According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the sta...According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the standard IEC62305-2. According to the difference between common buildings and cable cars, problems of height non-uniformity of equivalent section caused by inclination of the cable car and diversity of lightning activity regularity caused by the large area were resolved, and expected annual average frequency of lightning strike was calculated using three dimensional graphic approach and regional lightning characteristic analysis. Based on different types of damage process and loss consequences, according to interception effect against lightning invasion of the lightning protection measures and the method of probability selection proposed in the standard, the probability of casu- alty caused by direct lightning strike in a cable car and a waiting area as well as probabilities of casualty caused by failure of electronic information systems were cal- culated.展开更多
The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-mak...The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals.展开更多
Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierar...Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information techn...Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information technology industry, the paper reveals the industrial relevance in Chinese information technology industry. The paper also selects the relevant industries which are highly associated with the development of Chinese information technology industry based on industrial relevance degree to analyze the influences of these industries on the financial situation risk fluctuation in information technology industry and to design the matrix of financial situation risk in information technology industry. Then, the paper offers countermeasures and suggestions for the development of our information technology industry.展开更多
It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and...It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages.展开更多
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act...In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards.展开更多
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape...The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.展开更多
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir...‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.展开更多
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures...The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.展开更多
The thesis analyzes risk factors of enterprise's technology innovation, adopts the undetermined measuring model to evaluate technology innovation risk and testifies it through an example.
In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of busin...In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of business activities beyond a national view and exploit international market actively to meet international competitions that increase quickly in the form of allocating resources within the scope of the world. However, the SMSTEs are also facing risks associated with themselves during the process of exploiting international market owing to their own restrictions, so what they should do is to consider risk evaluations in exploiting the international market.展开更多
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ...Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.展开更多
Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidn...Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidneys as kidneys from older donors,from hypertensive or diabetic donors and from nonheart beating donors.These kidneys are known to have frequently a worse outcome in the recipients.To date major problem is to evaluate such kidneys in order to use or to discard them before transplantation.The use of such kidneys create other relevant question as whether to use them as single or dual transplant and to allocate them fairly according transplant programs.The pre-transplant histological evaluation,the clinical evaluation of the donor or both the criteria joined has been used and according the time each criterion prevailed over the others.Aim of this review has been to examine the advantages and the drawbacks of any criterion and how they have changed with time.To date any criterion has several limitations and several authors have argued for the development of new guidelines in the field of the kidney evaluation for transplantation.Several authors argue that the use of omic technologies should improve the organ evaluation and studies are ongoing to evaluate these technologies either in the donor urine or in the biopsies taken before transplantation.展开更多
In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment ...In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment of wind farms was conducted according to the Lightning Protection for Wind Energy System(IEC 61400-24-2019),which proposed the method of lightning strike risk assessment for wind turbine.In fact,the basic idea of the two is the same,that is,the source of the lightning strike wind turbine is transformed from the former S1-S4 to the latter N D-N DJ.According to the above method,wind farm was evaluated,and it has been proved that the practice can not achieve good results.After 2018,China has issued the Guide to Evaluation of Lightning Protection Technology in Buildings(T/GZLY 3-2022)and the Technical Specifications for Lightning Interception in Forest Areas(T/LYCY 4062-2024)based on semicircle protection,in which the source of risk defined by lightning point was closer to the reality,highly targeted and effective.Taking offshore wind farm as an example,this paper introduced a new method of establishing six evaluation indicators to determine the risk level according to the principle of compliance and the new protection technology of semi-circular method,which can be used as a reference for technical personnel.展开更多
Communicating risks and mitigation benefits associated with natural hazards such as wind to the general public is challenging given the location-dependency of parameters and the complexity of the problem.Web tools pla...Communicating risks and mitigation benefits associated with natural hazards such as wind to the general public is challenging given the location-dependency of parameters and the complexity of the problem.Web tools play a crucial role in educating residents,decision-makers,and stakeholders regarding potential wind hazard losses to,for example,residential buildings.However,a notable gap exists on the practical incorporation of mitigation actions within these tools.This gap hampers the collective awareness and understanding among stakeholders,communities,and citizens regarding the tangible advantages of mitigation strategies in reducing wind-related risks.Furthermore,there exists a need to elucidate the functionality and objectives of these tools in a more accessible manner.This study aims to present and outline the wind risk and mitigation calculator tool(WRMCT)within the Hazardaware platform,which is an address-based risk assessment tool.This tool,developed for 196 counties in the Gulf of Mexico coastal area,facilitates users’education of potential risks and benefits associated with mitigation strategies.WRMCT enables users to access location-specific wind risk and interactively suggests potential mitigation actions along with economic savings to support informed decisions and residential risk reduction.WRMCT intends to enhance users’ability to make informed decisions,take proactive measures in mitigating wind hazards,and contribute to the development of resilient,residential communities.展开更多
The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity tar...The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity targeted by a mobile health service and the perceived risk associated with the mobile service itself was developed and tested empirically in the context of an application supporting smoking cessation. The model was validated in a cross-sectional experiment conducted with 422 consumers in the UK and Canada. Findings show that while risk triggered by the nature of a health promotion activity is a strong driver of the adoption of the supporting mobile health service, risk related to the actual application targeting that activity is a comparatively weaker obstacle. The two contrasting risk perspectives are highly significant as they together explain over 31% of the variance in consumer intention to use the mobile health service, independently from other adoption factors. Overall, this study demonstrates that consumer risk perceptions alone are a multifaceted and meaningful component in mobile health services adoption, and that this element should not be overlooked in more complex research models.展开更多
Traffic congestion can largely be attributed to the issues related with driving behavior,which may cause vehicle crash,stop-and-go traffic due to frequent lane changing behaviors,etc.,and makes the driving behavior re...Traffic congestion can largely be attributed to the issues related with driving behavior,which may cause vehicle crash,stop-and-go traffic due to frequent lane changing behaviors,etc.,and makes the driving behavior research also of significance in the realm of traffic management and demand management.The emergence and subsequent rapid advances with new information and communication technologies(ICT)now offers the capability of collecting high-fidelity and high-resolution trajectory data in a cost-effective manner.In this research,we use a smartphone app to collect data for the purpose of studying driving risk factors.What’s unique about the data in this research is its backend server also estimates traffic speed and volume for each link that the vehicle traverses.In order words,the data collected with build-in GPS modules in the smartphone include not only the vehicle spatial-temporal dimension location,which could be used to correlate the network geography attributes and/or real-time traffic condition,but also the detailed information about the vehicle dynamics including speed,acceleration,and deceleration,whereby a driver’s control and maneuver of a vehicle can be analyzed in detail.Such type of dataset combining both user trajectory and link speed/volume information is rarely seen in prior research,permitting a unique opportunity to link critical traffic congestion factors leading to driving behavior and crash potential.In this paper,the overall research framework used in this research is presented,which mainly includes data collection,data processing,calibration and analysis methodology.A preliminary case study-including data summary statistics and correlation analysis-is also presented.The results of our study will further existing knowledge about driving exposure factors that are closely linked to crash risk,and provide the foundation for advanced forms of Usage Based Insurance.展开更多
基金Supported by the Scientific Research Project of Hebei Meteorological Bureau in 2014(14ky20)~~
文摘According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the standard IEC62305-2. According to the difference between common buildings and cable cars, problems of height non-uniformity of equivalent section caused by inclination of the cable car and diversity of lightning activity regularity caused by the large area were resolved, and expected annual average frequency of lightning strike was calculated using three dimensional graphic approach and regional lightning characteristic analysis. Based on different types of damage process and loss consequences, according to interception effect against lightning invasion of the lightning protection measures and the method of probability selection proposed in the standard, the probability of casu- alty caused by direct lightning strike in a cable car and a waiting area as well as probabilities of casualty caused by failure of electronic information systems were cal- culated.
文摘The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals.
基金Supported by the State Spark Program of China ( 2005EA810087)
文摘Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
基金Key project of National Social Scientific Fund--"Study on Financing Early-warning and Fixation of Listed Corporations in Information Technology Industry based on the Dynamic Monitoring of Industrial Risk"(Project approval Number:15AGL008)
文摘Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information technology industry, the paper reveals the industrial relevance in Chinese information technology industry. The paper also selects the relevant industries which are highly associated with the development of Chinese information technology industry based on industrial relevance degree to analyze the influences of these industries on the financial situation risk fluctuation in information technology industry and to design the matrix of financial situation risk in information technology industry. Then, the paper offers countermeasures and suggestions for the development of our information technology industry.
文摘It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages.
文摘In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards.
基金This work was supported in part by National Key R&D Program of China under Grant 2019YFB2102400in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.
文摘The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.
基金Supported by the National Social Science Fund of China(No.16BTQ058)
文摘‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.
文摘The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.
文摘The thesis analyzes risk factors of enterprise's technology innovation, adopts the undetermined measuring model to evaluate technology innovation risk and testifies it through an example.
文摘In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of business activities beyond a national view and exploit international market actively to meet international competitions that increase quickly in the form of allocating resources within the scope of the world. However, the SMSTEs are also facing risks associated with themselves during the process of exploiting international market owing to their own restrictions, so what they should do is to consider risk evaluations in exploiting the international market.
文摘Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.
文摘Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidneys as kidneys from older donors,from hypertensive or diabetic donors and from nonheart beating donors.These kidneys are known to have frequently a worse outcome in the recipients.To date major problem is to evaluate such kidneys in order to use or to discard them before transplantation.The use of such kidneys create other relevant question as whether to use them as single or dual transplant and to allocate them fairly according transplant programs.The pre-transplant histological evaluation,the clinical evaluation of the donor or both the criteria joined has been used and according the time each criterion prevailed over the others.Aim of this review has been to examine the advantages and the drawbacks of any criterion and how they have changed with time.To date any criterion has several limitations and several authors have argued for the development of new guidelines in the field of the kidney evaluation for transplantation.Several authors argue that the use of omic technologies should improve the organ evaluation and studies are ongoing to evaluate these technologies either in the donor urine or in the biopsies taken before transplantation.
基金Huadian International Group Technology Project(172JLC02300248)Research Project on Lightning Protection Technology for 35 kV Collecting Power Line of Wuxuan Qinglan Wind Farm(SFC/WXY-ZX-FW-23-008).
文摘In the past,lightning strike risk assessment of buildings mainly referred to the Protection against Lightning—Part 2:Risk Management(IEC 62305-2-2010)based on protection angle method.Lightning strike risk assessment of wind farms was conducted according to the Lightning Protection for Wind Energy System(IEC 61400-24-2019),which proposed the method of lightning strike risk assessment for wind turbine.In fact,the basic idea of the two is the same,that is,the source of the lightning strike wind turbine is transformed from the former S1-S4 to the latter N D-N DJ.According to the above method,wind farm was evaluated,and it has been proved that the practice can not achieve good results.After 2018,China has issued the Guide to Evaluation of Lightning Protection Technology in Buildings(T/GZLY 3-2022)and the Technical Specifications for Lightning Interception in Forest Areas(T/LYCY 4062-2024)based on semicircle protection,in which the source of risk defined by lightning point was closer to the reality,highly targeted and effective.Taking offshore wind farm as an example,this paper introduced a new method of establishing six evaluation indicators to determine the risk level according to the principle of compliance and the new protection technology of semi-circular method,which can be used as a reference for technical personnel.
文摘Communicating risks and mitigation benefits associated with natural hazards such as wind to the general public is challenging given the location-dependency of parameters and the complexity of the problem.Web tools play a crucial role in educating residents,decision-makers,and stakeholders regarding potential wind hazard losses to,for example,residential buildings.However,a notable gap exists on the practical incorporation of mitigation actions within these tools.This gap hampers the collective awareness and understanding among stakeholders,communities,and citizens regarding the tangible advantages of mitigation strategies in reducing wind-related risks.Furthermore,there exists a need to elucidate the functionality and objectives of these tools in a more accessible manner.This study aims to present and outline the wind risk and mitigation calculator tool(WRMCT)within the Hazardaware platform,which is an address-based risk assessment tool.This tool,developed for 196 counties in the Gulf of Mexico coastal area,facilitates users’education of potential risks and benefits associated with mitigation strategies.WRMCT enables users to access location-specific wind risk and interactively suggests potential mitigation actions along with economic savings to support informed decisions and residential risk reduction.WRMCT intends to enhance users’ability to make informed decisions,take proactive measures in mitigating wind hazards,and contribute to the development of resilient,residential communities.
文摘The purpose of this study is to investigate empirically the role of consumer perceived risks in the adoption of mobile health services. A theoretical model including the perceived risk associated with the activity targeted by a mobile health service and the perceived risk associated with the mobile service itself was developed and tested empirically in the context of an application supporting smoking cessation. The model was validated in a cross-sectional experiment conducted with 422 consumers in the UK and Canada. Findings show that while risk triggered by the nature of a health promotion activity is a strong driver of the adoption of the supporting mobile health service, risk related to the actual application targeting that activity is a comparatively weaker obstacle. The two contrasting risk perspectives are highly significant as they together explain over 31% of the variance in consumer intention to use the mobile health service, independently from other adoption factors. Overall, this study demonstrates that consumer risk perceptions alone are a multifaceted and meaningful component in mobile health services adoption, and that this element should not be overlooked in more complex research models.
基金supported by Federal Highway Administration Broad Agency Announcement“Pay-As-You-Drive-And-You-Save(PAYDAYS)Insurance Actuarial Study”project.Contract award number DTFH61-13-C-00033.
文摘Traffic congestion can largely be attributed to the issues related with driving behavior,which may cause vehicle crash,stop-and-go traffic due to frequent lane changing behaviors,etc.,and makes the driving behavior research also of significance in the realm of traffic management and demand management.The emergence and subsequent rapid advances with new information and communication technologies(ICT)now offers the capability of collecting high-fidelity and high-resolution trajectory data in a cost-effective manner.In this research,we use a smartphone app to collect data for the purpose of studying driving risk factors.What’s unique about the data in this research is its backend server also estimates traffic speed and volume for each link that the vehicle traverses.In order words,the data collected with build-in GPS modules in the smartphone include not only the vehicle spatial-temporal dimension location,which could be used to correlate the network geography attributes and/or real-time traffic condition,but also the detailed information about the vehicle dynamics including speed,acceleration,and deceleration,whereby a driver’s control and maneuver of a vehicle can be analyzed in detail.Such type of dataset combining both user trajectory and link speed/volume information is rarely seen in prior research,permitting a unique opportunity to link critical traffic congestion factors leading to driving behavior and crash potential.In this paper,the overall research framework used in this research is presented,which mainly includes data collection,data processing,calibration and analysis methodology.A preliminary case study-including data summary statistics and correlation analysis-is also presented.The results of our study will further existing knowledge about driving exposure factors that are closely linked to crash risk,and provide the foundation for advanced forms of Usage Based Insurance.