The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.Howeve...Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This pape...To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.展开更多
More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Ur...More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.展开更多
Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-...Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-multiple retailer model in which retailer demands may be correlated. Each member in the supply chain forecasts its demand using an AR (1) demand process. Two conditions of the information sharing are considered (1) Without the information sharing, the retailers only communicate their orders to the supplier. (2) With the information sharing, retailers communicate their orders and forecasting models to the supplier. Analyses showthat the reductions of supplier's average inventory and average costs are substantial with the information sharing. However, the retailers donot get direct benefit from the information sharing. The retailers may ask the supplier to reduce the replenishment leadtime, so that the retailers will obtain substantial cost savings and inventory reduction. Both partners may obtain benefits when information sharing and leadtime reduction are implemented together.展开更多
The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organ...The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.展开更多
Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire surve...Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in ...Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in 53 African countries for the period 2004–2011.Information-sharing bureaus are proxied with public credit registries and private credit offices.Financial development dynamics involving depth(at overall economic and financial system levels),efficiency(at banking and financial system levels),activity(from banking and financial system perspectives),and size are used.Results:Two key findings are established.First,the effect of an increase in private credit bureaus is not clearly noticeable on financial access,probably because private credit agencies are still to be established in many countries.Second,an increase in public credit registries for the most part improves financial allocation efficiency and activity(or credit)between the 25th and 75th quartiles.Conclusions:As a main policy implication,countries in the top and bottom ends of the financial efficiency and activity distributions are unlikely to benefit from enhanced financial allocation efficiency as a result of an increase in public credit registries.展开更多
We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system i...We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system is composed of two elements. First, the number of patients for each triage level and the accepted number of patients in each diagnosis and treatment department are obtained in real time, including response for changing triage level. Second, this information is shared in real time among hospitals, the admim'stration, and residents who are searching for their family. A disaster drill utilizing this system was held at the University of Yamanashi Hospital with 450 participants. From the result of that, the present system could work for those two elements. TRACY was examined its availability and practicability in this drill.展开更多
This paper investigates the effect of the comprehensive information sharing on aggregate credit volume and the default ratio. Firstly, we utilize a three-stage game model developed by Dell'Ariccia and Marquez (2006...This paper investigates the effect of the comprehensive information sharing on aggregate credit volume and the default ratio. Firstly, we utilize a three-stage game model developed by Dell'Ariccia and Marquez (2006) to illustrate that the comprehensive information sharing would change the credit resource allocation and produce negative "composition effects" stated by Jappelli and Pagano (2005). Then we use European Union (EU) data to test these theoretical implications. We find that when the information sharing system develops to a relatively high level, comprehensive information sharing improvements, for both the width and depth, are associated with the rise in macro credit access but also the aggregate default risk. We further find that the macro-consequences of variations in information sharing just differ in OECD and non-OECD group in EU countries. For OECD countries, the negative "composition effects" mainly arise from the increase in the width of information sharing while these effects are correlated with both the rise in depth and width indicators for non-OECD countries.展开更多
In this paper, we discuss the relationship between the sharing of information of supply chains and the supply chain management; we also discuss the function of information share, and the obstacles in sharing informati...In this paper, we discuss the relationship between the sharing of information of supply chains and the supply chain management; we also discuss the function of information share, and the obstacles in sharing information. As we all know, information share between enterprises in supply chains is necessary and possible, but the existence of obstacles of sharing information in supply chains is also a severe challenge in practice. This paper tries to find right ways for enterprises to build the real trade partners' relationship and realize transferring the information smoothly in all these three levels among the partners in supply chains.展开更多
This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the in...This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the information sharing effort level and the output profit of the tourism supply chain under both,centralized decision-making and decentralized decision-making.Finally,numerical simulation is used to verify the model and put forward a method of coordination for all parties in the tourism supply chain to achieve maximum profit.展开更多
The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore...The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore, it is important to develop a practical mine safety assurance information system (CSAIS). Based on analyzing the actual management mode for ventilation and safety on mine, the paper studies the structure and function of the mine safety assurance information system based on GIS in detail. Moreover, it also suggests some applications and solutions. By combining with the practical situation, the paper realizes the whole function of the present system.展开更多
This paper design the agricultural products circulation information system based on Internet of things, the information system in the agficultttral products circulation creative use Internet of things technology, to r...This paper design the agricultural products circulation information system based on Internet of things, the information system in the agficultttral products circulation creative use Internet of things technology, to realize the a greater extent information sharing. The system adopts the design idea of the software SOA, it emphasizes the independence of service module. I hope this system can provide some reference to the agricultural products circulation information.展开更多
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest...The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
The effect of strict segmentation on pricing in the context of the Chinese stock markets was investigated. As an effective complementary to domestic A share market, H share market has played an important role in attra...The effect of strict segmentation on pricing in the context of the Chinese stock markets was investigated. As an effective complementary to domestic A share market, H share market has played an important role in attracting foreign capital flows into mainland and as an open window for foreign investors to know Chinese enterprises. However, H share has received little attention by researchers. Considered that H share market enjoys relatively more free information and has a greater and faster access to global news sources, The discount between H share and A share is mainly studied in this paper. By constructing the model and based on proposed hypotheses, the empirical test confirms information asymmetry between foreign investors and domestic investors, liquidity effects, diversification effects are significant factors in explaining discounts on H share from the cross-section data.展开更多
This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber...This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.展开更多
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
基金supported by Hainan Province Basic and Applied Basic Research Program(Natural Science Field)High-level Talent Project(Grant No.2019RC044).
文摘Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
基金supported in part by the National Natural Science Foundation of China under grants 61901078,61771082,61871062,and U20A20157in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under grant KJQN201900609+2 种基金in part by the Natural Science Foundation of Chongqing under grant cstc2020jcyj-zdxmX0024in part by University Innovation Research Group of Chongqing under grant CXQT20017in part by the China University Industry-University-Research Collaborative Innovation Fund(Future Network Innovation Research and Application Project)under grant 2021FNA04008.
文摘To guarantee the heterogeneous delay requirements of the diverse vehicular services,it is necessary to design a full cooperative policy for both Vehicle to Infrastructure(V2I)and Vehicle to Vehicle(V2V)links.This paper investigates the reduction of the delay in edge information sharing for V2V links while satisfying the delay requirements of the V2I links.Specifically,a mean delay minimization problem and a maximum individual delay minimization problem are formulated to improve the global network performance and ensure the fairness of a single user,respectively.A multi-agent reinforcement learning framework is designed to solve these two problems,where a new reward function is proposed to evaluate the utilities of the two optimization objectives in a unified framework.Thereafter,a proximal policy optimization approach is proposed to enable each V2V user to learn its policy using the shared global network reward.The effectiveness of the proposed approach is finally validated by comparing the obtained results with those of the other baseline approaches through extensive simulation experiments.
文摘More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.
文摘Prior research has generally focused on models involving a single or multiple retailers with independent demands. The value of demand information sharing is analyzed in a two-level supply chain involving one supplier-multiple retailer model in which retailer demands may be correlated. Each member in the supply chain forecasts its demand using an AR (1) demand process. Two conditions of the information sharing are considered (1) Without the information sharing, the retailers only communicate their orders to the supplier. (2) With the information sharing, retailers communicate their orders and forecasting models to the supplier. Analyses showthat the reductions of supplier's average inventory and average costs are substantial with the information sharing. However, the retailers donot get direct benefit from the information sharing. The retailers may ask the supplier to reduce the replenishment leadtime, so that the retailers will obtain substantial cost savings and inventory reduction. Both partners may obtain benefits when information sharing and leadtime reduction are implemented together.
基金This project was supported by the National Natural Science Foundation of China (60172012) Hunan Provincial NaturalScience Foundation of China (03JJY3110) .
文摘The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, ( 1 ) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible.
基金jointly supported by the National Social Science Foundation of China(Grant No.:14BTQ044)Wuhan University Academic Development Plan for Scholars born after the 1970s for the project of"research on Internet user behavior"Wuhan University Postgraduate English Course on Internet User Behavior and Luo Jia Youth Scholar of Wuhan University
文摘Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
文摘Background:The purpose of this study is to investigate how an increase in information-sharing bureaus affects financial access.Methods:We employed contemporary and non-contemporary interactive quantile regressions in 53 African countries for the period 2004–2011.Information-sharing bureaus are proxied with public credit registries and private credit offices.Financial development dynamics involving depth(at overall economic and financial system levels),efficiency(at banking and financial system levels),activity(from banking and financial system perspectives),and size are used.Results:Two key findings are established.First,the effect of an increase in private credit bureaus is not clearly noticeable on financial access,probably because private credit agencies are still to be established in many countries.Second,an increase in public credit registries for the most part improves financial allocation efficiency and activity(or credit)between the 25th and 75th quartiles.Conclusions:As a main policy implication,countries in the top and bottom ends of the financial efficiency and activity distributions are unlikely to benefit from enhanced financial allocation efficiency as a result of an increase in public credit registries.
文摘We developed an IT (Information Technology) triage system for collecting disaster medical information in real time. FeliCa cards and card readers are used to obtain the number and condition of patients. The system is composed of two elements. First, the number of patients for each triage level and the accepted number of patients in each diagnosis and treatment department are obtained in real time, including response for changing triage level. Second, this information is shared in real time among hospitals, the admim'stration, and residents who are searching for their family. A disaster drill utilizing this system was held at the University of Yamanashi Hospital with 450 participants. From the result of that, the present system could work for those two elements. TRACY was examined its availability and practicability in this drill.
文摘This paper investigates the effect of the comprehensive information sharing on aggregate credit volume and the default ratio. Firstly, we utilize a three-stage game model developed by Dell'Ariccia and Marquez (2006) to illustrate that the comprehensive information sharing would change the credit resource allocation and produce negative "composition effects" stated by Jappelli and Pagano (2005). Then we use European Union (EU) data to test these theoretical implications. We find that when the information sharing system develops to a relatively high level, comprehensive information sharing improvements, for both the width and depth, are associated with the rise in macro credit access but also the aggregate default risk. We further find that the macro-consequences of variations in information sharing just differ in OECD and non-OECD group in EU countries. For OECD countries, the negative "composition effects" mainly arise from the increase in the width of information sharing while these effects are correlated with both the rise in depth and width indicators for non-OECD countries.
文摘In this paper, we discuss the relationship between the sharing of information of supply chains and the supply chain management; we also discuss the function of information share, and the obstacles in sharing information. As we all know, information share between enterprises in supply chains is necessary and possible, but the existence of obstacles of sharing information in supply chains is also a severe challenge in practice. This paper tries to find right ways for enterprises to build the real trade partners' relationship and realize transferring the information smoothly in all these three levels among the partners in supply chains.
文摘This is a study of the coordination model of consumer information sharing in the tourism supply chain with e-commerce platforms as the core.On the basis of considering the risks,a game theory is used to explore the information sharing effort level and the output profit of the tourism supply chain under both,centralized decision-making and decentralized decision-making.Finally,numerical simulation is used to verify the model and put forward a method of coordination for all parties in the tourism supply chain to achieve maximum profit.
基金National Natural Science Foudation of China(59904001)
文摘The mine ventilation and safety is one of the most important factors to influence on the coal production.More attention has been paid to manage safety information in scientific, efficient, and real-time way. Therefore, it is important to develop a practical mine safety assurance information system (CSAIS). Based on analyzing the actual management mode for ventilation and safety on mine, the paper studies the structure and function of the mine safety assurance information system based on GIS in detail. Moreover, it also suggests some applications and solutions. By combining with the practical situation, the paper realizes the whole function of the present system.
文摘This paper design the agricultural products circulation information system based on Internet of things, the information system in the agficultttral products circulation creative use Internet of things technology, to realize the a greater extent information sharing. The system adopts the design idea of the software SOA, it emphasizes the independence of service module. I hope this system can provide some reference to the agricultural products circulation information.
文摘The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘The effect of strict segmentation on pricing in the context of the Chinese stock markets was investigated. As an effective complementary to domestic A share market, H share market has played an important role in attracting foreign capital flows into mainland and as an open window for foreign investors to know Chinese enterprises. However, H share has received little attention by researchers. Considered that H share market enjoys relatively more free information and has a greater and faster access to global news sources, The discount between H share and A share is mainly studied in this paper. By constructing the model and based on proposed hypotheses, the empirical test confirms information asymmetry between foreign investors and domestic investors, liquidity effects, diversification effects are significant factors in explaining discounts on H share from the cross-section data.
文摘This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.