Information Exchange and the Diffusion of Computer Based Information Technologies in U.S. and Japanese Distribution Channels

1994 ◽  
Vol 3 (3-4) ◽  
pp. 161-175
Author(s):  
Victor V. Cordell
2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2000 ◽  
Vol 16 (01) ◽  
pp. 1-11
Author(s):  
Richard W. Bolton ◽  
Paul Horstmann ◽  
Darcy Peruzzotti ◽  
Tom Rando

Shipbuilding in the United States is characterized by large teams of suppliers and subcontractors who collaborate and support shipbuilders. It is important that these shipbuilding teams function as a single integrated organization: A Virtual Enterprise. The inefficiencies and impediments caused by each team member using their own choice of information technologies, software, data management and processes must be addressed to increase overall US shipbuilding efficiency and cost effectiveness. The NIIIP SPARS project is developing the information infrastructure and protocols to enable shipbuilding Virtual Enterprises that will improve collaboration and information exchange within the US shipbuilding community.


Author(s):  
Maria José Sousa ◽  
Rui Cruz ◽  
Ivo Dias ◽  
Carla Caracol

This chapter analyzes the importance of technologies as drivers for managing supply chains. The focus will be on the advantages of the use of information technologies to improve company's efficiency to be competitive and for the reduction of costs, improvement of operations, improvement of relationships with customers, suppliers and partners, shortening of delivering times, streamlining and optimization of business processes and operations. The use of new technologies contributes to improve efficiency of supply chain management: raw material suppliers, component manufacturers, finished product manufacturers, wholesalers and retailers. Technologies allow an integrated approach to planning, control and monitoring of product flows, from suppliers to end users. They aim at improve customer service at reduced overall costs, and leads to the development of important relationships with logistics providers, suppliers, and customers in order to enhance information exchange and the coordination of business activities, which are the key advantages of an integrated supply chain with the collaboration among all the participants in the value chain.


Author(s):  
Kam H. Vat

The chapter investigates an actionable context of knowledge networking, from the perspective of sustainable development which should accommodate the building of communities in cyberspace so much exemplified in today’s Internet and World Wide Web. The premise of this exploration is that members, or participants, in any community are engaged in learning that is critical to the survival and reproduction of that community. Through community participation, learners find and acquire models and have the opportunity themselves to become models and apprentices of others. This investigation provides a basis for thinking about the possibilities of a virtual community and the dynamics of its construction across a variety of computer-based contexts. The design and refinement of technology as the conduit for extending and enhancing the possibilities of virtual community building is an essential issue, but the role of the individuals as participants in such a community is as important. The idea of sustainable knowledge networking is to bring about continual learning and change for the community in need. The emergent challenge of such a mission is to de-marginalize many of the non-technical issues of building virtual communities for knowledge transfer and learning. The chapter concludes by reiterating the challenge of expositing what it means to create an appropriate context of knowledge networking through which purposeful actions can be supported with the elaboration of suitable information technologies.


Author(s):  
Shari Trewin ◽  
Simeon Keates

Computers can be a source of tremendous benefit for those with motor impairments. Enabling computer access empowers individuals, offering improved quality of life. This is achieved through greater freedom to participate in computer-based activities for education and leisure, as well as increased job potential and satisfaction. Physical impairments can impose barriers to access to information technologies. The most prevalent conditions include rheumatic diseases, stroke, Parkinson’s disease, multiple sclerosis, cerebral palsy, traumatic brain injury, and spinal injuries or disorders. Cumulative trauma disorders represent a further significant category of injury that may be specifically related to computer use. See Kroemer (2001) for an extensive bibliography of literature in this area. Symptoms relevant to computer operation include joint stiffness, paralysis in one or more limbs, numbness, weakness, bradykinesia (slowness of movement), rigidity, impaired balance and coordination, tremor, pain, and fatigue. These symptoms can be stable or highly variable, both within and between individuals. In a study commissioned by Microsoft, Forrester Research, Inc. (2003) found that one in four working-age adults has some dexterity difficulty or impairment. Jacko and Vitense (2001) and Sears and Young (2003) provide detailed analyses of impairments and their effects on computer access. There are literally thousands of alternative devices and software programs designed to help people with disabilities to access and use computers (Alliance for Technology Access, 2000; Glennen & DeCoste, 1997; Lazzaro, 1995). This article describes access mechanisms typically used by individuals with motor impairments, discusses some of the trade-offs involved in choosing an input mechanism, and includes emerging approaches that may lead to additional alternatives in the future.


Author(s):  
Maria José Sousa ◽  
Rui Cruz ◽  
Ivo Dias ◽  
Carla Caracol

This chapter analyzes the importance of technologies as drivers for managing supply chains. The focus will be on the advantages of the use of information technologies to improve company's efficiency to be competitive and for the reduction of costs, improvement of operations, improvement of relationships with customers, suppliers and partners, shortening of delivering times, streamlining and optimization of business processes and operations. The use of new technologies contributes to improve efficiency of supply chain management: raw material suppliers, component manufacturers, finished product manufacturers, wholesalers and retailers. Technologies allow an integrated approach to planning, control and monitoring of product flows, from suppliers to end users. They aim at improve customer service at reduced overall costs, and leads to the development of important relationships with logistics providers, suppliers, and customers in order to enhance information exchange and the coordination of business activities, which are the key advantages of an integrated supply chain with the collaboration among all the participants in the value chain.


2012 ◽  
Vol 39 (9) ◽  
pp. 993-1004 ◽  
Author(s):  
Jehan Zeb ◽  
Thomas Froese

Information exchange processes (referred to as transactions) in the AEC/FM (architecture, engineering, construction and facility management) industry are mostly manual and performed on an ad hoc basis. There is a growing trend towards computer-based exchange of information. This allows for more extensive, rapid, and error-free exchange of information, but it requires more formal specifications and agreements to govern these data exchanges. This research focuses on the development of an ontology-supported protocol for formalizing these data exchanges. As part of the development effort, this paper describes a taxonomy of transactions and messages. The knowledge represented in the ontology is evaluated and potential areas of application of the ontology are identified using an industry IT survey.


1989 ◽  
Vol 28 (04) ◽  
pp. 215-222 ◽  
Author(s):  
A. Levy

Abstract:Although computer technology has progressed rapidly in the last decade, the use of computer mediated instruction as an adjunct to medical education has made only limited progress. This paper will attempt to analyze some of the major factors bearing on this limitation, will review those areas where computer based´instruction is potentially of greatest use, and will suggest means by which medical education can make greater use of the rapidly evolving information technologies. The Medical PLATO project at the University of Illinois will be used as an example to illustrate many of the points relating to the development of this field.


1974 ◽  
Vol 7 (04) ◽  
pp. 377-381
Author(s):  
Nicholas Henry

A recurring irony among political scientists is that they rarely display an interest in public policies which directly affect them. An example is the current national effort to formulate public policies for new information technologies, notably those technologies which are vital to academic research in the sciences and social sciences, such as computer-based information storage' and retrieval systems, photocopiers, and microduplication techniques. For almost two decades, lobbyists, public bureaucrats, and congressmen have been engaged in a formal and continuing attempt to revise radically the present principal expression of public policy for new information technologies, the Copyright Act of 1909.It is my purpose in this essay to explain cursorily how the copyright concept affects the uses and users of the information technology that would seem to have the greatest utility for research in political science — the computer — and review the status of efforts to change the copyright principle in such a way as to accommodate more comprehensively the new information technologies. As we shall see, how copyright law is revised may alter traditional patterns of knowledge use and its generation in political science.


Author(s):  
Martin Eriksson

From an engineering point of view, uncertainty is present in all areas of design (products, processes and organizations). Computer-based design analysis, here confined to quantitative computer-based structural design analysis within mechanical engineering, serves as an important source of information in decisions taken during the design activity; importantly, it aims at giving confidence in critical design results. It is moreover nowadays used on all levels of concretization of the product-to-be throughout the development process. It must therefore address different uncertainties and errors during the whole development process. To that end, the concept of predictive design analysis (PDA) was introduced. The initial version of PDA treated primarily uncertainties of aleatory nature and was confined to product/technology-related issues. Today a broader perspective on the uncertainties is needed, and it is important to develop reliable design analysis methods because of the increasing use of design analysis by both analysts and engineering designers. Hence it is therefore necessary to extend the PDA framework into a full-blown methodology. PDA is a specific computer-based design analysis methodology that supports the systematic handling of uncertainties and errors during the computer-based design analysis activity throughout the whole development of the artifact. Such a methodology includes: Not only aleatory uncertainties, but also epistemic uncertainties connected with factors affecting the design analysis activities; Operationally efficient and effective integration between the engineering design and design analysis activities; Quality assurance aspects in terms of quality checks, verification and validation activities taking physical testing into account; Progress monitoring throughout all design analysis activities from clarification to completion; Traceability in utilized information, technologies and established results; Information and knowledge re-use for an improved uncertainty treatment in future design analysis activities through establishment of lessons learned and best practice documentation as well as methodology development. In this paper the synthesis of the PDA methodology is reported. Starting from an elaboration on different concepts of uncertainty, the constituent elements of the extended PDA methodology are presented. The methodology is then illustrated with a case study.


Sign in / Sign up

Export Citation Format

Share Document