Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.Howeve...Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.展开更多
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest...The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This pape...To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.展开更多
The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organ...The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.展开更多
Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire surve...Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in ...Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in 53 African countries for the period 2004–2011.Information-sharing bureaus are proxied with public credit registries and private credit offices.Financial development dynamics involving depth(at overall economic and financial system levels),efficiency(at banking and financial system levels),activity(from banking and financial system perspectives),and size are used.Results:Two key findings are established.First,the effect of an increase in private credit bureaus is not clearly noticeable on financial access,probably because private credit agencies are still to be established in many countries.Second,an increase in public credit registries for the most part improves financial allocation efficiency and activity(or credit)between the 25th and 75th quartiles.Conclusions:As a main policy implication,countries in the top and bottom ends of the financial efficiency and activity distributions are unlikely to benefit from enhanced financial allocation efficiency as a result of an increase in public credit registries.展开更多
This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the in...This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the information sharing effort level and the output profit of the tourism supply chain under both,centralized decision-making and decentralized decision-making.Finally,numerical simulation is used to verify the model and put forward a method of coordination for all parties in the tourism supply chain to achieve maximum profit.展开更多
Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, he...Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.展开更多
Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch ...Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack in module installation space.However,the multilayer automotive nets software becomes more and more complex,and the development expense is difficult to predict and to keep in check.In this paper,the modeling method of hierarchical automotive nets and the substitution operation based on object-oriented colored Petri net(OOCPN) are proposed.The OOCPN model which analyzes the software structure and validates the collision mechanism of CAN/LIN bus can speed the automobile system development.First,the subsystems are divided and modeled by object-oriented Petri net(OOPN).According to the sets of message sharing relations,the message ports among them are set and the communication gate transitions are defined.Second,the OOPN model is substituted step by step until the inner objects in the automotive body control modules(BCM) are indivisible and colored by colored Petri net(CPN).And the color subsets mark the node messages for the collision mechanism.Third,the OOCPN model of the automotive body CAN/LIN nets is assembled,which keeps the message sets and the system can be expanded.The proposed model is used to analyze features of information sharing among the objects,and it is also used to describe each subsystem real-time behavior of processing messages and implemental device controllers operating,and puts forward a reasonable software framework for the automotive body control subsystem.The research can help to design the communication model in the automotive body system effectively and provide a convenient and rapid way for developing the logical hierarchy software.展开更多
In order to take full advantage of federated filter in fault-tolerant design of integrated navigation system, the limitation of fault detection algorithm for gradual changing fault detection and the poor fault toleran...In order to take full advantage of federated filter in fault-tolerant design of integrated navigation system, the limitation of fault detection algorithm for gradual changing fault detection and the poor fault tolerance of global optimal fusion algorithm are the key problems to deal with. Based on theoretical analysis of the influencing factors of federated filtering fault tolerance, global fault-tolerant fusion algorithm and information sharing algorithm are proposed based on fuzzy assessment. It achieves intelligent fault-tolerant structure with two-stage and feedback, including real-time fault detection in sub-filters, and fault-tolerant fusion and information sharing in main filter. The simulation results demonstrate that the algorithm can effectively improve fault-tolerant ability and ensure relatively high positioning precision of integrated navigation system when a subsystem having gradual changing fault.展开更多
In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and t...In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP)and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network(VANET)without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system(IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost(GAS)is also discussed.展开更多
The sources of supply chain enterprise risk from different aspects including material flow, information flow, cash flow and partner relationship is analyzed. Measures for risk reduction have also been summarized from ...The sources of supply chain enterprise risk from different aspects including material flow, information flow, cash flow and partner relationship is analyzed. Measures for risk reduction have also been summarized from the aspects of risk sharing, information sharing, change of inventory control mode, and supply chain flexibility. Finally, problems in current research on supply chain risk management are pointed out and a discussion on future research trend is presented.展开更多
Modelling based on multi-agent system (MAS) was built for the current production management and process of Shenyang Songyang Paper Cup Co., Ltd. It can transmit the information instantly via order agent (OA), mana...Modelling based on multi-agent system (MAS) was built for the current production management and process of Shenyang Songyang Paper Cup Co., Ltd. It can transmit the information instantly via order agent (OA), manager agent (MA), production agent (PA), and service agent (SA), and realize information sharing. The PA is also built on MAS, and it includes two agents, task agent (TA), and resource agent (RA). It has been found that the modelling is superior to the old one. It can improve the working flow and production efficiency, and shorten the time of delivery.展开更多
To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicas...To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicast from top layer of tree to bottom layer of tree and statistical data are gatbered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services, and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an cxample to describe the working flow of the architecture.展开更多
The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The...The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The essence of MIS-Grid is to transfer the hot wide band information with cheap unidirectional broadcasting channels and the personalized services with relatively expensive interactive networks.展开更多
This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber...This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.展开更多
Information sharing in procurement occurs in rich and varied industry contexts in which managerial decisions are made and organizational strategy is formulated. We explore how information sharing ought to work in proc...Information sharing in procurement occurs in rich and varied industry contexts in which managerial decisions are made and organizational strategy is formulated. We explore how information sharing ought to work in procurement contexts that involve investments in inter-organizational information systems (IOS) and collaborative planning, forecasting and replenishment (CPFR) practices. How and under what circumstances does a firm that plays the role of a supply chain buyer decide to share information on key variables, such as point-of-sale consumer demand data with its supplier, up the supply chain? This is a key issue that crosses the boundary between supply chain management and information systems (IS) management. The answers that we provide are based on our use of a game-theoretic signaling model of buyer and supplier strategy in the presence of uncertainties about final consumer demand. We also explore the connection between operational costs that are associated with the firm's information sharing and information withholding strategies. Our results provide normative guidance to supply chain buyers about how to interpret different demand uncertainty scenarios to improve their decisions and generate high value. From the IS management perspective, we show the impacts on the firm of different information sharing approaches that are made possible by present day technologies.展开更多
Many data sharing applications require that publishing data should protect sensitive information pertaining to individuals, such as diseases of patients, the credit rating of a customer, and the salary of an employee....Many data sharing applications require that publishing data should protect sensitive information pertaining to individuals, such as diseases of patients, the credit rating of a customer, and the salary of an employee. Meanwhile, certain information is required to be published. In this paper, we consider data-publishing applications where the publisher specifies both sensitive information and shared information. An adversary can infer the real value of a sensitive entry with a high confidence by using publishing data. The goal is to protect sensitive information in the presence of data inference using derived association rules on publishing data. We formulate the inference attack framework, and develop complexity results. We show that computing a safe partial table is an NP-hard problem. We classify the general problem into subcases based on the requirements of publishing information, and propose algorithms for finding a safe partial table to publish. We have conducted an empirical study to evaluate these algorithms on real data. The test results show that the proposed algorithms can produce approximate maximal published data and improve the performance of existing algorithms.展开更多
基金supported by Hainan Province Basic and Applied Basic Research Program(Natural Science Field)High-level Talent Project(Grant No.2019RC044).
文摘Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.
文摘The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
基金supported in part by the National Natural Science Foundation of China under grants 61901078,61771082,61871062,and U20A20157in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under grant KJQN201900609+2 种基金in part by the Natural Science Foundation of Chongqing under grant cstc2020jcyj-zdxmX0024in part by University Innovation Research Group of Chongqing under grant CXQT20017in part by the China University Industry-University-Research Collaborative Innovation Fund(Future Network Innovation Research and Application Project)under grant 2021FNA04008.
文摘To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.
基金This project was supported by the National Natural Science Foundation of China (60172012) Hunan Provincial NaturalScience Foundation of China (03JJY3110) .
文摘The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.
基金jointly supported by the National Social Science Foundation of China(Grant No.:14BTQ044)Wuhan University Academic Development Plan for Scholars born after the 1970s for the project of"research on Internet user behavior"Wuhan University Postgraduate English Course on Internet User Behavior and Luo Jia Youth Scholar of Wuhan University
文摘Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
文摘Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in 53 African countries for the period 2004–2011.Information-sharing bureaus are proxied with public credit registries and private credit offices.Financial development dynamics involving depth(at overall economic and financial system levels),efficiency(at banking and financial system levels),activity(from banking and financial system perspectives),and size are used.Results:Two key findings are established.First,the effect of an increase in private credit bureaus is not clearly noticeable on financial access,probably because private credit agencies are still to be established in many countries.Second,an increase in public credit registries for the most part improves financial allocation efficiency and activity(or credit)between the 25th and 75th quartiles.Conclusions:As a main policy implication,countries in the top and bottom ends of the financial efficiency and activity distributions are unlikely to benefit from enhanced financial allocation efficiency as a result of an increase in public credit registries.
文摘This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the information sharing effort level and the output profit of the tourism supply chain under both,centralized decision-making and decentralized decision-making.Finally,numerical simulation is used to verify the model and put forward a method of coordination for all parties in the tourism supply chain to achieve maximum profit.
文摘Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.
基金supported by National Natural Science Foundation of China (Grant No. 60873003)
文摘Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack in module installation space.However,the multilayer automotive nets software becomes more and more complex,and the development expense is difficult to predict and to keep in check.In this paper,the modeling method of hierarchical automotive nets and the substitution operation based on object-oriented colored Petri net(OOCPN) are proposed.The OOCPN model which analyzes the software structure and validates the collision mechanism of CAN/LIN bus can speed the automobile system development.First,the subsystems are divided and modeled by object-oriented Petri net(OOPN).According to the sets of message sharing relations,the message ports among them are set and the communication gate transitions are defined.Second,the OOPN model is substituted step by step until the inner objects in the automotive body control modules(BCM) are indivisible and colored by colored Petri net(CPN).And the color subsets mark the node messages for the collision mechanism.Third,the OOCPN model of the automotive body CAN/LIN nets is assembled,which keeps the message sets and the system can be expanded.The proposed model is used to analyze features of information sharing among the objects,and it is also used to describe each subsystem real-time behavior of processing messages and implemental device controllers operating,and puts forward a reasonable software framework for the automotive body control subsystem.The research can help to design the communication model in the automotive body system effectively and provide a convenient and rapid way for developing the logical hierarchy software.
基金supported by the National Natural Science Foundationof China (60902055)
文摘In order to take full advantage of federated filter in fault-tolerant design of integrated navigation system, the limitation of fault detection algorithm for gradual changing fault detection and the poor fault tolerance of global optimal fusion algorithm are the key problems to deal with. Based on theoretical analysis of the influencing factors of federated filtering fault tolerance, global fault-tolerant fusion algorithm and information sharing algorithm are proposed based on fuzzy assessment. It achieves intelligent fault-tolerant structure with two-stage and feedback, including real-time fault detection in sub-filters, and fault-tolerant fusion and information sharing in main filter. The simulation results demonstrate that the algorithm can effectively improve fault-tolerant ability and ensure relatively high positioning precision of integrated navigation system when a subsystem having gradual changing fault.
文摘In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP)and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network(VANET)without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system(IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost(GAS)is also discussed.
基金This project was supported by the National Natural Science Foundation of China (60574077) and 973 National ResearchProgram of China (2002cb312205).
文摘The sources of supply chain enterprise risk from different aspects including material flow, information flow, cash flow and partner relationship is analyzed. Measures for risk reduction have also been summarized from the aspects of risk sharing, information sharing, change of inventory control mode, and supply chain flexibility. Finally, problems in current research on supply chain risk management are pointed out and a discussion on future research trend is presented.
文摘Modelling based on multi-agent system (MAS) was built for the current production management and process of Shenyang Songyang Paper Cup Co., Ltd. It can transmit the information instantly via order agent (OA), manager agent (MA), production agent (PA), and service agent (SA), and realize information sharing. The PA is also built on MAS, and it includes two agents, task agent (TA), and resource agent (RA). It has been found that the modelling is superior to the old one. It can improve the working flow and production efficiency, and shorten the time of delivery.
基金Supported by the National High-Tech Researchand Development Plan of China (863 Plan 2003AA132080) theResearch Foundationfor Outstanding Young Teachers ,China Univer-sity of Geosciences (CUGQNL0506)
文摘To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicast from top layer of tree to bottom layer of tree and statistical data are gatbered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services, and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an cxample to describe the working flow of the architecture.
基金Supported by the Foundation of National 863 Programme of China (No.2002AA121063) and the National Natural Science Foundation of China (No.60272014)
文摘The dilemma of modern mobile communications technology is analyzed. Aiming at some problems in the 3G systems, a new network architecture is proposed on the principle of mobile information sharing grid (MIS-Grid). The essence of MIS-Grid is to transfer the hot wide band information with cheap unidirectional broadcasting channels and the personalized services with relatively expensive interactive networks.
文摘This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.
基金the MIS Research Center of the University of Minnesota for partial supportthe W.P.Carey Chair at the W.P.Carey School of Business,Arizona State University,Tsinghua University's School of Economics and Management,and the Shidler School of Business at theUniversity of Hawaii for the funding of some research activities related to this work
文摘Information sharing in procurement occurs in rich and varied industry contexts in which managerial decisions are made and organizational strategy is formulated. We explore how information sharing ought to work in procurement contexts that involve investments in inter-organizational information systems (IOS) and collaborative planning, forecasting and replenishment (CPFR) practices. How and under what circumstances does a firm that plays the role of a supply chain buyer decide to share information on key variables, such as point-of-sale consumer demand data with its supplier, up the supply chain? This is a key issue that crosses the boundary between supply chain management and information systems (IS) management. The answers that we provide are based on our use of a game-theoretic signaling model of buyer and supplier strategy in the presence of uncertainties about final consumer demand. We also explore the connection between operational costs that are associated with the firm's information sharing and information withholding strategies. Our results provide normative guidance to supply chain buyers about how to interpret different demand uncertainty scenarios to improve their decisions and generate high value. From the IS management perspective, we show the impacts on the firm of different information sharing approaches that are made possible by present day technologies.
基金Supported by the Program for New Century Excellent Talents in Universities (Grant No. NCET-06-0290)the National Natural Science Foundation of China (Grant Nos. 60828004, 60503036)the Fok Ying Tong Education Foundation Award (Grant No. 104027)
文摘Many data sharing applications require that publishing data should protect sensitive information pertaining to individuals, such as diseases of patients, the credit rating of a customer, and the salary of an employee. Meanwhile, certain information is required to be published. In this paper, we consider data-publishing applications where the publisher specifies both sensitive information and shared information. An adversary can infer the real value of a sensitive entry with a high confidence by using publishing data. The goal is to protect sensitive information in the presence of data inference using derived association rules on publishing data. We formulate the inference attack framework, and develop complexity results. We show that computing a safe partial table is an NP-hard problem. We classify the general problem into subcases based on the requirements of publishing information, and propose algorithms for finding a safe partial table to publish. We have conducted an empirical study to evaluate these algorithms on real data. The test results show that the proposed algorithms can produce approximate maximal published data and improve the performance of existing algorithms.