期刊文献+
共找到1,399篇文章
< 1 2 70 >
每页显示 20 50 100
Technology Research on Lightning Strike Risk Evaluation of a Cable Car 被引量:3
1
作者 扈勇 冯鹤 《Agricultural Science & Technology》 CAS 2015年第10期2318-2321,共4页
According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the sta... According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the standard IEC62305-2. According to the difference between common buildings and cable cars, problems of height non-uniformity of equivalent section caused by inclination of the cable car and diversity of lightning activity regularity caused by the large area were resolved, and expected annual average frequency of lightning strike was calculated using three dimensional graphic approach and regional lightning characteristic analysis. Based on different types of damage process and loss consequences, according to interception effect against lightning invasion of the lightning protection measures and the method of probability selection proposed in the standard, the probability of casu- alty caused by direct lightning strike in a cable car and a waiting area as well as probabilities of casualty caused by failure of electronic information systems were cal- culated. 展开更多
关键词 Cable cars Lightning strike risk evaluation technology research
下载PDF
Evaluation of International Standards of Management of Communication and Information Technology (MCIT) in Khorasan Razavi Hospitals from the Perspective of Managers
2
作者 Saeed Shojaei Fereshteh Farzianpour +2 位作者 Mohammad Arab Abbas Rahimi Foroushani Esmaeil Hosseinzadeh Roknabadi 《Health》 2015年第8期920-926,共7页
The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-mak... The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals. 展开更多
关键词 evaluation INTERNATIONAL STANDARDS MANAGEMENT of COMMUNICATION and information technology MANAGERS Hospitals
下载PDF
Suitability Evaluation on the Information Service System of "Agricultural Science and Technology 110" in Sichuan Province, China 被引量:1
3
作者 HU Yu-fu1,2,DENG Liang-ji1,2 1. College of Economics and Management,Sichuan Agricultural University, Ya′an 625014, China 2. College of Resources and Environment, Sichuan Agricultural University, Ya′an 625014, China 《Asian Agricultural Research》 2010年第9期17-20,24,共5页
Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierar... Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system. 展开更多
关键词 AGRICULTURAL SCIENCE and technology 110 Agricultur
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
4
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 information technology (IT) Identity and Access Management (IAM) Saviynt User Identities Access Privileges Authentication Processes risk Management
下载PDF
Research on Industrial Relevance Degree and Industrial Financial Situation Risk Matrix Construction——Based on Chinese Information Technology Industry
5
作者 Youtang Zhang Yi Xiong Yuna Li 《财会月刊(中)》 北大核心 2015年第10Z期3-10,共8页
Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information techn... Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information technology industry, the paper reveals the industrial relevance in Chinese information technology industry. The paper also selects the relevant industries which are highly associated with the development of Chinese information technology industry based on industrial relevance degree to analyze the influences of these industries on the financial situation risk fluctuation in information technology industry and to design the matrix of financial situation risk in information technology industry. Then, the paper offers countermeasures and suggestions for the development of our information technology industry. 展开更多
关键词 information technology INDUSTRY INDUSTRIAL Association DEGREE FINANCIAL SITUATION risk Matrix
下载PDF
Survey of Data Value Evaluation Methods Based on Open Source Scientific and Technological Information
6
作者 Xiaolin Wang Cheng Dong +2 位作者 Wen Zeng Zhen Xu Junsheng Zhang 《国际计算机前沿大会会议论文集》 2019年第1期183-185,共3页
It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and... It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages. 展开更多
关键词 Data value evaluation OPEN-SOURCE SCIENTIFIC and technologICAL information information metrology Economic perspective TEXT analysis
下载PDF
AssessITS: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
7
作者 Mir Mehedi Rahman Naresh Kshetri +1 位作者 Sayed Abu Sayeed Md Masud Rana 《Journal of Information Security》 2024年第4期564-588,共25页
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act... In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards. 展开更多
关键词 CYBERSECURITY information Security risk Assessment risk evaluation risk Mitigation Threat Level Vulnerability Assessment
下载PDF
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
8
作者 Jinxin Zuo Yueming Lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
下载PDF
An empowerment evaluation framework for national scientific and technical information governance 被引量:1
9
作者 hao Keran Chen Meihua Zeng Wen 《High Technology Letters》 EI CAS 2019年第4期461-469,共9页
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir... ‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation. 展开更多
关键词 scientific and technical(S&T) information governance empowerment evaluation technology assessment EE-capability system
下载PDF
International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation’s Sustainable Development Goals
10
作者 Maryam Roshanaei Qiang Duan 《Journal of Computer and Communications》 2021年第10期44-59,共16页
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures... The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs. 展开更多
关键词 Trust Provisioning Fourth Industrial Revolution information Communication and technologies Sustainable Development Goals Global risks Cyber Physical and Social Infrastructure
下载PDF
The Evaluating Method of Technology Innovation Risk
11
作者 Jianqi Mao Xiangbin Sun 《Chinese Business Review》 2004年第3期60-63,共4页
The thesis analyzes risk factors of enterprise's technology innovation, adopts the undetermined measuring model to evaluate technology innovation risk and testifies it through an example.
关键词 technology innovation risk undetermined measuring model evaluation
下载PDF
Risk-evaluation of Hi-tech Enterprise in the Process of Approaching Global Market
12
作者 Xiang Laisheng1, Guo Yajun1, Li Zhanfang2 1. School of Management, Northeastern University, Shenyang Liaoning 110004, China 2. Development Research Center of Liaoning People’s Government, Shenyang Liaoning 110032, China 《Chinese Journal of Population,Resources and Environment》 北大核心 2007年第2期49-52,共4页
In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of busin... In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of business activities beyond a national view and exploit international market actively to meet international competitions that increase quickly in the form of allocating resources within the scope of the world. However, the SMSTEs are also facing risks associated with themselves during the process of exploiting international market owing to their own restrictions, so what they should do is to consider risk evaluations in exploiting the international market. 展开更多
关键词 international market exploiting small-and-medium sized technology enterprise risk evaluation
下载PDF
A comparative analysis of information literacy curriculum standards in the educational programs of high schools in China and in the United States 被引量:1
13
作者 Jianhua WU Jing GUO Jing SUN 《Chinese Journal of Library and Information Science》 2011年第2期41-59,共19页
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ... Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism. 展开更多
关键词 information literacy education Curriculum standards information literacy evaluation criteria information literacy education policy information technology literacy Secondary education School librarian training Teacher training
下载PDF
Histological and clinical evaluation of marginal donor kidneys before transplantation: Which is best?
14
作者 Maurizio Salvadori Aris Tsalouchos 《World Journal of Transplantation》 2019年第4期62-80,共19页
Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidn... Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidneys as kidneys from older donors,from hypertensive or diabetic donors and from nonheart beating donors.These kidneys are known to have frequently a worse outcome in the recipients.To date major problem is to evaluate such kidneys in order to use or to discard them before transplantation.The use of such kidneys create other relevant question as whether to use them as single or dual transplant and to allocate them fairly according transplant programs.The pre-transplant histological evaluation,the clinical evaluation of the donor or both the criteria joined has been used and according the time each criterion prevailed over the others.Aim of this review has been to examine the advantages and the drawbacks of any criterion and how they have changed with time.To date any criterion has several limitations and several authors have argued for the development of new guidelines in the field of the kidney evaluation for transplantation.Several authors argue that the use of omic technologies should improve the organ evaluation and studies are ongoing to evaluate these technologies either in the donor urine or in the biopsies taken before transplantation. 展开更多
关键词 KIDNEY evaluation Pre-transplant biopsies KIDNEY DONOR evaluation KIDNEY risk profile index Omic technologies Deceased DONOR SCORE DONOR risk SCORE
下载PDF
New Approach to Lightning Strike Risk Assessment of Wind Farm
15
作者 Xiaofei MENG Chiyu ZHONG +5 位作者 Junjie ZHOU Yu HUANG Jinglin LIANG Kuangzheng QING Jianming LI Yan YANG 《Meteorological and Environmental Research》 2024年第5期48-51,55,共5页
In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment ... In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment of wind farms was conducted according to the Lightning Protection for Wind Energy System(IEC 61400-24-2019),which proposed the method of lightning strike risk assessment for wind turbine.In fact,the basic idea of the two is the same,that is,the source of the lightning strike wind turbine is transformed from the former S1-S4 to the latter N D-N DJ.According to the above method,wind farm was evaluated,and it has been proved that the practice can not achieve good results.After 2018,China has issued the Guide to Evaluation of Lightning Protection Technology in Buildings(T/GZLY 3-2022)and the Technical Specifications for Lightning Interception in Forest Areas(T/LYCY 4062-2024)based on semicircle protection,in which the source of risk defined by lightning point was closer to the reality,highly targeted and effective.Taking offshore wind farm as an example,this paper introduced a new method of establishing six evaluation indicators to determine the risk level according to the principle of compliance and the new protection technology of semi-circular method,which can be used as a reference for technical personnel. 展开更多
关键词 Lightning strike risk assessment New protection technology of semi-circular method Basic principle New evaluation method
下载PDF
Computer analysis and evaluation of the training load system build
16
作者 Guo KeLei 《Journal of Zhouyi Research》 2014年第3期13-14,共2页
关键词 计算机分析 负荷系统 训练系统 综合评价 计算机集成管理 逻辑分析法 文献资料 网络技术
下载PDF
Wind risk and mitigation calculator framework for determining the wind annualized risk for single- and multi-family homes to support resilient community decision-making
17
作者 Ayat Al Assi Rubayet Bin Mostafiz +6 位作者 Fatemeh Orooji Arash Taghinezhad Melanie Gall Robert V.Rohli Christopher T.Emrich Carol J.Friedland Eric Johnson 《Resilient Cities and Structures》 2024年第4期21-33,共13页
Communicating risks and mitigation benefits associated with natural hazards such as wind to the general public is challenging given the location-dependency of parameters and the complexity of the problem.Web tools pla... Communicating risks and mitigation benefits associated with natural hazards such as wind to the general public is challenging given the location-dependency of parameters and the complexity of the problem.Web tools play a crucial role in educating residents,decision-makers,and stakeholders regarding potential wind hazard losses to,for example,residential buildings.However,a notable gap exists on the practical incorporation of mitigation actions within these tools.This gap hampers the collective awareness and understanding among stakeholders,communities,and citizens regarding the tangible advantages of mitigation strategies in reducing wind-related risks.Furthermore,there exists a need to elucidate the functionality and objectives of these tools in a more accessible manner.This study aims to present and outline the wind risk and mitigation calculator tool(WRMCT)within the Hazardaware platform,which is an address-based risk assessment tool.This tool,developed for 196 counties in the Gulf of Mexico coastal area,facilitates users’education of potential risks and benefits associated with mitigation strategies.WRMCT enables users to access location-specific wind risk and interactively suggests potential mitigation actions along with economic savings to support informed decisions and residential risk reduction.WRMCT intends to enhance users’ability to make informed decisions,take proactive measures in mitigating wind hazards,and contribute to the development of resilient,residential communities. 展开更多
关键词 Wind risk assessment Average annual loss(AAL) Public information technology Wind mitigation Wind loss analysis Catastrophic risk modeling Resilient communities
下载PDF
暴雨灾害风险评估与区划——以山东省滨州市为例
18
作者 刘安琪 张晓婧 +2 位作者 任建成 刘莉莉 卢晓宁 《华北理工大学学报(自然科学版)》 CAS 2025年第1期33-42,共10页
选取滨州市国家级气象观测站1978~2020年观测资料及区域自动站建站以来的观测资料、暴雨灾害灾情、地理信息与其他社会经济资料,应用GIS技术及统计方法多因子的叠加,综合得出暴雨灾害风险评估和区划:(1)山东滨州暴雨危险性大致为中北部... 选取滨州市国家级气象观测站1978~2020年观测资料及区域自动站建站以来的观测资料、暴雨灾害灾情、地理信息与其他社会经济资料,应用GIS技术及统计方法多因子的叠加,综合得出暴雨灾害风险评估和区划:(1)山东滨州暴雨危险性大致为中北部地区高于南部地区。(2)滨城区大部、邹平市中部偏南的地区、无棣县西南部、沾化区东南部、惠民县东部与南部边缘、阳信县中东部及博兴县南部边缘地区人口暴雨灾害风险为高或较高。(3)经济暴雨灾害风险高或者较高的地区主要为滨城区大部、邹平市中南部、惠民县北部与南部边缘、无棣县中南部及博兴县南部边缘地区。(4)滨城区中北部与南部边缘地区、惠民县东部和东南部、博兴县南部小部分地区、沾化中西部和东南部暴雨农业风险为高或较高。 展开更多
关键词 暴雨灾害风险评估与区划 地理信息系统技术 气象灾害
下载PDF
Consumer Risk Perceptions in Mobile Health Services Adoption: Do They Matter?
19
作者 Mihail Cocosila Ofir Turel 《E-Health Telecommunication Systems and Networks》 2022年第2期67-84,共18页
The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity tar... The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity targeted by a mobile health service and the perceived risk associated with the mobile service itself was developed and tested empirically in the context of an application supporting smoking cessation. The model was validated in a cross-sectional experiment conducted with 422 consumers in the UK and Canada. Findings show that while risk triggered by the nature of a health promotion activity is a strong driver of the adoption of the supporting mobile health service, risk related to the actual application targeting that activity is a comparatively weaker obstacle. The two contrasting risk perspectives are highly significant as they together explain over 31% of the variance in consumer intention to use the mobile health service, independently from other adoption factors. Overall, this study demonstrates that consumer risk perceptions alone are a multifaceted and meaningful component in mobile health services adoption, and that this element should not be overlooked in more complex research models. 展开更多
关键词 Mobile Service information and Communication technology Consumer Adoption Perceived risk Healthcare
下载PDF
Studying Driving Risk Factors using Multi-Source Mobile Computing Data
20
作者 Xianbiao Hu Yi-Chang Chiu +1 位作者 Yu-Luen Ma Lei Zhu 《International Journal of Transportation Science and Technology》 2015年第3期295-311,共17页
Traffic congestion can largely be attributed to the issues related with driving behavior,which may cause vehicle crash,stop-and-go traffic due to frequent lane changing behaviors,etc.,and makes the driving behavior re... Traffic congestion can largely be attributed to the issues related with driving behavior,which may cause vehicle crash,stop-and-go traffic due to frequent lane changing behaviors,etc.,and makes the driving behavior research also of significance in the realm of traffic management and demand management.The emergence and subsequent rapid advances with new information and communication technologies(ICT)now offers the capability of collecting high-fidelity and high-resolution trajectory data in a cost-effective manner.In this research,we use a smartphone app to collect data for the purpose of studying driving risk factors.What’s unique about the data in this research is its backend server also estimates traffic speed and volume for each link that the vehicle traverses.In order words,the data collected with build-in GPS modules in the smartphone include not only the vehicle spatial-temporal dimension location,which could be used to correlate the network geography attributes and/or real-time traffic condition,but also the detailed information about the vehicle dynamics including speed,acceleration,and deceleration,whereby a driver’s control and maneuver of a vehicle can be analyzed in detail.Such type of dataset combining both user trajectory and link speed/volume information is rarely seen in prior research,permitting a unique opportunity to link critical traffic congestion factors leading to driving behavior and crash potential.In this paper,the overall research framework used in this research is presented,which mainly includes data collection,data processing,calibration and analysis methodology.A preliminary case study-including data summary statistics and correlation analysis-is also presented.The results of our study will further existing knowledge about driving exposure factors that are closely linked to crash risk,and provide the foundation for advanced forms of Usage Based Insurance. 展开更多
关键词 Driving risk Factors Smartphone Trajectory Data information and Communication technologies(ICT) Usage Based Insurance(UBI) Pay-As-You-Drive-And-You-Save(PAYDAYS)
下载PDF
上一页 1 2 70 下一页 到第
使用帮助 返回顶部