Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the sta...According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the standard IEC62305-2. According to the difference between common buildings and cable cars, problems of height non-uniformity of equivalent section caused by inclination of the cable car and diversity of lightning activity regularity caused by the large area were resolved, and expected annual average frequency of lightning strike was calculated using three dimensional graphic approach and regional lightning characteristic analysis. Based on different types of damage process and loss consequences, according to interception effect against lightning invasion of the lightning protection measures and the method of probability selection proposed in the standard, the probability of casu- alty caused by direct lightning strike in a cable car and a waiting area as well as probabilities of casualty caused by failure of electronic information systems were cal- culated.展开更多
The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-mak...The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals.展开更多
Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierar...Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system.展开更多
Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information techn...Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information technology industry, the paper reveals the industrial relevance in Chinese information technology industry. The paper also selects the relevant industries which are highly associated with the development of Chinese information technology industry based on industrial relevance degree to analyze the influences of these industries on the financial situation risk fluctuation in information technology industry and to design the matrix of financial situation risk in information technology industry. Then, the paper offers countermeasures and suggestions for the development of our information technology industry.展开更多
It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and...It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages.展开更多
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape...The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.展开更多
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir...‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.展开更多
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures...The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.展开更多
The thesis analyzes risk factors of enterprise's technology innovation, adopts the undetermined measuring model to evaluate technology innovation risk and testifies it through an example.
In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of busin...In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of business activities beyond a national view and exploit international market actively to meet international competitions that increase quickly in the form of allocating resources within the scope of the world. However, the SMSTEs are also facing risks associated with themselves during the process of exploiting international market owing to their own restrictions, so what they should do is to consider risk evaluations in exploiting the international market.展开更多
Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the ...Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.展开更多
Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidn...Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidneys as kidneys from older donors,from hypertensive or diabetic donors and from nonheart beating donors.These kidneys are known to have frequently a worse outcome in the recipients.To date major problem is to evaluate such kidneys in order to use or to discard them before transplantation.The use of such kidneys create other relevant question as whether to use them as single or dual transplant and to allocate them fairly according transplant programs.The pre-transplant histological evaluation,the clinical evaluation of the donor or both the criteria joined has been used and according the time each criterion prevailed over the others.Aim of this review has been to examine the advantages and the drawbacks of any criterion and how they have changed with time.To date any criterion has several limitations and several authors have argued for the development of new guidelines in the field of the kidney evaluation for transplantation.Several authors argue that the use of omic technologies should improve the organ evaluation and studies are ongoing to evaluate these technologies either in the donor urine or in the biopsies taken before transplantation.展开更多
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
基金Supported by the Scientific Research Project of Hebei Meteorological Bureau in 2014(14ky20)~~
文摘According to structure function and lightning damage of a cable car, a feasible method of lightning strike risk evaluation for a cable car was put forward based on the evaluation model and evaluation method in the standard IEC62305-2. According to the difference between common buildings and cable cars, problems of height non-uniformity of equivalent section caused by inclination of the cable car and diversity of lightning activity regularity caused by the large area were resolved, and expected annual average frequency of lightning strike was calculated using three dimensional graphic approach and regional lightning characteristic analysis. Based on different types of damage process and loss consequences, according to interception effect against lightning invasion of the lightning protection measures and the method of probability selection proposed in the standard, the probability of casu- alty caused by direct lightning strike in a cable car and a waiting area as well as probabilities of casualty caused by failure of electronic information systems were cal- culated.
文摘The general goal of the management of communication and information technology (MCIT) in the health sector, is to accelerate collecting, achieving and supporting the health system processes, and effective decision-making for managing this system;because preparing and providing health care services for society is very complex, and highly dependent on the information system. The aim of this investigation is to determine the mean scores of the possibility of implementing the MCIT standards in Khorasan Razavi hospitals, from the perspective of managers. This was a cross sectional descriptive-analytic study conducted in two steps in all hospitals. In the first step, the applicability of the standards in hospitals was studied. In the second step, the current status of hospitals was compared with international standards MCIT. In order to determine the validity of the questionnaires, opinions of professors and experts were acquired. Regarding the reliability, the SPSS V. 12 calculated the value of Cronbach’s to be 0.95 for the first questionnaire and 0.86 for the second questionnaire. Data were analyzed using statistic tests of one way ANOVA and t-test. The level of significance was fixed at 0.5. In the 16 hospitals studied, the mean and standard deviation of MCIT were (57.25 ± 13.74). The MCIT standards are applicable in hospitals of Khorasan Razavi according to half (49.4%) of managers;nonetheless, their application requires greater efforts by the hospitals.
基金Supported by the State Spark Program of China ( 2005EA810087)
文摘Method of fuzzy comprehensive evaluation is used to carry out suitability evaluation on the information service system of "Agricultural Science and Technology 110" in Sichuan Province, China. Analytic hierarchy process (AHP) and expert consultation method are used to determine the evaluation index system and index weight. Suitability effect of the information service system of "Agricultural Science and Technology 110" is taken as the target layer. The five indices at criterion layer are the organizational mode of agricultural information service, the support system of agricultural information resources, the agricultural information transfer system, the capital source of agricultural information service, and the support system of agricultural information service. And the index layer includes the talent team of agent service, the interaction between the subject and object, the accuracy of agricultural information, the convenience of agricultural information transfer, the adequacy of fund, the efficiency in the use of fund, the status of information infrastructure and so on. Evaluation result shows that the information service system of "Agricultural Science and Technology 110" in Sichuan Province is suitable for the rural economic development at present. The major factors restricting the information service system are the lack of continuity, the weak infrastructure of agricultural information infrastructure, and the relatively low education level of agricultural producers. Therefore, we should further explore and improve the operation mechanism of agricultural information service, expand the capital source of agricultural information service, strengthen the construction of agricultural infrastructure, and ensure the continuous operation of information service system.
基金Key project of National Social Scientific Fund--"Study on Financing Early-warning and Fixation of Listed Corporations in Information Technology Industry based on the Dynamic Monitoring of Industrial Risk"(Project approval Number:15AGL008)
文摘Based on Input-Output Table in 2010 issued by National Bureau of Statistics of China, with the help of input-output model and with the calculation of indexes of industrial relevance degree in Chinese information technology industry, the paper reveals the industrial relevance in Chinese information technology industry. The paper also selects the relevant industries which are highly associated with the development of Chinese information technology industry based on industrial relevance degree to analyze the influences of these industries on the financial situation risk fluctuation in information technology industry and to design the matrix of financial situation risk in information technology industry. Then, the paper offers countermeasures and suggestions for the development of our information technology industry.
文摘It is important to effectively identify the data value of open source scientific and technological information and to help intelligence analysts select high-value data from a large number of open-source scientific and technological information. The data value evaluation methods of scientific and technological information is proposed in the open source environment. According to the characteristics of the methods, the data value evaluation methods were divided into the following three aspects: research on data value evaluation methods based on information metrology, research on data value evaluation methods based on economic perspective and research on data value assessment methods based on text analysis. For each method, it indicated the main ideas, application scenarios, advantages and disadvantages.
基金This work was supported in part by National Key R&D Program of China under Grant 2019YFB2102400in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.
文摘The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.
基金Supported by the National Social Science Fund of China(No.16BTQ058)
文摘‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.
文摘The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.
文摘The thesis analyzes risk factors of enterprise's technology innovation, adopts the undetermined measuring model to evaluate technology innovation risk and testifies it through an example.
文摘In the high technology industry, small and medium sized technology enterprises (SMSTEs) play a pivotal role in advancing the whole industry. To achieve sustainable development, they need to extend their scope of business activities beyond a national view and exploit international market actively to meet international competitions that increase quickly in the form of allocating resources within the scope of the world. However, the SMSTEs are also facing risks associated with themselves during the process of exploiting international market owing to their own restrictions, so what they should do is to consider risk evaluations in exploiting the international market.
文摘Our study aims to take a closer look at China's current information literacy(IL) program standards at secondary schools and to analyze their level of success and/or failures in a comparative way with those of the United States in terms of fulfilling their each other's mission-oriented mandates. Our research findings show that China's current IL standards of high schools contain a disproportionate emphasis on information technology(IT). Moreover, the stipulations of these IL standards are narrowly construed and without being solidly grounded on a broad and comprehensive educational perspective. We also suggest that there are two underlying causes for this set of unsound IL standards in China.Firstly, there is a lack of collaboration between two major competing forces engaged in the curricular development and research of IL in China: Those professionals in educational IT discipline vis-à-vis those in Library and Information Science. Secondly, library professionals have a very limited influence on major socio-cultural policies, even at their own institutions. As a result, this paper recommends the following three possible measures,which may help remedy this situation strategically: 1) Establishing a set of new IL curriculum standards based on an IL-centered educational perspective; 2) establishing a teacher-librarian's training program to promote school librarians' role in IL education; and 3) strengthening the research and development of an online IL education program and an accompanied evaluation mechanism.
文摘Organ shortage represents one of the major limitations to the development of kidney transplantation.To increase the donor pool and to answer the ever increasing kidney request,physicians are recurring to marginal kidneys as kidneys from older donors,from hypertensive or diabetic donors and from nonheart beating donors.These kidneys are known to have frequently a worse outcome in the recipients.To date major problem is to evaluate such kidneys in order to use or to discard them before transplantation.The use of such kidneys create other relevant question as whether to use them as single or dual transplant and to allocate them fairly according transplant programs.The pre-transplant histological evaluation,the clinical evaluation of the donor or both the criteria joined has been used and according the time each criterion prevailed over the others.Aim of this review has been to examine the advantages and the drawbacks of any criterion and how they have changed with time.To date any criterion has several limitations and several authors have argued for the development of new guidelines in the field of the kidney evaluation for transplantation.Several authors argue that the use of omic technologies should improve the organ evaluation and studies are ongoing to evaluate these technologies either in the donor urine or in the biopsies taken before transplantation.