称理论及实例[J].情报理论与实践,2000,(5):337-339.
    [27]同[10]
    [28]同[9]
    [29]殷晓婷.腐败现象的经济学分析[J].网络财富,2009(8):150-152.
    [30]于小鹏.关于权力腐败之成因及其应对措施的分析-以甘肃近年来发生的领导干部违纪违法案件为例[D].北京:中国政法大学,2010.
    [31]罗松江永.秘书腐败的信息优势及途径探析[J].企业导报,2010(4):204.
    [32]同[9]
    [33]白华.政府信息公开制度中的几个问题[J].情报理论与实践,2004,27(3):259-261.
    [34]同[10]
    [35]孙颖.非物质性贿赂探析[J].现代商贸工业,2010(16),298.
    [36]肖引.建立政府和部门统计数据的共享机制[J].统计与决策,2010(14):71-72.
    [37]P. Ruch. Evaluating and reducing the effect of data corruption when applying bag of words approaches to medical records[J].International Journal of Medical Informatics,2002 (67),75-83.
    [38]N.Paulauskas. Computer System Attack Classification [J].ELECTRONICS AND ELECTRICAL ENGINEERING,2006,2(66):84-87.
    [39]Yih Huang. Tree-based link-state routing in the presence of routing information corruption [J].Computer Communications,2003 (26):691,699.
    [40]Marco Celentani. Corruption and competition in procurement [J].European Economic Review,2002,46(7):1273-1303.
    [41]John C. Bertot. Using ICTs to create a culture of transparency:E-government and social media as openness and anti-corruption tools for societies [J].Government Information Quarterly,2010(27):264-271.
    [42]Seongcheol Kim. An institutional analysis of an e-government system for anti-corruption:The case of OPEN[J]. Government Information Quarterly, 2009(26):42-50.
    [43]Nuno Garoupa. Further notes on information, corruption, and optimal law enforcement [J].Eur J Law Econ,2007 (23):59-69.
    [44]同[9]
    [45]同[8]
    [46]同[13]
    [47]同[14]
    [48]陈光华.论社会结构性信息分化的宏观调整[J].情报杂志,2008(3):127.
    [49]朱琨.信息资源分布不均衡及其对社会发展影响的研究[D].成都:成都理工大学,2007.
    [50]同[10]
    [51]同[35]
    [52]刘鑫.基于知识自由的图书馆精神研究[D].哈尔滨:黑龙江大学,2007.
    [53]耿耳火.我国信用体系建设中存在的问题与对策[J].经济研究参考,2005(19):1-3.
    [54]同[23]
    [55]同[21]
    [56]费长山.论人权原则与政府信息公开[J].时代法学,2010,8(2):30-36.
    [57]王杰.浅议信息政策法规在信息资源配置中的价值选择[J].科技信息,2008(1):323,325.
    [58]陈丹,赵树宽,巩顺龙.电子商务的信用管理体系构建研究[J].情报科学,2006,24(1):47-51.
    [59]Marsha Woodbury. Information Integrity in Africa:Exploring Information Corruption Issues[J].International Review of Information Ethics,2007 (7):229-235.
    [60]同[9]
    [61]同[21]
    [62]同[10]
    [63]同[24]
    [64]同[48]
    [65]王株梅.信息公平若干问题研究[D].哈尔滨:黑龙江大学,2007.
    [66]王珠梅,马海群.效率和公平:网络信息资源建设和配置中信息政策法规的价值[J].图书与情报,2006(5):43-47,55.
    [67]孙越.基于公共信息普遍获取的信息公平研究[D].哈尔滨:黑龙江大学,2010.
    [68]同[31]
    [69]同[8]
    [70]同[36]
    [71]沈光宝.我国信息资源均衡配置模型探讨[J].情报科学,2009,27(4):493-496.
    [72]同[57]
    [73]庄善洁.信息政策法规在信息资源有效配置中的价值取向[j].科技情报开发与经济,2007,17(14):113,114.
    [74]史磊.政治发展视角下的电子政府构建[D].太原:山西大学,2008.
    [75]李倩倩.建设电子政府与提升政府服务品质[D].南京:南京师范大学,2006.
    [76]施志君,乐娜.论网络“把关人”对网络媒体公信力的影响[J].湖北民族学院学报,2007,25(3):112-115.
    [77]宋祥军.试论编辑在信息传播中的把关作用[J].喀什师范学院学报,2009,30(6):91-93.
    [78]Keun Namkoong.Controlling Corruption from a Governance Perspective: Explaining the Korean Pact on Anti-corruption and Transparency[OL]. [2011-03-21]. http://pubadmin-snut.net/data/upfile/anitcorruption(IRPA-%EC%AO %9C%EC%B6%9C%EB%B3%B8).doc.
    [79]S B Gardne,J K Uhlmann. A Decentralized Data Fusion Framework for Horizont al Integration of Intelligence Data[P].International Conference on Intelligence Analysi s(2005).https://analysis.mitre.org/proceedings/Final_Papers_Files/69_Camera_Ready_Paper.pdf,2011-3-21.
    [80]Sheldon B.Gardner.Horizontal Integration based upon Decentralized Data Fusion (DDF),NetCentric Architecture(NCA),and Analysis Collaboration Tools(ACT)[R]. htt p://www.stormingmedia.us/62/6204/A620464.html,2011-3-21.
    [81]James R. Barth. Corruption in bank lending to firms:Cross-country micro evidence on the beneficial role of competition and information sharing[J]. Journal of Financial Economics,2009(91):361-388.
    [82]Benjamin A. Olken. Corruption perceptions vs. corruption reality[J].Journal of Public Economics,2009(93):950-964.
    [83]Jean-Jacques Laffont. Competition and corruption in an agency relationship[J]. Journal of Development Economics,1999(60):271-295.
    [84]RORY TRUEX. Corruption, Attitudes, and Education:Survey Evidence from Nepal[J].World Development,2010,11 (3):1-10.
    [85]马费成.信息资源管理[M].武汉:武汉大学出版社,2001.
    [86]同[85]
    [87]百度百科.模型定义[OL].[2011-08-12].http://baike.baidu.com/view/96500.html.
    [88]罗金增.论图书馆学情报学研究中的模型方法[J].图书情报工作,2008,52(12):25-132.
    [89]P.A.Samuelson The pure theory of public expenditure [J].Review of Economics and statistics,1954 (36):387-389.
    [90]赵成根.新公共管理改革-不断塑造的平衡[M].北京:北京大学出版社,2007:63.
    [91]维基百科.经济人[OL].[2011-08-04].http://zh.wikipedia.org/wiki/%E7%BB%8F%E6%B5%8E%E4%BA%BA.
    [92]百度百科.“经济人”假设[OL].[2011-08-04].http://baike.baidu.com/view/61950.html.
    [93]百度百科.寻租理论[OL].[2011-08-04].http://baike.baidu.com/view/241909.html.
    [94]任建明,杜志洲.腐败与反腐败:理论、模型和方法[M].北京:清华大学出版社,2009:84,85.
    [95]任建明,杜志洲.腐败与反腐败:理论、模型和方法[M].北京:清华大学出版社,2009:89,90.
    [96]宋小卫.略论我国公民的知情权[J].法律科学,1994(5):14-18.
    [97]蒋碧昆,鲁志坤.初析公民的了解权利[M].西安:电子科技大学出版社,1999.
    [98]百度百科.政务公开[0L].[2012-05-04]. http://baike.baidu.com/view/68640.htm.
    [99]吴佩华.政府信息公开制度研究[D].苏州:苏州大学,2003.
    [100]罗曼.信息政策[M].北京:科学出版社,2005.
    [101]黄瑞华.信息法[M].北京:电子工业出版社,2004.
    [102]周庆山.信息法[M].北京:中国人民大学出版社,2003.
    [103]周健.《信息自由法》与政府信RORY TRUEX息公开化[J].情报理论与实践,2001,24(5):321-323.
    [104]朱庆华,颜祥林.信息公开制度探析[J].情报理论与实践,2001,24(5):324-327.
    [105]周健,赖茂生.政府信息开放与立法研究[J].情报学报,2001,20(3):276-281.
    [106]商业银行法.商业银行法[OL].[1995-5-10].http://www.law-lib.com/law/law_view.asp?id=260.
    [107]统计法.统计法[OL].[2009-6-29].http://money.163.com/09/0629/09/5CVF03BI00252G50.html.
    [108]证券法.证券法[OL].[2005-10-28].http://legal.people.com.cn/GB/42735/3807665.html.
    [109]合同法.合同法[OL].[1999-3-15].http://www. law-lib. com/law/law_view.asp?id=475.
    [110]公司法.公司法[OL].[2009-12-31].http://china.findlaw.cn/gongsifalv/gongsifalvfagui/gongsifatiaowen/14016.html.
    [111]中华人民共和国政府信息公开条例.中华人民共和国政府信息公开条例[OL].[2008-4-30].http://news.xinhuanet.com/legal/2008-04/30/content_8078720.htm.
    [112]行政机关公务员处分条例.行政机关公务员处分条例[OL].[2007-4-29]. http://news.sina.com.cn/c/2007-04-29/061012893123.shtml.
    [113]刑法修正案(七).刑法修正案(七)[OL].[2009-2-28]. http://www.gov.cn/flfg/2009-02/28/content l246438.htm.
    [114]见[10]
    [115]赖茂生.信息资源管理教程[M].北京:清华大学出版社,2007:28-30.
    [116]马海军.转型期中国腐败总是比较研究[M].北京:知识产权出版社,2008:41.
    [117]罗伯特.克里特加德.控制腐败[M].北京:中央编译出版社,1998.
    [118]同[9]
    [119]同[13]
    [120]《重点领域和关键环节腐败案例剖析》编写组.重点领域和关键环节腐败案例剖析[M].北京:中国方正出版社,2011:23-32.
    [121]《重点领域和关键环节腐败案例剖析》编写组.重点领域和关键环节腐败案例剖析[M].北京:中国方正出版社,2011:33-42.
    [122]翁浩浩.信息腐败成为腐败新类型,手法更隐蔽监管真空多[OL].[2011-07-28]. http://politics.people.com.cn/GB/1026/15268431.html.
    [123]网易新闻.教育部通报考研泄题:1名科长窃取试卷转卖[OL].[2012-05-28]. http://news.163.com/12/0510/14/815A31HK00014JB6.html.
    [124]杨章怀.泄露经济数据谋取利益中央部委两官员获刑[OL].[2011-10-25].http://gcontent.oeeee.eom/b/15/b1563a78ec593375/Blog/c14/206d42.html.
    [125]曹红辉,史锦华.金融腐败大案的成因及治理对策[M].北京:经济管理出版社,2007:25.
    [126]任建明,杜志洲.腐败与反腐败:理论、模型和方法[M].北京:清华大学出版社,2009:108.
    [127]赵瑞峰.公共政策分析——理论、方法与实务[M].北京:中国时代经济出版社,2007,220-225.
    [128]赵瑞峰.公共政策分析——理论、方法与实务[M].北京:中国时代经济出版社,2007,152-153.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700