首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
随着当前互联网的飞速发展,当前使用的基于IPv4网络协议下的地址数显得越来越匮乏,因此IETF提出用IPv6协议取代IPv4协议。IPv6具有诸如海量地址、组播、邻居发现、自动配置等许多新特性。然而,怎样实现IPv4向IPv6的平滑过渡,以及怎样在现有IPv4网络上进行IPv6组网仍然是目前有待解决的问题。本文对目前常用的三种过渡技术双协议栈、隧道和地址翻译机制进行分析比较。  相似文献   

2.
《Research Policy》2023,52(9):104822
Standards Development Organizations (SDO) make critical decisions shaping the direction of technological innovation. SDOs are usually considered to offer a neutral venue for the collaborative efforts of different stakeholders, which often pursue competing particular interests. Nevertheless, individuals acting on behalf of the SDO, such as working group chairs, are themselves often employees of individual SDO stakeholders. Recently, there have been concerns that over-representation of the employees of certain powerful stakeholders in SDO leadership positions may undermine the objectivity of SDO decision making. Nevertheless, to date, there exists no empirical evidence to corroborate these concerns. We find that being affiliated with one of the largest SDO stakeholders significantly increases an individual’s likelihood of being appointed to a leadership position at IETF, but not at 3GPP. At the same time, in both SDOs, working groups whose chairs are affiliated with leading stakeholders produce standards that are less cited and less referenced than standards produced by other working groups, in particular those chaired by university affiliates. Our findings suggest that the commercial interests of individuals’ employers may facilitate these individuals’ ascension to SDO leadership positions, but the potential for conflicts between these commercial interests of chairs’ employers and the organizational goals of the SDO may negatively impact the success of the working group’s standards.  相似文献   

3.
4.
We examine the effect of public policy on the growth of Internet use. Using a decentralized country—Spain—as an example, we compare the 17 Spanish regions to test different Internet policy designs, taking into account the quality and number of specific programs promoted by regional governments, as well as the presence or absence of strategic planning in each region. We treat the percentage of Internet users as a dependent variable to compare its diffusion in different territories. Our findings show that educational levels and economic differences explain about half of the variations observed. Furthermore, the regional policies play a significant role in explaining regional variations. We investigate which public policy instruments are more significant for the development of the Internet, and find that focused policy intervention and complex policy initiatives are more significant than other policy instruments in explaining the increase in the percentage of Internet users.  相似文献   

5.
The Semantic Web is one of the fastest developing fields within the Information and Communication Technology sector and, as such, under constant examination by scientists and IT professionals. This article aims to provide a better understanding of the applicability of Semantic Web tools and technologies in practice. This aim will be achieved by surveying the recommended and emerging W3C standards, presenting an overview of the state-of-the-art in the Semantic Web research in the European Union, analysing the W3C collection of Case studies and Use Cases, and discussing the extent of adoption of Semantic Web technologies. The overall technology maturity level assessment has shown that Semantic Web technologies are finding their ways into real-world applications, and that, rather than being merely a fashionable research issue, the Semantic Web, slowly but surely, becomes our reality.  相似文献   

6.

We examine the effect of public policy on the growth of Internet use. Using a decentralized country—Spain—as an example, we compare the 17 Spanish regions to test different Internet policy designs, taking into account the quality and number of specific programs promoted by regional governments, as well as the presence or absence of strategic planning in each region. We treat the percentage of Internet users as a dependent variable to compare its diffusion in different territories. Our findings show that educational levels and economic differences explain about half of the variations observed. Furthermore, the regional policies play a significant role in explaining regional variations. We investigate which public policy instruments are more significant for the development of the Internet, and find that focused policy intervention and complex policy initiatives are more significant than other policy instruments in explaining the increase in the percentage of Internet users.  相似文献   

7.
李奉民 《情报科学》2003,21(11):1190-1191,1220
开放源程序为软件设计提供了更多的机会和便利条件。开放式项目成功与否取决于对软件目标观察的透明度和基本功能的相关定义,这项非常重要的定义工作常常通过开放式标准来开展的。开放式标准制定与完善,与所有以互联网为技术平台相关行业的发展前景密切相关。因此,本文论述了完善规范开放式标准重要性,以及图书信息行业积极参与相关标准制定的迫切性。  相似文献   

8.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

9.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

10.
As the rapid development of broadband Internet access services continues, particularly fiber to the home (FTTH) services, the digital divide between provincial and urban areas is becoming a big social issue in Japan. We classify the issue into two problems: access to high-speed Internet, and service utilization of high-speed Internet access. We focus on the latter problem by quantitatively and qualitatively investigating whether a digital divide problem exists based on Internet service utilization. Consequently, we discover that willingness to pay (WTP) for public services over FTTH is almost identical between provincial and urban areas. Furthermore, territorial digital broadcasting over FTTH accounts for a large part of WTP in provincial areas, while tele-working and tele-education are also important as public services over FTTH in urban areas.  相似文献   

11.
基于本体的信息系统引论   总被引:5,自引:0,他引:5  
Since Tim Bemers-Lee, current W3C chairman, first proposed the concept of Semantic Web, it is be-coming a hot topic in computer information processing area. Ontologies are playing a key role in the Semantic Web, ex-tending syntactic interoperability to semantic intemperability by providing a source of shared and precisely defined terms.The paper analyzes the requirement of information systems for ontology languages. The current popular ontology languages are also discussed.  相似文献   

12.
Abstract

This study employs a qualitative approach to examine whether and why some societal groups are disadvantaged more by their Internet use than others do. Due to the quantitative nature of most digital divide studies, thorough explanations for why different outcomes exist are lacking. Interviews were conducted with 48 Dutch families selected on the basis of educational level (high or low) and household characteristics (children and marital status). A distinction was made between the types of negative outcomes that families are confronted with and how they cope with those outcomes. The results show that the confrontation with negative outcomes of Internet use in itself seems similar for both educational groups. However, the way Internet users cope with negative outcomes differs between the two educational groups. Members of highly educated groups mostly try to take control themselves when faced with a negative outcome, while members of less educated groups often just experience negative outcomes and do not remedial actions.  相似文献   

13.
黄海兰 《科教文汇》2020,(9):169-170,173
随着互联网技术的成熟与普及,网络对青少年的成长产生了较大影响,青少年犯罪也与网络有较大的相关性,网络导致青少年情感缺失、社交障碍、道德水准下降。由于网络的影响,青少年存在着人的需要、动机、认知以及家庭、学校、社会等因素对青少年犯罪心理的形成有极大的消极作用。预防青少年犯罪心理的产生,需要重视社会环境的建设,完善青少年监管过程中的道德法制建设,对青少年进行思想政治教育,特别是网络思想政治教育,对已产生心理问题的青少年需要进行专业的心理治疗,只有建立了系统化的预防措施才能使有效预防由于网络原因导致的青少年犯罪心理的形成。  相似文献   

14.
Communication is at the heart of knowledge transfer (KT). But studies of KT barriers do not explicitly consider the relationship and impact of specific communication modalities on KT. The modalities of computer-mediated communication (CMC), namely email, Voice Over Internet Protocol, Instant Messaging (IM) and the like are generally viewed as a group ‘CMC’. In this paper, we analyze the KT literature to distill 21 key barriers to successful KT. These barriers are then categorized according to basic communication theory. We then examine leading theories of CMC and discuss how based on these theories individual CMC modalities can be applied to KT barriers. We conclude with a model that presents the categorized KT barriers in a communication channel model that can be addressed by CMC modalities and that can potentially break down those barriers.  相似文献   

15.
The role of information in strategic decision-making   总被引:2,自引:0,他引:2  
Aspects of the role of information in strategic decision-making by executives in industry are hardly ever mentioned in management research publications. We therefore investigate in this paper the way information is obtained, analysed, judged and applied by executives in industry that have to take strategic decisions. We interviewed executives from thirteen companies in The Netherlands and in Germany about the stages in the decision process that they followed in thirty two recent decisions they had to make.We found that executives that follow a rational approach collect and use ample information in a structured decision-making process passing through a number of distinct phases in time. In this process, information plays a crucial role in reducing uncertainty. Over all discussions held, the aspect of the quality of the information used by the board was stressed. We could only obtain circumstantial evidence of changes in the decision making process caused by developments in new information acquisition and analysis methods such as use of the Internet becoming common practice. But we can affirm that with more relevant information available, discussions in the boardroom on issues affecting the choices and alternatives can now be better controlled and rational decision-making is thus facilitated.  相似文献   

16.
Statistics show that the number of identity theft victims in the US increased by 12% in 2009, to 11.1 million adults, while the total annual fraud amount increased by 12.5%, to $54 billion. As the e-commerce volume is increasing and various online services are becoming more popular, the number of sites to which an average Internet user subscribes is increasing rapidly. Given the limited memory capacity of human beings, an Internet user's login credentials (in the form of a combination of a user ID and a password) are usually reused over multiple accounts, which can cause significant security problems. In this study, we address the vulnerability of login credentials. First, based on a unique Internet user data set, we analyze the behavioral characteristics of login credentials usage. We find that the same login credentials are used for many more accounts and reused much more often than previously expected. Furthermore, usage patterns are found to be quite skewed. Second, building on a network perspective of login credentials usage, we suggest a vulnerability measure of an individual's login credentials and analyze the vulnerability of current Internet users. The resulting information is valuable not only to the research community but also to managers and policy makers striving to reduce security vulnerability.  相似文献   

17.
The role of voluntary standards in industrial growth is discussed by characterizing standards as a public good and identifying the consequent determinants of underinvestment by the private sector. Underinvestment results from the nature of both the standard itself and the underlying technology. Although this problem occurs in most types of standards, measurement-related standards are a particularly severe case. To primary reason is that the measurement technology which underlies the standard typically requires capital-intensive research facilities and specialized research equipment and labor. Once the technology is available, an additional problem frequently arises of reaching agreement among buyers and sellers on the content, form, and timing of the standard. Although common to most standards-setting processes, this latter problem is particularly severe in markets based on advanced technologies because of the typically intense levels of competition and the dynamics of the technological change process.The underinvestment phenomena in the area of measurement-related standards lead to a role for government. In many cases, the most efficient policy response is a centralized government laboratory. This proposition is exemplified by three cases in which support for measurement-related standards was provided by the U.S. National Bureau of Standards. The case studies demonstrate that both the content and the timing of government support are important, if this support is to be an effective element of an industrial growth policy. The content of standards is critical for increasing the options with respect to the direction of industrial innovation as well as increasing the rate of diffusion (which determines measured productivity growth). The timing issue is becoming increasingly important as international competition intensifies in most advanced technology markets. Standards should therefore be a conscious element of industrial growth policy and appropriate government support provide.  相似文献   

18.
随着全球化的发展与科学技术的进步,技术标准越来越受到各国政府的重视和大力支持。本文基于文献综述,以中国AVS标准制定过程为例,通过引入政策“过程一工具”分析框架,详尽分析了AVS标准制定过程中存在的市场和政府“双失灵”现象。指出在标准的制定过程中,应该协调市场与政府二者之间的关系,政府应该做到有所为与有所不为。  相似文献   

19.
Unparalleled in human experience, the Internet, or simply the Net, is the code word for the technosocial accident that gives large numbers of people the means by which they can speak for themselves in public. This is an ironical reversal of the historical social patterning of asymmetrical, centralizing communicating technologies that have molded all of the social relations of modern society. The problematic for this distributed communication capability will be manifest in struggles around the legitimacy of self-expression, assembly, and privacy, in all of their forms. However, unlike the mass mediated discourse where, as the 'audience' object, we observed these externalized struggles by a narrow other, encounters with distributed media are palpable and subjective, and will be increasingly played out on the common terrain of local community. In initiating unconditional public access to the Net, community networks, or FreeNets, began the long process of blurring the distinction between the public and private terrain, of undoing that dichotomy that mass media technologies in this century have systematically rebuilt and fortified. Nudging along the process of democratic self-representation is the central issue for the Net, and the epochal project for community networks.  相似文献   

20.
The Internet is becoming an increasingly important and pervasive channel to market for many organisations. Despite its importance, and the continued pressure to justify IT expenditure, few organisations undertake comprehensive channel evaluation. Market leading evaluation firms provide technical and operational metrics for their clients such as the number of hits per page and site response times, but more sophisticated concepts such as user value and long-term business benefits remain underexplored in practice. In contrast, there is a growing academic literature on channel evaluation. Many frameworks and metrics have been proposed recently. This paper brings theory and practice together by synthesizing existing frameworks proposed by academics with those used by the market leaders in Internet channel evaluation. The resulting framework has two levels—a business- and a user-level. The framework is validated by Internet consultants, channel managers and channel users in three different sectors: retail, financial services and higher education. The framework is refined following the validation in response to the need for a simpler, more usable set of metrics. The outcome is a framework split into three “sets”. Set A constitutes the foundation stone of an Internet channel evaluation programme and consists of a core set of objective user-level metrics. Set B contains a further set of more sophisticated user-level metrics. Set C addresses business-level metrics, which enable the long-term contribution of the Internet channel to be evaluated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号