Information Technology Development Trends and Ideological Security

Posted on

This article was published first in Red Flag Manuscripts on 25 December 2014. 

Giving high regard to and vigorously responding to the opportunities and challenges that scientific and technological development has brought to ideological work is an important experience of our Party in grasping the initiative in ideological work. At present, quite a few problems exist in the area of grasping the initiative in ideological work through our use of the newest achievements in information technology, and we are often reduced to a passive, responsive state. When looking at the reasons for this, the most important ones are that we lack foresight about information technology development trends, we often have countermeasures that resemble mending the stable when the sheep have run, and have few precautionary measures. For instance, where supervision and management of blogs, microblogs, WeChat and other communication tools is concerned, or the control on communication of heretical and terrorist videos is concerned, we have lagged behind the pace of information technology development to a substantial degree, and we have even lagged behind Western hostile powers and terrorists using these technologies. Many countermeasures have been taken when technology is already broadly applied, and we only passively respond when this creates a certain harm to us, this not only means that the resulting harm is difficult to avoid, it also increases the costs of response and causes the work of the Party and the government to become bogged down in passivity. The use of information technology advantages and the newest development achievement to engage in infiltration against our country is a long-term strategy of Western countries with the United States in the lead. Because of this, we must strengthen our foresight, acutely perceive the influence of the newest developments in information technology on ideological work, scientifically predict the newest methods that hostile forces may adopt, and establish response measures on a basis of a scientific prediction and correct grasp of technological development trends.

I

In consideration of setting up a good gambit and grasping the initiative in ideological work, it is at present necessary to pay high attention to the newest developments in Internet construction technology, big data technology, micro-electronics technology, information communication technology, “net-breaking” technology and wireless network attack technology, as well as their influence on ideological security.

First, network construction technology. In March and April of 2014, the American Facebook company and Google company successively purchased solar-powered unmanned aircraft research enterprises, they plan to bring telecommunications equipment into continuous flight at high altitude through large amounts of powerful and continuously flying solar unmanned aircraft, an d build a wireless telecommunications network that covers the entire world. Before, Google’s “Project Loon” used hot-air balloons to “spread” wireless network signals, also based on similar technological considerations. This time, Google purchased solar-powered unmanned aircraft that the Titan Company was planning to produce, these are designed to fly a distance of 4,5 million kilometres under conditions of carrying 113 kilos of payload, the signal coverage of the telecommunications equipment it carries can attain a radius of 80 kilometres (or a surface coverage of 16.800 square kilometres), this telecommunications capacity exceeds that of 100 terrestrial stations. Following the further development of technology, an increase in payload, and the strengthening of signals, coverage will also further expand. If these solar-powered unmanned aircraft loiter around our country’s maritime and terrestrial borders, the scope of their signals will be sufficient to cover a broad area of our coastal and border regions. This will certainly provide new channels to Western foreign hostile forces to conduct ideological infiltration against us, and brings a huge attack against our country’s network surveillance and management. This urgently requires that relevant Party and Government departments jointly take action, and adopt countermeasures against relevant flying machines at our country’s maritime and land borders in a focused manner, make the necessary arrangements in legal and public opinion terms as early as possible, and make sufficient preparations to restrain flight paths, jam signals, etc. On the other hand, we must also develop our own interconnected “Skynet”, and resolve well the problem that distant areas and other regions unsuited to fibre optic cables face in connecting to the network.

Second, big data technology. Big data technology is technology to rapidly obtain valuable information from large amounts of data of all kinds and categories. At present, the total quantity of data worldwide is growing exponentially, the amount of data produced in the past three years exceeds the total sum of all data produced before. Data is becoming an important production factor on par with material capital and human capital, and the ability to use bug data will become one crucial factor in national competitiveness. The US government announced its “Big Data Research and Development Initiative” in March 2012, in order to raise the ability to collect and analyse big data, and strengthen national competitiveness. A number of other countries have also successively put big data on the national strategy level. Obtaining and analysing big data is the basis for the American “Prism” programme. In the big data era, many seemingly unrelated data may become important top-secret data through comprehensive analysis. For instance, the large quantity of data that people generate online records their thoughts, actions and even emotions, and thus contains rich content and much information about patterns. Big data technology has provided seamless methods of producing, exploiting and using information for ideological work, with comprehensive information collection as precondition, and on the basis of processing and comprehensively analysing information to turn it into valid information, conducting analysis, determination, filtering and refinement turns it into valuable information, and so it is possible to arrive at a complete understanding and correct grasp of the targets of ideological work. Because of this, on the one hand, we must strengthen the security protection of our own information, basic network equipment and technology must, as much as possible, use domestically produced equipment and standards; on the other hand, we must realistically grasp the new opportunities brought by this burgeoning area, incessantly follow and research big data, and strengthen the exploitation and use of big data. With big data as a handhold, strengthen scientific analysis of audiences’ characteristics and the determination of public sentiment, in order to strengthen our ability to use mainstream ideology to channel social thinking trends.

Third, micro-electronic technology. Supported by the major breakthroughs achieved in micro-electronic technology, breakthroughs in information technology have developed extremely rapidly in recent years. Now, every chip includes more than a hundred million components, constituting “single-chip systems”, breaking through limits of integrated machines and components, greatly raising the efficiency of information equipment, and spurring the development of electronic equipment in a direction of lightness, smallness, thinness and low power consumption. This has made carriers for the storage and dissemination of large amounts of illegal information ever smaller and their prices ever cheaper, and has greatly strengthened the difficulty of tracking them down. At the same time, it has also stimulated the development of wearable Internet technology with smart glasses as the poster example. The Google glasses, for instance, combine a mobile phone, GPS and camera into one body, the user only has to blink his eyes to take a picture and upload it, or can even directly record and stream a video. Smart watches, smart shoes and other smart wearable equipment will also realize similar functions. In the not-too-distant future, any person will be able to realize influential broadcasts at any time and any place, sudden incidents will be broadcast in real time, and a true self-media era will arrive. We must , as early as possible, formulate standards for smart wearable equipment and promulgate relevant laws and regulations to standardize them, we must implement preventative policy preferences, and block loopholes that may emerge, which influence our ideological security. We must forcefully strengthen the construction of our online credit system, and strengthen supervision and management over social media websites, video websites and other information dissemination platforms. We must especially strengthen supervision and management over self-media, new media, such as WeChat, conduct information communication on the basis of “private relationships” (mobile phone address books) and “private spaces” (QQ friends), their communication channels are “secret”, it is difficult to supervise and control this, there is a flood of false, malicious and negative information, and following the rapid development of portable electronic equipment, this problem will become ever more prominent, we must adopt powerful measures as soon as possible.

Fourth, information transmission technology. Information transmission is a main artery to sustain the regular operation of the social system. In scientific experiments, the network transmission speed can already reach 339GB per second. In real-world applications, it is estimated that a speed of 10GB per second for cable networks will be commercialized by 2020. In the area of wireless networks, 4TG technology is already becoming widespread, and it is estimated that the transmission speed of 5G technology that will be produced in 2020 will be ten to a hundred times that of 4G, and can reach 10 GB per second. The increase of information transmission speed provides conveniences for hostile powers to engage in ideological infiltration, and large amounts of illegal information can be spread with great ease. This requires us to, on the one hand, sing the main melody through strengthening content construction, communication channel construction and mobile entry control; on the other hand, we must strengthen management over information sources and online service providers.

Fifth, “net-breaking” technology. “Net-breaking” mainly refers to surmounting blocks on websites by network supervision and management through certain technological measures and browsing foreign web pages, it is also known as “jumping the Wall”. Our country’s domestic “East Turkestan” violent terrorists, and Falun Gong elements use “net-breaking” software, where they obtain technologies to commit crimes, remain in contact and raise funds. Hostile forces do everything they can to research “net-breaking” technology and to disseminate it on a large scale, the US State Department once specially allocated 1,5 million dollars to support corresponding programmes. Now, there are also some people who peddle “net-breaking” technologies online on a large scale for economic profit, they peddle routers with added corresponding functions, and connect to foreign-provided for-payment proxy services. Against this situation, we must on the one hand continue to improve and perfect network surveillance and management measures, enhance surveillance and management technology, and build effective and useful “filter nets” and “firewalls”; on the other hand, we must adopt powerful measures to cut off the profit chain of “net-breaking” software.

Sixth, wireless network attack technologies. The development of the US army’s wireless network attack programme “Shoot” demands our high attention. The “Shoot” programme essentially uses wireless methods to invade the opponent’s information networks, the opponent is thrown into chaos through false and deceptive information, or control is even taken over. In 2001, the US Army started researching this, and put it into actual combat repeatedly afterwards. In the 2007 Israel attacks on Syrian nuclear infrastructure in “Operation Orchard”, and in the 2011 war in Libya, “Shoot” played an important role, and the information networks of the opponent were invaded successfully. Wireless network attacks mean that information systems physically separated from the Internet can no longer sleep easy. We must strengthen our information security protection, adopt Internet technology with even higher security levels, strive to raise our ability to monitor cyber attacks and our ability to rapidly recover, and ensure that information systems can play a regular role in extreme circumstances.

II

General Secretary Xi Jinping pointed out that: “Since ancient times, science and technology have driven the progress and development of human society through an irreversible and irresistible force.” Following the comprehensive and rapid development of information technology, ideology work will face many new circumstances and problems, these require our high attention and vigorous response, and measures must be adopted in all areas. Generally speaking, the following areas are the most fundamental.

First, we must realistically establish the idea of “big propaganda” work. Ideological work is a systematic project with a strong political nature, the matters it involves are extensive, and its influence is great, it requires comprehensive planning and strengthened cooperation, and it requires joint action from many side and participation from all. We must realistically strengthen communication and cooperation between propaganda departments and science and technology research and development, social management and military functional departments, strengthen the construction of coordinated operational mechanisms, with Party Committee propaganda departments in the lead, regularly convene joint conferences, organize responsible comrades from all departments to analyse circumstances and tasks, strengthen exchange and communication, and clearly define all departments’ focus work points and direction of efforts through pooling wisdom; we must establish a line of comprehensive talent teams who are excellent in both technological and propaganda matters, and strengthen circulation of staff in positions, propaganda department cadres must go to science and technology departments to understand and become acquainted with the situation, science and technology workers must regularly go to propaganda departments to participate in work, to truly realize that work is merged, resources are shared, and there is win-win in development.

Second, we must strengthen advance research and deployment. Now, some of our relevant departments have become used to researching or explaining events that have already occurred, this sort of work thinking and model is unsuited to the development model of industry and technology, and is an important cause resulting in passivity in our work. The development model of information technology requires that we must strengthen advance research. Information technology is characterized by leaps in development. In the area of information technology, in 10-15 years at the shortest or 20-30 years at the longest, information technology will see sudden and disruptive change. For instance, the digital camera has replaced the traditional film camera, the Internet has replaced traditional telecommunications networks, USB drives have replaced floppy disks, the rapid development of mobile Internet, etc., have all brought extremely profound influence to the work and living methods of people. If we do not forecast the ladder-type transition of information technology and its influence in advance, we will be reduced to a passive state. Because of this, we suggest the establishment of a specialized advance research body for ideology work, to be allocated with specialist personnel to engage in corresponding work, this will expand our strength to research the influence of scientific and technological development trends on the ideological area, effectively use the newest information technology achievements, and respond to new challenges.

Third, we must strive to raise our ability for indigenous innovation of information technology. According to statistics, 82% of servers, 73,9% of storage equipment, 95,6% of operating systems and 91,7% of databases in our country’s government departments and major industries are foreign products. In the construction of national key information infrastructure, an impression of the “Eight Big American King Kongs” (Cisco, IBM, Google, Microsoft, Qualcomm, Intel, Apple and Oracle) has emerged. From the exposure of the “Prism” programme, we can see that these companies have extremely deep links with the US National Security Administration. General Secretary Xi Jinping stressed that: “without cybersecurity, there is no national security and without informatization, there is no modernization”. We must raise our ability for indigenous innovation of information technology, accelerate the research of crucial hardware and software products that are needed for our country’s information systems; we must provide policy support to indigenous brands, assist domestically produced software and hardware to break through the situation that foreign mainstream firms have monopolies; we must further perfect the government procurement law, establish information product security assessment systems, give preference to indigenous and controllable domestically produced information products when procuring crucial software and hardware, provide technological support to our country’s ideological work, and thoroughly end the situation of passivity and being controlled by others in the area of information security.

Fourth, we must correctly grasp the changes in information communication methods. At present, the main channel through which people obtain news information has shifted from newspapers and magazines, radio and television, PC Internet and other such traditional media to smartphones, tablet computers, e-readers and other mobile terminals. Following the development of information technology, this sort of digitized reading tendencies will become ever clearer, and increasingly develop fast food, skimming and fragmentation properties. Some people accuse digital reading of being like looking at the grass from a running horse, and of being insufficiently sincere. But if digital reading is integrated with sound, image and many other methods, it is possible to make information much more lively in form, and provide many sensory treats to readers, this conforms to the basic essence of mass popular culture and consumer culture, and conforms to the demands of people in current-day society, it has become the main reading method for the majority of people. We must give high attention to the construction and use of new media, actively seek the new and seek change in discourse structures, methods of expression, communication methods and other such areas, strive to forge a discourse circulating at home and abroad, that suits both refined and popular tastes, and is easy for the masses to accept, we must ensure that the Party’s voice is even richer in the characteristics of the times and that the masses love to see and hear it. We must strive to satisfy the people’s incessantly growing individualized and pluralized reading demands, and we must especially guide the reading tastes of young readers to higher planes, and prevent the spread of “over-entertainment culture” and other vulgar tendencies among younger readers.

(Authors’ work unit: National Defence University Research Centre for the Theory and System of Socialism with Chinese Characteristics)

信息技术发展趋势与意识形态安全
赵周贤 徐志栋
高度重视并积极应对科学技术发展给意识形态工作带来的机遇和挑战,是我们党掌握意识形态工作主动权的重要经验。目前,我们在运用信息技术最新成果掌握意识形态工作主动权方面,存在不少问题,经常处于被动应付状态。究其原因,主要是缺乏对信息技术发展趋势的预测,亡羊补牢的对策多,未雨绸缪的措施少。比如,我们对博客、微博、微信等传播工具的监管,对邪教、恐怖音视频传播的管控,就在很大程度上滞后于信息技术发展的脚步,甚至滞后于西方敌对势力和暴恐分子对这些技术的利用。许多对策都是在技术应用已很广泛,并对我们造成一定危害时的被动应对,不仅造成的损失难以挽回,也提高了应对成本,使党和政府的工作陷入被动。利用信息技术优势及其最新发展成果对我国进行意识形态渗透,是以美国为首的西方国家的长期战略。因此,我们必须增强预见性,敏锐洞察信息技术最新发展对意识形态工作的影响,科学预见敌对势力可能借此采取的新手段,把应对措施建立在对技术发展趋势科学预测和正确把握的基础上。

从下好先手棋、掌握意识形态工作主动权角度考虑,当前需要高度关注互联网搭建技术、大数据技术、微电子技术、信息传输技术、“破网”技术和无线网络攻击技术领域的最新发展及其对意识形态安全的影响。
一是互联网搭建技术。2014年3月、4月,美国脸谱公司、谷歌公司先后收购了太阳能无人飞行器研究企业,他们企图通过大量强力续航的太阳能无人飞机携带通信设备在高空持续飞行,构建一个覆盖全球的无线通信网络。谷歌之前用热气球“散播”无线网络信号的“潜鸟计划”,也是基于同样的技术考量。此次谷歌收购的泰坦公司拟推出的太阳能无人飞机,设计飞行航程450万公里,在载重113千克的情况下,机载通信设备信号覆盖半径可达80公里(即覆盖1.68万平方公里的地球表面),通信能力超过100个地基信号站。随着技术的进一步发展,载重量的提高,信号强度的增强,覆盖面积将进一步增大。如果这些太阳能无人飞机在我国领海线、陆地边境上空徘徊飞行,信号范围足以覆盖我国沿海和边境的广大区域。这势必为西方敌对势力对我进行意识形态渗透提供新的途径,对我国的网络监管带来巨大冲击。这迫切需要党政有关部门和军队联合采取行动,对在我国领海线、边境上空的相关飞行器采取有针对性的反制措施,从法律和舆论上尽早布局,在飞行线路遏制和信号干扰等方面做好准备。另一方面,我们也要发展自己的互联“天网”,解决好边远地区或其他不适宜铺设光纤地区的网络连接问题。
二是大数据技术。大数据技术是从各种类型的海量数据中,快速获得有价值信息的技术。当前,全球的数据总量正呈指数增长,过去3年间产生的数据量超过以往的总和。数据正成为与物质资产和人力资本相提并论的重要生产要素,大数据使用能力将成为国家竞争力的关键要素之一。美国政府于2012年3月宣布了其“大数据研究发展计划”,以提高对大数据的收集与分析能力,增强国家竞争力。其他一些国家也纷纷把大数据提升到国家战略层面。大数据的获取和分析正是美国“棱镜”计划的基础。在大数据时代,许多看似无关的数据经过综合分析都可能成为重要的机密数据。比如,人们在网上产生的海量数据,就记录着他们的思想、行为乃至情感,其中蕴含着丰富的内涵和很多规律性的信息。大数据技术给意识形态工作提供了呈现和开发利用信息的无缝方法,以全面收集信息为前提,在加工和综合处理信息使之转化成有效信息的基础上,进行分析、判断、过滤、提纯,使之成为有价值的信息,进而达成对意识形态工作对象的全面认识和准确把握。因此,我们一方面要加强自身信息的安全防护,基础网络设备和技术要尽可能地采用国产设备和标准;另一方面,要切实把握这一新兴领域带来的新机遇,不断跟踪研究大数据,加强对大数据的开发利用。以大数据为支撑,加强对受众特点的科学分析和舆情的研判,以增强用主流意识形态引领社会思潮的能力。
三是微电子技术。在微电子技术取得重大突破的支撑下, 近年来信息技术突飞猛进发展。现在每个芯片上包含上亿个元件,构成了“单片上的系统”,打破了整机与元器件的界限,极大地提高了信息设备的效能,并促使电子设备向轻、小、薄和低功耗方向发展。这使大容量非法信息的存储和播放载体体积越来越小,价格越来越便宜,极大地增加了查获难度。同时,也促进了以智能眼镜为代表的互联网穿戴设备的发展。以谷歌眼镜为例,其集智能手机、GPS、相机于一身,用户只要眨眨眼就能拍照上传,甚至直接拍摄视频上传。智能手表、智能鞋等智能穿戴设备也可以实现类似功能。在不久的将来,任何人都能够随时随地实施影像传播,突发事件将会实现同步转播,真正的自媒体时代即将来临。我们要尽早制定智能穿戴设备标准、出台有关法规予以规范,实施防范政策预置,堵塞可能出现的影响我意识形态安全的漏洞。要大力加强网络诚信体系建设,加强对社交网站、视频网站等信息发布平台的监管。尤其要加强对自媒体的监管,以微信为代表的新媒介基于“私人关系”(手机通讯录)和“私人空间”(QQ朋友)进行信息传播,传播渠道 “私密”,监控困难,虚假、恶意、负面信息泛滥,随着便携电子设备的快速发展,这一问题将会更加突出,我们要尽快采取有力措施。
四是信息传输技术。信息传输是维持社会系统正常运转的大动脉。在科学实验中,网络数据传输速度已经可以达到每秒339Gb。在实际应用上,预计2020年将实现有线网络每秒10Gb的商用化。在无线网络方面,4G技术已经在推广普及,预计在2020年推出的5G技术传输速率将是4G的10倍至100倍,可以达到每秒10Gb。信息传输速度的提高,给敌对势力进行意识形态渗透带来了便利,大容量非法信息扩散将会更加容易。这就要求我们一方面要通过加强内容建设、传播渠道建设和移动入口管控,唱响主旋律;另一方面必须加强对信息源和网络服务供应商的管理。
五是“破网”技术。“破网”主要指通过一定的技术手段突破网络监管所屏蔽的网站浏览境外网页,也称为“翻墙”。我国境内的“东突”暴力恐怖分子、法轮功分子就是利用“破网”软件,获取作案技术、进行联络及筹措经费的。敌对势力千方百计地研究“破网”技术,并大力推广,美国国务院曾专门拨款150万美元对相关项目予以支持。现在,还有一些人出于经济利益,在网上大肆贩卖“破网”软件,贩卖加载了相关功能的路由器,勾连国外提供有偿代理服务。针对这种情况,我们一方面要继续改进和完善网络监管措施,提高监管技术,构筑高效管用的“过滤网”和“防火墙”;另一方面要采取有力措施,斩断“破网”软件传播的利益链条。
六是无线网络攻击技术。美军无线网络攻击项目——“舒特”的发展需要我们高度注意。“舒特”项目实质就是利用无线方式入侵对手信息网络,通过虚假欺骗信息扰乱对手,甚至予以接管控制。2001年美军就对此进行研究,此后多次投入实战。2007年以色列攻击叙利亚核设施的“果园行动”,以及2011年利比亚战争,“舒特”均发挥了重要作用,成功入侵对手信息网络。无线网络攻击,让与互联网物理隔离的信息系统也不再高枕无忧。我们要加强自身信息的安全防护,采取安全性更高的互联网技术,着力提高网络的攻击检测能力和快速恢复能力,确保信息系统在极端情况下能正常发挥作用。

习近平总书记指出:“自古以来,科学技术就以一种不可逆转、不可抗拒的力量推动着人类社会向前发展。”伴随信息技术的全方位迅猛发展,意识形态工作将会面临着许多新的情况和问题,需要我们高度重视、积极应对,在方方面面采取措施。从总体看,以下几个方面是最基本的。
一是要切实树立“大宣传”工作理念。意识形态工作是政治性强、涉及面广、影响力大的系统工程,需要统筹谋划、强化协作,需要多方联动、全员参与。要切实加强宣传部门与科技研发、社会管理和军队职能部门的沟通与合作,加强协调运行机制建设,由党委宣传部牵头,定期召开联席会议,组织各部门负责同志分析形势任务,加强交流沟通,在集思广益中明确各部门工作重点和努力方向;要建设一支在技术和宣传方面都精通的复合型人才队伍,加强人员的岗位交流,宣传部门干部要到科技部门了解熟悉情况,科技工作者也要经常到宣传部门参与工作,真正实现工作共融、资源共享、发展共赢。
二是要加强前瞻研究和布局。现在,我们的有些相关部门,习惯于只对已经发生的事件进行研究和作出解释,这种与工业技术发展模式不相适应的工作思路和模式,是造成工作被动的重要原因。信息技术的发展模式要求我们必须加强前瞻性研究。信息技术呈现阶跃式发展的特征。在信息技术领域,短则10—15年,长则20—30年,信息技术会出现一次不连续的突变。如数字相机替代传统胶卷相机,互联网替代传统电信网,U盘替代软盘,移动互联网的迅速普及等等,对人们的工作和生活方式带来极为深刻的影响。如果对信息技术的阶梯型跃迁及其影响没有前瞻性预测,必然会处处被动。因此,建议成立专门的意识形态工作预研机构,配备专业人员从事相关工作,加大科技发展趋势对意识形态领域影响研究的力度,有效运用最新信息技术成果,应对新挑战。
三是要着力提高信息技术的自主创新能力。据统计,我国政府部门、重要行业82%的服务器、73.9%的存储设备、95.6%的操作系统、91.7%的数据库都是国外产品。在涉及国家关键信息基础设施的建设中,频频出现美国“八大金刚”(思科、IBM、谷歌、微软、高通、英特尔、苹果、甲骨文)的影子。从曝光的“棱镜”计划,我们可以看到这些公司与美国国家安全局都有极深的联系。习近平总书记强调:“没有网络安全就没有国家安全,没有信息化就没有现代化”。 我们必须提高信息技术的自主创新能力,加快研制我国信息系统所需要的关键性硬件和软件产品;对自主品牌提供政策性扶持,助力国产软硬件突破国外主流厂商垄断的局面;进一步完善政府采购法,建立信息产品安全审查制度,在关键性软硬件采购上向自主可控的国产信息产品倾斜,为我国意识形态工作提供技术支撑,彻底摆脱在信息安全方面受制于人的被动局面。
四是要准确把握信息传播方式的改变。当前,人们获取新闻信息的主要渠道已经从报纸杂志、广播电视、PC互联网等传统媒体转向以智能手机、平板电脑、电子阅读器等为代表的移动终端。随着信息技术的发展,这种数字化阅读趋势将会愈加明显,愈益呈现出一种快餐式、跳跃性、碎片化的特征。一些人质疑数字化阅读是走马观花,不够认真。但数字阅读结合了声音、图像等多种方式,能把信息呈现得更加形象生动,为阅读者提供多种感官享受,符合大众流行文化与消费文化的基本特质,也符合现代社会人的需求,已经成为大多数人的主要阅读方式。我们必须高度重视新兴媒体的建设运用,在话语体系、表达方式、传播手段等方面主动求新求变,着力打造融通中外、雅俗共赏、易于为大众接受的话语,使党的声音更富时代特色、为群众喜闻乐见。我们需要努力满足人们不断增长的个性化、多元化阅读需求,尤其要将年轻人的阅读趣味引向高端,防止“泛娱乐文化”等低俗现象在青少年读者中蔓延。
(作者单位:国防大学中国特色社会主义理论体系研究中心)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s