Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu...Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .展开更多
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and tech...With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
The primary objective of emergency pre-examination and triage is to provide the most appropriate clinical service to patients with acute and critical illnesses while ensuring the optimal utilization of limited medical...The primary objective of emergency pre-examination and triage is to provide the most appropriate clinical service to patients with acute and critical illnesses while ensuring the optimal utilization of limited medical resources.With the advancement of medical information technology,mobile technology,and information management,these features have been gradually incorporated into emergency pre-examination and triage and have shown promising outcomes.In this article,the benefits of implementing mobile technology and the current status of integrated information management to provide a reference for the future development and enhancement of emergency pre-examination and triage are reviewed.展开更多
This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study...This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of t...Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.展开更多
Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.Howeve...Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.展开更多
Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of tech...Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.展开更多
In recent years, information and communications technology (ICT) has gone through a process of convergence due to dynamic marketing and technological development. However, signs of deconvergence have emerged during th...In recent years, information and communications technology (ICT) has gone through a process of convergence due to dynamic marketing and technological development. However, signs of deconvergence have emerged during this ongoing process of ICT convergence, which requires close attention and critical reflection by ICT practitioners and educators. This article seeks to identify and critique the seemingly paradoxical trend of market convergence/deconvergence, technological convergence/deconvergence, and audience convergence/deconvergence in ICT. To achieve this goal, a focus group discussion with eight selected participants was adopted as the research method for this study. The data were then analysed using qualitative thematic analysis. The themes revealed in the focus group discussion not only reflect the trends in ICT convergence but also, from various perspectives, highlight the increasingly obvious phenomena of deconvergence. The findings should inform industrial practitioners about the rapidly changing ICT landscape and shed light on future ICT policy and industry directions.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development...Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.展开更多
Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the applica...Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the application of BIM technology in practice,and approaches from the integration of BIM design-construction.This paper also puts forward the integration of cross-stage information based on the BIM+Geographic Information System(GIS)construction information management system to realize the BIM whole life cycle management,and provides directional support for the continuous and efficient application of BIM technology in engineering practice.展开更多
In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and qu...In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd...To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.展开更多
文摘Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
文摘The primary objective of emergency pre-examination and triage is to provide the most appropriate clinical service to patients with acute and critical illnesses while ensuring the optimal utilization of limited medical resources.With the advancement of medical information technology,mobile technology,and information management,these features have been gradually incorporated into emergency pre-examination and triage and have shown promising outcomes.In this article,the benefits of implementing mobile technology and the current status of integrated information management to provide a reference for the future development and enhancement of emergency pre-examination and triage are reviewed.
文摘This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.
基金supported by Hainan Province Basic and Applied Basic Research Program(Natural Science Field)High-level Talent Project(Grant No.2019RC044).
文摘Government information sharing(GIS)refers to that act of required or provided for duty government information,commercial information and public welfare information,and it is a basic issue of government services.However,the existing GIS has low transparency and is lack of flexibility between different departments.Aiming at such problems,this paper takes blockchain as a solusion,and systematically summarizes the development of digital GIS,the advantages and challenges of blockchain and its theoretical research and practical applications.Specifically,it reviews e-government interactive structure,big data and other solutions,analyses their imperfections,and puts forward blockchain-based solutions.The blockchain improves government service efficiency and data security,meanwhile it faces challenges in throughput and supervision.In order to meet these challenges,researchers propose solutions based on three data exchange scenarios:government-to-government,government-to-enterprise and government-toindividual.In addition to researches,blockchain-based GIS is put into use.The electronic licensing project of Nanjing(China)government is taken as an example to illustrate that blockchain has the ability to openly and securely verify,track,and exchange data,so as to improve management ability and public service level of government agencies.
文摘Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.
文摘In recent years, information and communications technology (ICT) has gone through a process of convergence due to dynamic marketing and technological development. However, signs of deconvergence have emerged during this ongoing process of ICT convergence, which requires close attention and critical reflection by ICT practitioners and educators. This article seeks to identify and critique the seemingly paradoxical trend of market convergence/deconvergence, technological convergence/deconvergence, and audience convergence/deconvergence in ICT. To achieve this goal, a focus group discussion with eight selected participants was adopted as the research method for this study. The data were then analysed using qualitative thematic analysis. The themes revealed in the focus group discussion not only reflect the trends in ICT convergence but also, from various perspectives, highlight the increasingly obvious phenomena of deconvergence. The findings should inform industrial practitioners about the rapidly changing ICT landscape and shed light on future ICT policy and industry directions.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.
基金Chongqing Engineering Institute 2023 Intramural Research Fund Grant Project:Highway Engineering Construction Process Management and Technological Innovation Research Based on BIM Technology(Project number:2023xzky04)。
文摘Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the application of BIM technology in practice,and approaches from the integration of BIM design-construction.This paper also puts forward the integration of cross-stage information based on the BIM+Geographic Information System(GIS)construction information management system to realize the BIM whole life cycle management,and provides directional support for the continuous and efficient application of BIM technology in engineering practice.
文摘In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.